Ebooks

NIST Guidelines on Cell Phone Forensics pdf

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
NIST Guidelines on Cell Phone Forensics pdf

Anonymous and Direct Download 300GB+ free


Torrent info

Name:NIST Guidelines on Cell Phone Forensics pdf

Total Size: 1.45 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Online @ Movie4u

Last Updated: 2011-02-04 18:34:45 (Update Now)

Torrent added: 2008-07-08 06:34:11




Torrent Files List


NIST_CellPhoneForensics.pdf (Size: 1.45 MB) (Files: 1)

 NIST_CellPhoneForensics.pdf

1.45 MB
 

Announce URL:

Torrent description

PDF version of \"Guidelines on Cell Phone Forensics\" 104 Pages

Written by Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology

May 2007

-------------------------------------
TABLE OF CONTENTS
-------------------------------------

TABLE OF CONTENTS..................................................... V
LIST OF FIGURES .......................................................VII
LIST OF TABLES........................................................ VIII
EXECUTIVE SUMMARY..................................................... 1
1. INTRODUCTION....................................................... 3
1.1 AUTHORITY ........................................................ 3
1.2 PURPOSE AND SCOPE................................................. 3
1.3 AUDIENCE AND ASSUMPTIONS.......................................... 4
1.4 DOCUMENT STRUCTURE ............................................... 4
2. BACKGROUND......................................................... 6
2.1 CELL NETWORK CHARACTERISTICS ..................................... 6
2.2 MOBILE PHONE CHARACTERISTICS ..................................... 8
2.3 IDENTITY MODULE CHARACTERISTICS................................... 11
3. FORENSIC TOOLS..................................................... 13
3.1 (U)SIM TOOLS ..................................................... 17
3.2 HANDSET TOOLS .................................................... 18
3.3 INTEGRATED TOOLKITS............................................... 20
3.4 CAPABILITIES...................................................... 22
4. PROCEDURES AND PRINCIPLES.......................................... 24
4.1 ROLES AND RESPONSIBILITIES ....................................... 24
4.2 EVIDENTIAL PRINCIPLES ............................................ 25
4.3 PROCEDURAL MODELS................................................. 26
5. PRESERVATION....................................................... 29
5.1 SECURING AND EVALUATING THE SCENE................................. 31
5.2 DOCUMENTING THE SCENE ............................................ 32
5.3 COLLECTING THE EVIDENCE........................................... 33
5.4 PACKAGING, TRANSPORTING, AND STORING EVIDENCE..................... 36
6. ACQUISITION ....................................................... 38
6.1 DEVICE IDENTIFICATION ............................................ 39
6.2 TOOL SELECTION AND EXPECTATIONS................................... 41
6.3 MEMORY CONSIDERATIONS............................................. 42
6.4 UNOBSTRUCTED DEVICES.............................................. 44
6.5 OBSTRUCTED DEVICES................................................ 48
6.6 TANGENTIAL EQUIPMENT ............................................. 53
7. EXAMINATION AND ANALYSIS........................................... 56
7.1 POTENTIAL EVIDENCE................................................ 56
7.2 APPLYING TOOLS ................................................... 59
7.3 CALL AND SUBSCRIBER RECORDS ...................................... 61
8. REPORTING ......................................................... 65
9. REFERENCES ........................................................ 68
APPENDIX A. ACRONYMS.................................................. 74
APPENDIX B. GLOSSARY.................................................. 77
APPENDIX C. GENERIC ACQUISITION OVERVIEW.............................. 82
C.1 CONNECTION IDENTIFICATION......................................... 82
C.2 DEVICE IDENTIFICATION ............................................ 82
C.3 DATA SELECTION ................................................... 83
C.4 ACQUISITION....................................................... 84
C.5 PHONEBOOK ENTRIES................................................. 85
C.6 CALL LOG ENTRIES ................................................. 86
C.7 MESSAGE ENTRIES .................................................. 87
C.8 CALENDAR ENTRIES.................................................. 88
C.9 (U)SIM DATA....................................................... 89
C.10 PICTURE ENTRIES.................................................. 90
C.11 SEARCHING ....................................................... 91
C.12 REPORTING........................................................ 92
APPENDIX D. STANDARDIZED CALL RECORDS................................. 93
APPENDIX E. ONLINE RESOURCES FOR MOBILE DEVICE FORENSICS ............. 95

related torrents

Torrent name

health leech seeds Size
 


comments (0)

Main Menu