A Practical Guide to Computer Forensics Investigations

Total Page:16

File Type:pdf, Size:1020Kb

A Practical Guide to Computer Forensics Investigations 528/526=1.004” HAYES All you need to know to succeed in digital forensics: technical and investigative skills, in one book COMPUTER Complete, practical, and up-to-date • Understand what computer forensics examiners do, and the A PRACTICAL GUIDE TO types of digital evidence they work with Thoroughly covers digital forensics for Windows, • Explore Windows and Mac computers, understand how Mac, mobile, hardware, and networks their features affect evidence gathering, and use free tools to Addresses online and lab investigations, investigate their contents documentation, admissibility, and more • Extract data from diverse storage devices By Dr. Darren Hayes, founder of Pace University’s • Establish a certified forensics lab and implement good practices for managing and processing evidence COMPUTER Code Detectives forensics lab—one of America’s “Top 10 Computer Forensics Professors” • Gather data and perform investigations online A PRACTICAL GUIDE TO Perfect for anyone pursuing a digital forensics • Capture Internet communications, video, images, and other content FORENSICS career or working with examiners • Write comprehensive reports that withstand defense objections and enable successful prosecution Criminals go where the money is. Today, trillions • Follow strict search and surveillance rules to make your evidence FORENSICS of dollars of assets are digital, and digital crime is growing fast. In response, demand for digital admissible forensics experts is soaring. To succeed in this • Investigate network breaches, including dangerous Advanced exciting field, you need strong technical and Persistent Threats (APTs) investigative skills. In this guide, one of the world’s INVESTIGATIONS • Retrieve immense amounts of evidence from smartphones, even leading computer forensics experts teaches you all without seizing them the skills you’ll need. • Successfully investigate financial fraud performed with digital devices Writing for students and professionals at all levels, Dr. Darren Hayes presents complete best practices • Use digital photographic evidence, including metadata and for capturing and analyzing evidence, protecting the social media images INVESTIGATIONS chain of custody, documenting investigations, and scrupulously adhering to the law, so your evidence Dr. Darren R. Hayes, a leading expert in computer forensics and can always be used. security, is Director of Cybersecurity and Assistant Professor at Pace University. He has been named one of the Top 10 Computer Hayes introduces today’s latest technologies and Forensics Professors by Forensics Colleges. Hayes is former technical challenges, offering detailed coverage President and current Board Member of the High Technology Crime of crucial topics such as mobile forensics, Mac Investigation Association (HTCIA), Northeast Chapter. He created forensics, cyberbullying, and child endangerment. and manages Code Detectives, Pace’s Computer Forensics research This guide’s practical activities and case studies give laboratory, where he works closely with students in computer and you hands-on mastery of modern digital forensics mobile forensics. He has fostered relationships with the N.Y.P.D., tools and techniques. Its many realistic examples N.Y. State Police, and other law enforcement agencies; and reflect the author’s extensive and pioneering work organized internship programs at the Cybercrime divisions of as a forensics examiner in both criminal and civil the New York County and Westchester County D.A. Offices. investigations. Security / Computer Forensics ISBN-13: 978-0-7897-4115-8 ISBN-10: 0-7897-4115-6 Cover image: Mega Pixel/Shutterstock.com 56500 Text printed on recycled paper 9 780789 741158 www.pearsonITcertification.com $65.00 U.S. • $75.00 Canada DR. DARREN R. HAYES A Practical Guide to Computer Forensics Investigations Dr. Darren R. Hayes 800 East 96th Street, Indianapolis, Indiana 46240 USA 9780789741158_forensics.indb i 11/20/14 10:48 PM A Practical Guide to Computer Forensics Investigations Associate Publisher Dave Dusthimer Copyright © 2015 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or Acquisitions Editor transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, Betsy Brown without written permission from the publisher. No patent liability is assumed with respect Development Editor to the use of the information contained herein. Although every precaution has been taken in Jeff Riley the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information Managing Editor contained herein. Sandra Schroeder ISBN-13: 978-0-7897-4115-8 ISBN-10: 0-7897-4115-6 Project Editor Mandie Frank Library of Congress Control Number: 2014955541 Copy Editor Printed in the United States of America Krista Hansing First Printing: December 2014 Indexer Larry Sweazy Trademarks All terms mentioned in this book that are known to be trademarks or service marks have Proofreader been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this Megan Wade-Taxter information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Technical Editors Dennis Dragos Shawn Merdinger Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but Publishing Coordinator no warranty or fitness is implied. The information provided is on an “as is” basis. The author Vanessa Evans and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. Designer Alan Clements Special Sales Compositor For information about buying this title in bulk quantities, or for special sales opportunities Tricia Bronkella (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the U.S., please contact [email protected]. 9780789741158_forensics.indb ii 11/20/14 10:48 PM Contents at a Glance Introduction .................................................. xx 1 The Scope of Computer Forensics ................................ 2 2 Windows Operating and File Systems ............................. 32 3 Handling Computer Hardware ................................... 80 4 Acquiring Evidence in a Computer Forensics Lab .................. 116 5 Online Investigations .......................................... 162 6 Documenting the Investigation .................................. 210 7 Admissibility of Digital Evidence ................................. 238 8 Network Forensics ............................................ 292 9 Mobile Forensics ............................................. 320 10 Photograph Forensics ......................................... 372 11 Mac Forensics ............................................... 390 12 Case Studies ................................................ 436 Index ....................................................... 458 iii 9780789741158_forensics.indb iii 11/20/14 10:48 PM Table of Contents Introduction xx Chapter 1: The Scope of Computer Forensics 2 Introduction ....................................................... 2 Popular Myths about Computer Forensics ......................... 3 Types of Computer Forensics Evidence Recovered ...................... 5 Electronic Mail (Email) .......................................... 5 Images ...................................................... 7 Video ....................................................... 8 Websites Visited and Internet Searches ........................... 9 Cellphone Forensics .......................................... 10 What Skills Must a Computer Forensics Investigator Possess? ........... 10 Computer Science Knowledge ................................. 10 Legal Expertise .............................................. 11 Communication Skills ......................................... 11 Linguistic Abilities ............................................ 11 Continuous Learning .......................................... 11 An Appreciation for Confidentiality .............................. 12 The Importance of Computer Forensics ............................... 12 Job Opportunities ............................................ 12 A History of Computer Forensics .................................... 14 1980s: The Advent of the Personal Computer ..................... 14 1990s: The Impact of the Internet ............................... 15 Training and Education ............................................ 19 Law Enforcement Training ..................................... 19 Summary ........................................................ 25 iv Table of Contents 9780789741158_forensics.indb iv 11/20/14 10:48 PM Chapter 2: Windows Operating and File Systems 32 Introduction ...................................................... 32 Physical and Logical Storage ....................................... 34 File Storage ................................................. 34 File Conversion and Numbering Formats .............................. 37 Conversion of Binary to Decimal ...............................
Recommended publications
  • Mobile + Cloud Apps What Does Hawaii Offer?
    cloud in the palm of your hands Victor Bahl 7.28.2011 mobile phone market IDC FY12 forecast 518 million SmartPhones sold world-wide • More smartphones shipped than PCs in FY11 Q2 (101M vs. 92M) WW Mobile Phone Device Shipments Billions 1.8 1.7 1.6 1.6 1.5 1.4 40% 1.4 1.3 37% 1.2 1.2 33% 29% 1.0 26% 0.8 24% 0.6 0.4 0.2 0.0 2009 2010 2011 2012 2013 2014 Other Mobile Phones Smartphones Source: IDC, iSuppli, Gartner, Accenture analysis. sad reality of mobile computing hardware limitations . vs. static elements of same era (desktops, servers) . weight, power, size constraints . CPU, memory, display, keyboard wireless communication uncertainty . bandwidth / latency variation . intermittent connectivity . may cost real money, require service agreements finite energy source . actions may be slowed or deferred . wireless communication costs energy why resource poverty hurts . No “Moore’s Law” for human attention . Being mobile consumes human attention . Already scarce resource is further taxed by resource poverty Human Attention Human Adam & Eve 2000 AD Reduce demand on human attention • Software computing demands not rigidly constrained • Many “expensive” techniques become a lot more useable when mobile Some examples • machine learning, activity inferencing, context awareness • natural language translation, speech recognition, Vastly superior mobile • computer vision, context awareness, augmented reality user experience • reuse of familiar (non-mobile) software environments Clever exploitation needed to deliver these benefits Courtesy. M. Satya, CMU battery trends Li-Ion Energy Density • Lagged behind o Higher voltage batteries (4.35 250 V vs. 4.2V) – 8% improvement o Silicon anode adoption (vs.
    [Show full text]
  • Artificial Intelligence, Big Data and Cloud Computing 144
    Digital Business and Electronic Digital Business Models StrategyCommerceProcess Instruments Strategy, Business Models and Technology Lecture Material Lecture Material Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 1 Table of Contents I Page Part I - Introduction 4 Chapter 1: Foundations of Digital Business 5 Chapter 2: Mobile Business 29 Chapter 3: Social Media Business 46 Chapter 4: Digital Government 68 Part II – Technology, Digital Markets and Digital Business Models 96 Chapter 5: Digital Business Technology and Regulation 97 Chapter 6: Internet of Things 127 Chapter 7: Artificial Intelligence, Big Data and Cloud Computing 144 Chapter 8: Digital Platforms, Sharing Economy and Crowd Strategies 170 Chapter 9: Digital Ecosystem, Disintermediation and Disruption 184 Chapter 10: Digital B2C Business Models 197 © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 2 Table of Contents II Page Chapter 11: Digital B2B Business Models 224 Part III – Digital Strategy, Digital Organization and E-commerce 239 Chapter 12: Digital Business Strategy 241 Chapter 13: Digital Transformation and Digital Organization 277 Chapter 14: Digital Marketing and Electronic Commerce 296 Chapter 15: Digital Procurement 342 Chapter 16: Digital Business Implementation 368 Part IV – Digital Case Studies 376 Chapter 17: Google/Alphabet Case Study 377 Chapter 18: Selected Digital Case Studies 392 Chapter 19: The Digital Future: A Brief Outlook 405 © Bernd W.
    [Show full text]
  • US 'To Cut Immigrant Detention'
    Internet News Record 06/10/09 - 06/10/09 LibertyNewsprint.com U.S. Edition The First Draft: David Letterman and US 'to cut immigrant the Dalai Lama detention' By Deborah Zabarenko (Front Serious subjects, all of them. (BBC News | Americas | World violent crimes, the New York Row Washington) And what was the top story on the Edition) Times reported. Submitted at 10/6/2009 6:11:02 AM morning network newscasts? Ten Submitted at 10/6/2009 7:41:54 AM "Serious felons deserve to be in points if you guessed the natural the prison model," Ms Napolitano This is one of those Washington choice: David Letterman’s sex US officials are expected to told the newspaper. days that seems to defy a theme. life. announce plans that would allow "But there are others. There are Consider: What does this say about illegal immigrants not considered women. There are children." Iran is the topic at the Senate Washington? The U.S. media? a threat to be taken out of jails, Proposals for using alternatives Banking Committee, where The public appetite for scandal? reports say. to prison detention are expected to officials from the State and Let us know what you think. The new policy would list be submitted to Congress in the Treasury departments are set to Click here for more Reuters immigrants according to the risk coming weeks. testify on economic sanctions political coverage they may pose, the Wall Street The Wall Street Journal cited against Tehran. Photo credits: Journal reports. officials as saying the Afghanistan is expected to be REUTERS/Christinne Muschi Detainees who are not criminals administration would ask the front and center when President (exiled Tibetan spiritual leader the could be kept in hotels and private sector for ideas, including Barack Obama briefs Dalai Lama, Montreal, Canada, nursing homes, according to leaks for the construction of model congressional leaders about his October 3, 2009) of the plans.
    [Show full text]
  • Understanding User Satisfaction with Intelligent Assistants
    Understanding User Satisfaction with Intelligent Assistants Julia Kiseleva1;∗ Kyle Williams2;∗ Ahmed Hassan Awadallah3 Aidan C. Crook3 Imed Zitouni3 Tasos Anastasakos3 1Eindhoven University of Technology, [email protected] 2Pennsylvania State University, [email protected] 3Microsoft, {hassanam, aidan.crook, izitouni, tasos.anastasakos}@microsoft.com ABSTRACT Q1: how is the weather in Chicago User’s dialog Voice-controlled intelligent personal assistants, such as Cortana, Q2: how is it this weekend with Cortana: (A) Task is “Finding a Google Now, Siri and Alexa, are increasingly becoming a part of Q3: find me hotels in Chicago hotel in Chicago” users’ daily lives, especially on mobile devices. They allow for a Q4: which one of these is the cheapest radical change in information access, not only in voice control and Q5: which one of these has at least 4 stars touch gestures but also in longer sessions and dialogues preserving context, necessitating to evaluate their effectiveness at the task or Q6: find me direc>ons from the Chicago airport to number one session level. However, in order to understand which type of user User’s dialog Q1: find me a pharmacy nearby interactions reflect different degrees of user satisfaction we need with Cortana: (B) explicit judgements. In this paper, we describe a user study that Q2: which of these is highly rated Task is “Finding a pharmacy” was designed to measure user satisfaction over a range of typical Q3: show more informa>on about number 2 scenario’s of use: controlling a device, web search, and structured Q4: how long will it take me to get there search dialog.
    [Show full text]
  • Keith Drummond (561) 846­0337 [email protected] Drummond [email protected]
    Keith Drummond (561) 846­0337 www.Keith­Drummond.com [email protected] [email protected] OBJECTIVE ​ Result Driven Application Developer with end to end experience ​ seeking a position as a Web, Data services developer. Specialties ● Programming ­ C#, JAVASCRIPT, Reactjs, ANGULARJS, ASP.NET MVC, WebApi ● Database Management ­ Microsoft SQL Server, MYSQL, NoSql ● Database Programming ­ T­SQL, SSIS, PL­SQL ● OS Administration ­ Windows 3.1 ­ Windows 8.1, Windows Server 2000­2012 ● PC and Network Hardware ­ New systems and upgrades / repairs ● Skillful Debugger/Trouble shooter ● Test Driven Development, and Unit Testing SUMMARY ● 7 Years’ experience in Software Development and QA Testing ● Comfortable in Agile development with scrum environment ● Strong knowledge of relational databases and IT Systems. ● In Depth hands on experienced with Server Management Studio 2005­2014. ● Expert Knowledge in upgrading custom software and defect management ● Worked as group member in all parts of the software development lifecycle including requirements, analysis, work breakdown, estimating, design, coding, bug fixes, and release management. EXPERIENCE DETAIL Senior Application Developer Consultant AAA Auto Club South September 2015 ­ Present Tampa, Fl ● 4 month Contract to hire, Moved to permanent role Jan 2016 ● Lead Developer on Insurance Lead Retrieval Web Application ● Migrated .Net3.5 Web Form Insurance application to ReactJS/MVC5/Entity Framework 6 web Application. ● Started automated unit testing environment used during post deployment
    [Show full text]
  • Text 5 Software
    Text 5 Software Software, consisting of programs, enables a computer to perform specific tasks, as opposed to its physical components (hardware) which can only do the tasks they are mechanically designed for. 5.1 Categories of Software Two general categories of software are showed in Figure I-5-1. Figure I-5-1 Categories of Software Other examples of software include: • Programming languages define the syntax and semantics of computer programs. For example, Pascal, C, C++, VB/VB.NET, C#, Java, etc. • Middleware controls and co-ordinates distributed systems. Middleware is computer software that connects software components or some people and their applications. The software consists of a set of services that allows multiple processes running on one or more machines to interact. This technology evolved to provide for interoperability in support of the move to coherent distributed architectures, which are most often used to 51 Part I Knowledge Points(第一部分 知识点) support and simplify complex distributed applications. It includes web servers, application servers, and similar tools that support application development and delivery. Middleware is especially integral to modern information technology based on XML, SOAP, Web services, and service-oriented architecture. • Testware is software for testing hardware or a software package. Generally speaking, Testware is a sub-set of software with a special purpose, that is, for software testing, especially for software testing automation. Testware is produced by both verification and validation testing methods. • Firmware is low-level software often stored on electrically programmable memory devices. Firmware is given its name because it is treated like hardware and run (“executed”) by other software programs.
    [Show full text]
  • February 12, 2010 Electronic Filing Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12Th Street, SW 12Th
    February 12, 2010 Electronic Filing Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, SW 12th Street Lobby, TW-A325 Washington, D.C. 20554 Re: Written Ex Parte Communication WT Docket No. 09-66, GN Docket No. 09-157, GN Docket No. 09-51 Dear Ms. Dortch: Much has happened over the last five months since CTIA and other industry members provided extensive evidence to the Commission on the status of competition, investment, and innovation in the wireless ecosystem. As an update to those filings and as the Commission works on completion of the 14th annual CMRS Competition Report, CTIA takes this opportunity to highlight numerous changes and upgrades to networks, handsets, applications, and even service offerings that benefit consumers. As detailed in our filings, the “virtuous cycle” of the wireless ecosystem is based on the evolution of each of these areas. Developments over the last six months demonstrate that the virtuous cycle is alive and healthy, driven by the intense competition of the industry. If you have any questions, please do not hesitate to contact me. Sincerely, /s/ Christopher Guttman-McCabe Christopher Guttman-McCabe Vice President, Regulatory Affairs CTIA – The Wireless Association® Wireless Industry Competition Update: Recent Wireless Industry Developments Regarding Innovation and Investment February 2010 Much has happened over the last five months since CTIA and other industry members provided extensive evidence to the Commission on the status of competition, investment, and innovation in the wireless ecosystem.1 As an update to those filings and as the Commission works on completion of the 14th annual CMRS Competition Report, CTIA takes this opportunity to highlight numerous changes and upgrades to networks, handsets, applications, and even service offerings that benefit consumers.
    [Show full text]
  • Bing - Webmaster Tools
    Bing - Webmaster Tools Bing webmaster tools Sign In Want more users for your site? Sign In New to Webmaster? Sign Up Sign up now and receive a 100 USD search advertising credit from Microsoft Advertising. Terms and Conditions apply Get insights into your site Dashboard Reporting Tools Leverage your dashboard for the sites you Understanding what leads people to your site can manage. Get a summary view of how well your site help you understand what to focus on to increase is performing and identify what needs emphasis traffic. Our detailed reports help you with this Diagnostic Tools Notifications https://www.bing.com/toolbox/webmaster/[27.08.2019 12:41:45] Bing - Webmaster Tools Our diagnostic and research tools give you Stay on top of messages and alerts for your sites. information on what people are searching for and Subscribe for notifications or use the notifications what areas to expand on next console to manage your site notifications Do more with your site Bing Webmaster provides easy-to-use public tools to help you do more with your site. No sign in required. Mobile Friendly Verify Bing Bot Check if your site is mobile friendly with the Check if requests to your site are from genuine Bing Mobile Friendliness tool BingBot IPs New to Webmaster? Sign up now and receive a 100 USD search advertising credit from Microsoft Advertising. Terms and Conditions apply Sign Up https://www.bing.com/toolbox/webmaster/[27.08.2019 12:41:45] Bing - Webmaster Tools Know more about Webmaster Guidelines API The Bing Webmaster guidelines cover a broad
    [Show full text]
  • Microsoft from Wikipedia, the Free Encyclopedia Jump To: Navigation, Search
    Microsoft From Wikipedia, the free encyclopedia Jump to: navigation, search Coordinates: 47°38′22.55″N 122°7′42.42″W / 47.6395972°N 122.12845°W / 47.6395972; -122.12845 Microsoft Corporation Public (NASDAQ: MSFT) Dow Jones Industrial Average Type Component S&P 500 Component Computer software Consumer electronics Digital distribution Computer hardware Industry Video games IT consulting Online advertising Retail stores Automotive software Albuquerque, New Mexico Founded April 4, 1975 Bill Gates Founder(s) Paul Allen One Microsoft Way Headquarters Redmond, Washington, United States Area served Worldwide Key people Steve Ballmer (CEO) Brian Kevin Turner (COO) Bill Gates (Chairman) Ray Ozzie (CSA) Craig Mundie (CRSO) Products See products listing Services See services listing Revenue $62.484 billion (2010) Operating income $24.098 billion (2010) Profit $18.760 billion (2010) Total assets $86.113 billion (2010) Total equity $46.175 billion (2010) Employees 89,000 (2010) Subsidiaries List of acquisitions Website microsoft.com Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions. Established on April 4, 1975 to develop and sell BASIC interpreters for the Altair 8800, Microsoft rose to dominate the home computer operating system (OS) market with MS-DOS in the mid-1980s, followed by the Microsoft Windows line of OSes. Microsoft would also come to dominate the office suite market with Microsoft Office. The company has diversified in recent years into the video game industry with the Xbox and its successor, the Xbox 360 as well as into the consumer electronics market with Zune and the Windows Phone OS.
    [Show full text]
  • RESUMEN Esta Tesis, Enfoca Básicamente Lo Referente Al Valor
    UNIVERSIDAD DE CUENCA RESUMEN Esta tesis, enfoca básicamente lo referente al valor probatorio de los documentos electrónicos en la Legislación Ecuatoriana, pues para que un documento electrónico sea considerado prueba debe cumplir ciertos requisitos como inalterabilidad, autenticidad y no repudio, estos entre los principales. Se aborda además la importancia que tiene el uso de la Firma Electrónica Avanzada, que no hace otra cosa que garantizar la autenticidad de quien suscribe el documento. Analizamos también lo atinente al Contrato Electrónico, que se ha constituido en el resultado del Comercio Electrónico, nueva forma de negociación que apareció décadas a tras pero que empieza a tomar fuerza preponderante en las relaciones mercantiles. Sistematizamos el ordenamiento jurídico con el que cuenta el Ecuador y relacionado con el Documento Electrónico, cuerpos legales tales como la Ley de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos del Ecuador, con su respectivo reglamento, que observan y dan pautas plenas referentes a los documentos electrónicos, y normas como las contenidas en el Código Orgánico de la Función Judicial, Código de Procedimiento Civil, entre otras citadas consultadas, que colaboran para guiar de manera eficiente el ejercicio procesal del derecho informático. Se incluye también todo lo referente a las consideraciones que la Norma Suprema hace en relación a las TICs (Tecnologías de la Comunicación y la Información). Alumna: Marcia Fernanda Cedillo Díaz 1 UNIVERSIDAD DE CUENCA Para finalizar se hacen algunas sugerencias y conclusiones en referencia con el tema abordado en la presente tesis, recalcando el compromiso permanente de las Universidades para la enseñanza adecuada del Derecho Informático. Palabras Claves: Prueba Electrónica, TICS, Valor Probatorio, Consideraciones Constitucionales, Requisitos, Contrato Electrónico, Documento Público, Documento Privado.
    [Show full text]
  • Mobile Computing
    2/11/18 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Location-based Services: Definition LBS: A certain service that is offered to the users based on their locations. Convergence of Technologies GIS/ Spatial Database Web GIS Mobile GIS LBS Mobile Devices Internet Mobile Internet 1 2/11/18 History • The main origin of Location-Based Services (LBS) was the E911 (Enhanced 911) mandate, which the U.S. government passed in 1996. • The mandate was for mobile-network operators to locate emergency callers with prescribed accuracy, so that the operators could deliver a caller’s location to Public Safety Answering Points. • Cellular technology couldn’t fulfill these accuracy demands back then, so operators started enormous efforts to introduce advanced positioning methods. History • E911 Phase 1: Wireless network operators must identify the phone number and cell phone tower used by callers, within six minutes of a request by a PSAP (public safety answering point). • E911 Phase 2: • 95% of a network operator’s in-service phones must be E911 compliant (“location capable”) by December 31, 2005. • Wireless network operators must provide the latitude and longitude of callers within 300 meters, within six minutes of a request by a PSAP. History • To gain returns on the E911 investments, operators launched a series of commercial LBSs. • In most cases, these consisted of finder services that, on request, delivered to users a list of nearby points of interest, such as restaurants or gas stations. • However, most users weren’t interested in this kind of LBS, so many operators quickly phased out their LBS offerings and stopped related development efforts.
    [Show full text]
  • Towards Measuring Satisfaction with Mobile Proactive Systems
    Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems ∗ Qi Guo , Yang Song∗ Google Inc. 1600 Amphitheater Parkway, Mountain View, CA 94043 {qiguo, yangso}@google.com ABSTRACT Recently, proactive systems such as Google Now and Mi- crosoft Cortana have become increasingly popular in reform- ing the way users access information on mobile devices. In these systems, relevant content is presented to users based on their context without a query in the form of information cards that do not require a click to satisfy the users. As a result, prior approaches based on clicks cannot provide re- liable measurements of user satisfaction with such systems. It is also unclear how much of the previous findings regard- ing good abandonment with reactive Web searches can be applied to these proactive systems due to the intrinsic dif- ference in user intent, the greater variety of content types and their presentations. In this paper, we present the first large-scale analysis of viewing behavior based on the viewport (the visible fraction of a Web page) of the mobile devices, towards measuring Figure 1: This figure shows the variety of informa- user satisfaction with the information cards of the mobile tion cards in two proactive systems: Cortana (left) proactive systems. In particular, we identified and analyzed and Google Now (right). a variety of factors that may influence the viewing behavior, including biases from ranking positions, the types and at- 1. INTRODUCTION tributes of the information cards, and the touch interactions Proactive systems such as Google Now and Microsoft Cor- with the mobile devices.
    [Show full text]