Time
5 hours 56 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hey, everyone, welcome back to the course. So the last video we talked about the different steps we need to take before a mobile investigation,
00:08
some different mobile threats as well. Some loss.
00:13
So one of the main things we need to be aware of in a mobile investigation, uh, is it case Riley vs The State of California
00:22
is a Supreme Court case. And so basically, what a date is it required a search warrants by law enforcement officers before they can look through mobile device. So
00:32
and the of course, there's always ways to circumvent that. But for the most part, that's kind of the process. So we always want to make sure we have a search warrant before we start doing anything on a mobile device. So just keep that in mind for your exam.
00:44
The other aspect that it entailed was for any of you know, once they once you do an investigation, anything that's not related to the investigation on that mobile device needs to be redacted from the public record. On the main reason being because a lot of sensitive information is found on the mobile devices
01:00
so different types of mobile device threats some of the most common ones that you that you may or may not see tested on the exam Gonna be things like malware. So, for example, your spyware smashing attacks or a CZ, you know, this is a form of social engineering attack. So basically sending that SMS message and saying, Hey, you know you,
01:19
you know, get a you know, a $50 best buy discount today and click this link.
01:23
Um, and then you click the link, and now you got spyware on your on your phone. Right? So, uh, so never click on a link in a message on your phone text message. Um, some people do it. Just don't ever do that
01:34
Data losses we mentioned. That's kind of the top mobile threats to keep that in mind for your exam as well as different Weber Network attacks.
01:45
We have different AP eyes in mobile phone. So, for example, you just want to know each of these of your communication a p I your gooey a p i and then your phone a p I.
01:56
So the communication ap I just They're basically, you know, facility communication, right? So it simplifies the process of interacting with different Web service is, you know, SMS messaging or email messaging as well, eh? So again, just remember that communication A p I is there to help facility for settle a suit me facilitate communication,
02:16
argue e a p I. So this one ah creates menus and some menus in designing applications is also an interface for developers to build other plug ins.
02:27
And then we have our phone a p I. This one's gonna be things like our application layer. It's, you know, also, you know, as the name implies, responsible for making calls, receiving calls or SMS messaging
02:38
the SIM card or subscriber identity model. Excuse me, Module.
02:45
This one is, as I mentioned before, contains things like your contact list, right? So your address book your messages different kind stamps, last dialed numbers, etcetera, etcetera. So a very valuable thing to obtain is a forensic investigator.
02:58
And then we have other cellular components of things like our mobile switching center, you know, so that processes, processes, calls and messages within a network and then rots in between, you know, things like your landline and wireless networks,
03:10
the base transceiver station, or VTs, that facilitates the user with wireless communication between the mobile phone and a network.
03:20
The base station controller of BSC. This one basically manages the transceivers equipment and performs channel assignment. So it's part of the GSM architecture. You know that controls one or more based transceiver stations on, and also the cell sites radio signals on that way. All that reduces the load on the switch
03:38
the base station sub system. So that one is one of the major sections of ah, a cellular network. Eso controls the base station controller, obviously, and then
03:49
it also is used to ah, handle traffic network switching, et cetera, et cetera,
03:54
the home location register or H L R s. Oh, that's gonna be the database.
04:00
Ah, And so basically it's a central repositories system for the subscriber data and service information. So again it's storing it in the database.
04:08
And then we have our visitor location register or V L. R s. Oh, that's gonna be the database that's using conduction. Excuse me. In conjunction with the HL are for mobile phones that are roaming outside of their service area,
04:20
so it contains the current location of the mobile user. A swell asi temporary mobile subscriber identities or the T. M s. I.
04:30
So in this video we talked about different types of mobile threats, different laws and then some of the components of cellular cellular
04:38
systems.
04:39
And the next video we're gonna talk about I m e I and also things like E S N.

Up Next

Computer Hacking and Forensics

Love the idea of digital forensics investigation? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor