StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Phone Forensics - Article Example

Cite this document
Summary
According to the paper, mobile phones are essential devices that assist in making day to day communication. In the world today, more than 80% of individuals own mobile phones from various manufacturing companies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Mobile Phone Forensics
Read Text Preview

Extract of sample "Mobile Phone Forensics"

Introduction. Mobile phones are essential devices that assist in making day to day communication. In the world today, more than 80% of individuals own mobile phones from various manufacturing companies. Since the establishment of the communication gadgets, the mobile phone sector has experienced a series of developments and evolution as a result of innovations and creativity and therefore introducing unique and enhanced features in each generation. (Bruijn 2009). There have been four generations of mobile phones, starting with the 1G, 2G, 3G and 4G.

The reason for the evolution of the wireless generations is the advancement and incorporation of consumer’s needs. With the consequent development, there has been exponential growth in the use of services, hence utilizing the available bandwidth in the universe (Bruijn 2009). First generation mobile phones were meant for voice services as well as analog based protocols. With the advancement in technology, the second generation wireless network was designed for voice services, improved capacity as coverage and also included the first digital standards: GSM and CDMA.

The significant advancement in the third generation was the provision for data consideration. The third generation mobile phones were designed for voice with some data consideration, for instance, text, internet and multimedia and the mobile broadband speed was relatively higher. The present generation of mobile phones is the fourth generation wireless network. It is designed specifically for data. It also incorporates IP-based protocols, (LTE) as well as true mobile broadband. These improvements have also been made due to the need for speed in kilobits per second because of the rising number of mobile phone users.

(Barnes 2011). First generation mobile phones could clock at least 2.4kbps with the second generation clocking at 64kbps. With the continuous increase in the number of users, there was an upgrade in third generation mobile phones to at least 2000kbps and currently the fourth generation mobile phones hit 100000kbps (Glotz 2005). In the fourth generation technologies, Most carriers that employ the use of orthogonal frequency division Multiplexing, (OFDM) quote their services under 4th generation.

According to the International Telecommunication Union, mobile devices need to have the ability to exchange data at 100mb/sec to be classified under 4G network. Long Term Evolution, (LTE) and Worldwide Interoperability for Microwave Access, WiMAX are other technologies in the fourth generation (Glotz 2005). SIM cards are used along with the GSM devices. They have an integrated circuit meant to store securely the International Mobile Subscriber Identity, IMSI. SIM cards are used in identification as well as authentication of mobile users.

Their design is convenient, and therefore they can be interchanged or transferred to various mobile devices. SIM cards also contain unique serial identities and numbers , ICCID , International Mobile Subscriber Identity, IMSI, security authentication and partial data related to the local network as well as the list of subscribed services by the user and two access passwords to enhance security: the PIN , personal identification number and PUK, personal unblocking code for unlocking the PIN (Bruijn 2009).

SIM cards are used as a primary tool in forensics. They store the network state data that is received from the Local Area Identity. Carrier systems are split into location areas, each having a particular LAI numeral. When the device shifts locations, it saves the new LAI and automatically sends it to the linked operator network along its new location. This data can be used to locate individuals using the device by forensics. (Fadia 2006) In conclusion, forensics should update their tools to provide legal examiners solutions to the new and current technological advancements.

ReferencesBarnes, M. (2011). Mobile phones technology, networks, and user issues. Hauppauge, N.Y.: Nova Science Publisher's.Bruijn, M. (2009). Mobile phones the new talking drums of everyday Africa. Cameroon: Langaa ;.Fadia, A. (2006). Hacking mobile phones. Boston, MA: Thomson Course Technology.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Phone Forensics Article Example | Topics and Well Written Essays - 500 words”, n.d.)
Mobile Phone Forensics Article Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1693148-mobile-devile-forensics
(Mobile Phone Forensics Article Example | Topics and Well Written Essays - 500 Words)
Mobile Phone Forensics Article Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1693148-mobile-devile-forensics.
“Mobile Phone Forensics Article Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1693148-mobile-devile-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Phone Forensics

Forensics with UNIX. Prepaid Cell Phones

A prepaid cell phone is defined as a mobile phone which uses credit that has already been purchased in advance for the use of the mobile services (Virgin Mobile 2012).... In this case, the purchased credit caters for all the mobile phone services that are accessed by the handler of the phone.... hellip; forensics with UNIX.... This operating system is vastly used in the workstations, mobile devices and also in servers.... The mobile phones have also topped the chart in social interaction....
3 Pages (750 words) Essay

Amanda Knox Court Case

Found with stab wounds on her neck, some of Kercher's belongings including house keys, mobile phones, credit cards, and cash were also missing (Follain 12).... Name: Instructor: Course: Date: Amanda Knox Court Case Introduction British university exchange student Meredith Kercher, aged 21 and hailing from Surrey, England, was found murdered on November 1st, 2007, on her bedroom floor in Perugia, Italy....
11 Pages (2750 words) Essay

Electronic Crime and Computer Forensics

hat is computer forensics?... Computer forensics refers to a form of forensic science that involves legal analysis of evidence located in electronic devices or computers (Ghosh & Turinni 232).... Computer forensics helps to discover the actual cause of a computer system malfunction.... It refers to criminal activity that evokes the use of computers, internet, networks, and other electronic devices such as mobile phones (Ghosh & Turinni 32)....
1 Pages (250 words) Essay

The Operational Command Unit Department in the Metropolitan Police

I am also an exhibit sergeant for the Operational Command Unit Department in the Metropolitan Police.... I have worked for this department for last twelve years.... From this period, I obtained experience in participating in… As a crime scene investigator and exhibit officer I am charged with the task of performimg criminal investigations such as attending scenes, recovering, recording and packaging seized exhibits 12)....
4 Pages (1000 words) Essay

How Technology has Changed Our Lives

The use of mobile phones makes such connections possible.... However, before the invention of mobile phones, people relied on traditional landline phones.... Although they could connect people, the landline phones lacked the conveniences of mobile phones....
5 Pages (1250 words) Assignment

General Opinion about the iPhone: Is It Good or Bad

hellip; The general opinion about iPhone is that it includes the basic features and functions of a mobile phone.... is a line of smartphones that contains almost all functions of a camera phone, media player and acts as an internet device.... Besides, the touchscreen-enabled phone is user-friendly.... Besides, its battery backup is really good and most useful for those who have less time to charge their mobile phones....
1 Pages (250 words) Assignment

Designing Manufacturing Constraint in Mobile Phone

… The paper “Designing Manufacturing Constraint in mobile phone”  is an inspiring version of the essay on information technology.... The paper “Designing Manufacturing Constraint in mobile phone”  is an inspiring version of the essay on information technology.... The many questions that go through the minds of the user are the ability of the mobile phone to provide them with knowledge, attitude, behavior, and skills that enable them to succeed in school and their employment....
6 Pages (1500 words) Essay

Information Plan to Protect Information for Mobile Communications

With the help of other parties such as a VPN that will keep all the emails pertaining to the phone of the CEO the company's computers.... It is a cell phone system widely used by European countries and the rest of the world.... … The paper " Information Plan to Protect Information for mobile Communications" is a good example of a term paper on information technology.... The report is about the protection of information from MedDev Company with the help of software such as the Global System for mobile Communications (GSM)....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us