INTRODUCTION TO MOBILE DEVICE INVESTIGATIONS
EPO #1: Determine types of technology and the unique identifiers associated with a
mobile device. - · IMEI - International mobile equipment ID. Perm 15-17 digit #. Is a
permanent number.
· CDMA - MEID = Mobile Equipment ID. Can lookup make/model
· SIM - Subscriber Identity Module. Authentication of device to cell network. ICCID is the
serial number for your SIM card.
· MSISDN - Mobile Directory Number AND MIN - Mobile ID Number is another name for
a phone number
· The Call Detail Records (CDR) needs to know what tower the cellphone is connected
to. Provides list of calls or other types of transmissions
INTRODUCTION TO MOBILE DEVICE INVESTIGATIONS
EPO #2: Use forensic hardware and software tools to extract and analyze digital data
from a seized mobile device. - · Different types of extractions include manual, logical,
and physical
o Manual: must take photographs of all screens
o Logical: usually using Cellebrite. Utilizes the built-in backup feature found in the
device's operating system (OS).
o Physical: Provides access to ALL data, basically a replica of the whole phone, usually
requires forensic software
FIRST RESPONDERS TO DIGITAL EVIDENCE
EPO #1: Define the uses and roles of electronic devices in criminal activity. - · Three
Major Rolls
o Computers as a target of an illegal scheme: system intrusion, hacking, DDOS attacks,
or ransomware to name a few.
o Computers used as the instrument or tool to facilitate criminal activity: ex solicitation of
minors, electronic stalking, credit card scams, tax or benefit fraud, ID theft
o Computers and other electronic devices as repositories of evidence and other
information: may contain photos, PII, or certain types of software
FIRST RESPONDERS TO DIGITAL EVIDENCE
EPO #2: Identify electronic devices that may be or may contain evidence. - · Permanent
files as well as temporary internet files. Search terms from web browsers
· Phone SIM cards
· Removable media - optical CDs, DVDs, and Blu-Ray or external drives, flash memory
cards, or USB drives.
· Cloud computing can contain evidence and needs an additional warrant.
FIRST RESPONDERS TO DIGITAL EVIDENCE
, EPO #3: Describe how electronic evidence may be altered or destroyed. - · The "two
enemies" are physical or external damage and software or internal alteration.
· All media can be altered through brute force, extreme temps, water/ condensation, or
fire. Seize it anyway, the data may still be recoverable
FIRST RESPONDERS TO DIGITAL EVIDENCE
EPO #4: Identify non-electronic items that may be important in the investigation of an
electronic crime. - · Hardware: may contain DNA evidence or bodily fluids
· Printed documents or reports
· Scraps of paper with codes or passwords
· Indicators of ownership like receipts, mail, manuals
FIRST RESPONDERS TO DIGITAL EVIDENCE
EPO #5: Identify the proper procedures in collecting, preserving, and transporting
computers and electronic items seized as evidence. - · Use Faraday bags or wrap in foil
if none are available.
· Secure crime scene both physically and electronically. Sever network connectivity.
Unplug desktop.
· Conduct electronics sweep.
· Leave phone how you found it, on or off. Isolate phones in Faraday bag.
FIRST RESPONDERS TO DIGITAL EVIDENCE
EPO #6: Identify the proper procedures for RAM Capture and uses for recovered data. -
· Random Access Memory (RAM) - is the storage area of everything the computer
processes. Capture it especially if you cannot remove the actual device or cannot get
the password.
- enables investigators and examiners to do a full memory analysis and access data
ELECTRONIC SURVEILLANCE TECHNIQUES
EPO #1: Identify the various types of Electronic Surveillance Equipment, technologies,
and their characteristics used in investigations and operations. - · Audio recordings:
modern devices are small, and battery operated. May be a cellphone app, key fob, or
small hidden device.
· Tracking devices: GPS or RF tracking devices make surveillance easier, but US vs.
Jones 2012 determined that a search warrant is needed.
· Video surveillance: moving or video record systems, or CCTV (fixed systems)
including "traffic camera." Some are sensor activated. Can also track using WiFi
enabled systems like PSP or smart devices.
ELECTRONIC SURVEILLANCE TECHNIQUES
EPO #2: Identify considerations for using Electronic Surveillance Equipment as well as
applicable protocols to conduct technical operations or investigations. - · RF/Beacon:
good for areas with no cellular coverage. Older system.
· GPS/Cellular
· Important to consider battery life, user knowledge, establish duress signals,
· Follow agency standards and AUSA review guidance for authorization
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller VasilyKichigin. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.48. You're not tied to anything after your purchase.