GSM Phone Security Analytical Essay by Nicky

Looks at the capture of cell phone data for forensic use.
# 145465 | 5,655 words | 12 sources | APA | 2010 | US


$19.95 Buy and instantly download this paper now

Description:

This paper demonstrates the recovery of cell phone data and examines the GSM phone security system and its impact on computer forensics. Next, the author argues that the current GSM phone security relates not only to the intrinsic phone security system but also upon a number of external factors including the ways in which the investigator conducts the inquiry. The paper discuses algorithms, encryptions and SIM cards as they relate to computer forensics.

Table of Contents:
Introduction
Capturing Criminal Cell Phone Data
GSM Background Check
Algorithms Encryptions
SIM Cards
SIM File System Organization
Securing "Inside" Information
Evidence Recoverable from a SIM
A Different Process
Handling Captured Cell Phones
Faraday Bags
GSM Security System Forensic SIM Tool's Primary Objective

From the Paper:

"To complement GSM security, David Hulton and Steve Muller (2009), director of applications for the high-performance computing company Pico, and researcher for mobile security firm CellCrypt, demonstrated their new techniques to crack the encryption used to prevent eavesdropping on GSM cellular signals in a presentation February 21, 2008 at the Black Hat Security Conference in Washington, D.C. Hulton's and Muller's technique reportedly permits an eavesdropper to record a cell phone conversation on GSM networks miles from the scene and then decode the conversation within an hour or so."

Sample of Sources Used:

  • Anonymous. (1999). Forensic toolkit developed. Signal. Armed Forces Communications and Electronics Association. Retrieved February 10, 2009 from HighBeam Research: http://www.highbeam.com/doc/1P3-39473768.html.
  • Black, Paul E, (2007, January 10). "algorithm", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. Retrieved February 10, 2009 from http://www.itl.nist.gov/div897/sqg/dads/HTML/algorithm.html.
  • Cell Phone Forensics. (N.d.). Chief Security Officers. Retrieved February 09, 2009 from http://www.chiefsecurityofficers.com/index.php?option=com_content&view=article id=69&Itemid=80.
  • encryption. (2003-2009). SearchSecurity.com Definitions. Tech Target. Retrieved February 10, 2009 from http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html.
  • Faraday Bags. (2008). FTS Packaging. Forensic Telecommunications Services Ltd. Retrieved February 09, 2009 from http://www.forensicts.co.uk/fts-packaging.asp.

Cite this Analytical Essay:

APA Format

GSM Phone Security (2010, November 11) Retrieved February 22, 2024, from https://www.academon.com/analytical-essay/gsm-phone-security-145465/

MLA Format

"GSM Phone Security" 11 November 2010. Web. 22 February. 2024. <https://www.academon.com/analytical-essay/gsm-phone-security-145465/>

Comments