THE CHALLENGES OF MOBILE FORENSICS

Mobile devices are a staple of our lives. They keep us connected and do far more. It is not unusual for a smart phone to be an entertainment center, social tool and mobile office rolled up into one small package. We marvel when we hear about a home that has two computers for one family, … Read more

MOBILE FORENSIC ANALYSIS

HOW TO IDENTIFY A SUBSCRIBER? Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM). As physical evidence the SIM provides details printed on the surface of:  Name of the Network Provider  Unique ID Number GENERIC PROPERTIES All MS‘s have follow GSM standards on how they access and communicate with … Read more

COMPUTER FORENSICS V/S MOBILE PHONE FORENSICS

REPRODUCIBILITY OF EVIDENCE IN THE CASE OF DEAD FORENSIC ANALYSIS Digital investigations can involve dead and/or live analysis techniques. In dead forensic analysis, the target device is powered off and an image of the entire hard disk is made. A one-way-hash function is then used to compute a value for both, the entire contents of … Read more

EXTRACTION METHODS OF MOBILE FORENSICS

Generally products tend to split mobile forensics information extraction into two different methods, the physical extraction and the logical extraction. The reason for this split is because unlike a personal computer which has a standardized interface, mobile phones tend to use proprietary interfaces or deviate from standards. This means that generally it will take longer … Read more

INTRODUCTION TO MOBILE FORENSICS

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability. The use of phones … Read more

WAYS TO PROTECT CYBER TERRORISM

“SOME WAYS TO PROTECT CYBER TERRORISM” Employ Strong Passwords: As simple as this sound, it is one of the most overlooked methods of keeping systems safe. There are a number of freely available tools that ‘guess’ passwords — a very common technique referred to as ‘brute force cracking. These programs work by repeatedly attempting to … Read more

PROTECTION FROM CYBER TERRORISM

PROTECTION FROM CYBER TERRORISM- A FEW SUGGESTIONS Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most of the militaries classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most … Read more

INDIAN LAW & CYBER TERRORISM

In India there is no law, which is specifically dealing with prevention of malware through aggressive defense. Thus, the analogous provisions have to be applied in a purposive manner. The protection against malware attacks can be claimed under the following categories: Protection available under the Constitution of India and protection available under other statutes. Protection … Read more