Podcast
Questions and Answers
Early mobile phone systems were followed by digital ___________ networks.
Early mobile phone systems were followed by digital ___________ networks.
2G
The architectural functionality that distinguishes 2G from 3G is that 2G systems were circuit switched and 3G systems are packet switched.
The architectural functionality that distinguishes 2G from 3G is that 2G systems were circuit switched and 3G systems are packet switched.
True
One of the benefits of packet switching is the ability to connect more readily to the Internet.
One of the benefits of packet switching is the ability to connect more readily to the Internet.
True
It's (easy, ______) to stay current with the available mobile device models.
It's (easy, ______) to stay current with the available mobile device models.
Signup and view all the answers
Apple has taken major steps to standardize the development of apps for its ___________ and ___________.
Apple has taken major steps to standardize the development of apps for its ___________ and ___________.
Signup and view all the answers
Some devices and many apps report the ___________ of the device.
Some devices and many apps report the ___________ of the device.
Signup and view all the answers
Probably the most useful source of information available to an investigator is ___________.
Probably the most useful source of information available to an investigator is ___________.
Signup and view all the answers
An examiner should decide whether to obtain a(n) ___________ extraction or ___________ extraction or both of a mobile device.
An examiner should decide whether to obtain a(n) ___________ extraction or ___________ extraction or both of a mobile device.
Signup and view all the answers
If the examiner has a device that supports physical extraction, that is the way to image the device. Logical extractions are useful only when the physical option is not available because of the device itself.
If the examiner has a device that supports physical extraction, that is the way to image the device. Logical extractions are useful only when the physical option is not available because of the device itself.
Signup and view all the answers
Logical extractions are bit-by-bit copies of the file system, including deleted data.
Logical extractions are bit-by-bit copies of the file system, including deleted data.
Signup and view all the answers
Examiners make it a practice to run an extracted image (once, ______).
Examiners make it a practice to run an extracted image (once, ______).
Signup and view all the answers
The ___________ extraction is fairly fast, and one may want to examine it for obvious evidence while a tool is making a physical image of the target.
The ___________ extraction is fairly fast, and one may want to examine it for obvious evidence while a tool is making a physical image of the target.
Signup and view all the answers
Just like computers, the ___________ defines the basic components of the mobile device.
Just like computers, the ___________ defines the basic components of the mobile device.
Signup and view all the answers
___________ are storage expansion cards that many mobile devices can accept.
___________ are storage expansion cards that many mobile devices can accept.
Signup and view all the answers
SD cards are nonvolatile, meaning that even if the power is turned off on the device, you won't lose your music or photos.
SD cards are nonvolatile, meaning that even if the power is turned off on the device, you won't lose your music or photos.
Signup and view all the answers
In many cases a user can keep his or her subscriber information when changing mobile phones by simply switching the ___________ card to the new phone.
In many cases a user can keep his or her subscriber information when changing mobile phones by simply switching the ___________ card to the new phone.
Signup and view all the answers
It often is desirable to ___________ the SIM in much the same way as one would take a physical image of the mobile device or a computer in order to retain a copy for evidentiary purposes.
It often is desirable to ___________ the SIM in much the same way as one would take a physical image of the mobile device or a computer in order to retain a copy for evidentiary purposes.
Signup and view all the answers
It's always possible to recover deleted file items such as e-mails, texts, and photos from a mobile device.
It's always possible to recover deleted file items such as e-mails, texts, and photos from a mobile device.
Signup and view all the answers
___________ describes the events and concomitant evidence that make up the events of the crime.
___________ describes the events and concomitant evidence that make up the events of the crime.
Signup and view all the answers
___________ chains of evidence show events in the order in time in which they occurred.
___________ chains of evidence show events in the order in time in which they occurred.
Signup and view all the answers
___________ chains of evidence describe the events of a crime in terms of cause and effect.
___________ chains of evidence describe the events of a crime in terms of cause and effect.
Signup and view all the answers
___________ crime assessment attempts to tie elements of a crime together into a single crime scene and use the timelines to build a picture and describe the events and supporting evidence of the crime.
___________ crime assessment attempts to tie elements of a crime together into a single crime scene and use the timelines to build a picture and describe the events and supporting evidence of the crime.
Signup and view all the answers
It is likely that the mobile device is extremely accurate as a yardstick for measuring when events happen, as the device may be synchronized to a(n) ___________ clock.
It is likely that the mobile device is extremely accurate as a yardstick for measuring when events happen, as the device may be synchronized to a(n) ___________ clock.
Signup and view all the answers
When a mobile device is set to use, it will recognize any ___________ network in its range.
When a mobile device is set to use, it will recognize any ___________ network in its range.
Signup and view all the answers
Mobile device forensic analysis can provide an overlay to physical evidence and timelines, as well as computer forensic timelines, to give a clearer picture of the events preceding and following a crime event.
Mobile device forensic analysis can provide an overlay to physical evidence and timelines, as well as computer forensic timelines, to give a clearer picture of the events preceding and following a crime event.
Signup and view all the answers
Study Notes
Mobile Devices Overview
- 2G marks the transition from early mobile systems to digital networks.
- Circuit switched systems define 2G, while packet switched systems characterize 3G.
Packet Switching
- Packet switching enhances Internet connectivity, which is a primary advantage.
Device Models
- Staying updated with mobile device models is challenging due to rapid advancements.
Apple Ecosystem
- Apple standardizes app development for its iPhone and iPad, ensuring compatibility and quality.
Tracking and Geolocation
- Many devices and applications utilize geolocation, facilitating tracking of user movements.
Investigative Resources
- Web searching is an essential tool for investigators utilizing mobile devices.
Data Extraction Techniques
- An examiner can choose between physical or logical data extraction from mobile devices, or both.
- Physical extraction captures everything, including deleted data, while logical extraction is a quicker process.
Evidence Handling
- Extracted images are typically run twice to ensure data integrity.
- Logical extractions allow for preliminary evidence examination during physical imaging processes.
Mobile Device Architecture
- Mobile device architecture comprises the essential components and functions, analogous to computers.
Storage Options
- SD cards offer expandable storage for many mobile devices and retain data even when powered off.
Subscriber Information
- SIM cards allow users to retain subscriber information when switching devices, offering convenience.
Evidence Cloning
- Cloning a SIM card preserves subscriber data for forensic purposes similarly to data imaging.
Data Recovery Limitations
- Deleted items like emails, texts, and photos cannot always be recovered from mobile devices.
Chain of Evidence
- The chain of evidence details the sequence of events and related evidence throughout a crime.
Temporal Evidence
- Temporal chains of evidence illustrate the chronological order of events in a crime scenario.
Causal Evidence
- Causal chains analyze events by establishing relationships of cause and effect among them.
Hybrid Crime Assessment
- Hybrid assessments consolidate crime elements into a single location and timeline to create a comprehensive view.
Synchronization and Accuracy
- Mobile devices are accurate time indicators, often synchronized with a network clock.
Connectivity Features
- Mobile devices can detect and connect to available Wi-Fi networks in proximity.
Forensic Analysis
- Mobile device forensic analysis enriches physical evidence and timelines, enhancing the understanding of crime events.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on mobile device terminology and technology from Chapter 20 of Criminalistics (12th Edition). This quiz covers concepts like 2G and the differences between 2G and 3G networks. Challenge yourself with true or false questions related to mobile communications.