In WW2, what technological invention allowed for fast off-shore communications between ships and shore
radios
When sending data across a network, the data is broken down in small portions, also called packet switching. With which networks (1-5G) does this method correspond with
4G and 5G
Analog is the traditional method of modulating radio signals so they can carry information. What was analog replaced by
digital networks
what standard is crucial for analyzing data like call logs and text message, as well as extracting info from the sim card
GSM
what about 1G networks makes communication limited
1G can only communicate within the cellular system
when using a device, the radio is the wireless transceiver part that connects with a cell tower. Why is it critical in a forensic investigations
the cell towers the device was connected too can be tracked and located
during the evolution from 2G to 3G, the density of cell tower installations increased and the radio size in the device decreased. What did that mean for the size of cell phones
cell phones got smaller
a ________ system is a network of transceivers placed a short distance apart and strategically spaced so the power transmitters can reach the phones
cellular
CDMA uses a unique code to distinguish different users on the same frequency band. It is handset- specific rather than SIM card specific. Why is that distinction important
the subscribers info is stored in the device itself rather than a sim card that could be switched
circuit and packet switching are two methods used to connect multiple communicating devices with one another. How are they different from each other
circuit switching is connection oriented
packet switching is connetionless
why is it important that the ICCID is a number printed on and sometimes embedded in the card and is an issuer identification number
the examiner can identify the phone, but they are only seeing the SIM card, not the device
in the 1990s, 2G cellular networks emerged with two standards: GSM and CDMA. What do these stand for
GSM: global system for mobile communications
CDMA: code division multiple access
Why is packet switching an efficient way to share network resources
packet switching allows devices to share resources without needing a dedicated circuit, and prevents congestion
what is the hardware that makes the device work
chipset
what forensics challenges face investigators regarding 1G and 2G devices
Typically information that has been deleted is lost forever, some have operating systems, they still exist
why should all device be kept in a faraday box until examination
the faraday box will prevent changes from being made to the device, remotely
Motorola handheld mobile phone debuted in 1973. It was analog, so what type of G was it?
1G
what is the difference between a physical and a logical extraction when investigating a device
physical: bit-by-bit copy of the file system, including deleted date
logical: snapshot of the file system, showing only what the file system wants the user to see
How are SIM cards (subscriber identification module) different than other forms of digital storage
the SIM cards stores all of the subscribers information and can be switched between phones
what is the single most difficult issue plaguing mobile device forensics
nearly impossible to stay current with the availible mobile device mobiles
circuit and packet switching are two methods used to connect multiple communicating devices with one another. How are they different from each other
circuit switching is connection oriented
packet switching is connetionless
How does native IP 4G networks differ from 3G networks
4G access the internet directly
- a smartphone is now able to use any communication methods previously restricted to just PCs
what are the three steps to the data extraction step of digital forensic analysis
logical acquisition to create a copy of the devices data
eSIM chip is removed
digital forensic tools to analyze the data
what is the main difference between a SIM and eSIM card
SIM is a physical card that requires manual insertion
eSIM are activated digitally and cannot be removed when the device is stolen
what are the two steps for the initial evidence preservation step of digital forensic analysis
isolate the device in a faraday device
keep the device powered on if possible during data extraction