I Section A: 24 Marks [CASESTUDY]
The Last Argument
She was married just a few months before her death. Her husband took her life and then his own. Her phone
was triaged through a forensic tool commonly used by law enforcement. The initial investigation located two
short recordings that documented arguments they had been having. She had recorded them without his
knowledge, just days prior to their bodies being discovered. After the phone was triaged, the case agent
reviewed the case report (media disk). He called the examiner back a few days later. "I believe there's another
large file on her phone that recorded the events that took place at her death. Can you try to get it to play?"
The file had initially been "looked over" and dismissed as a corrupt, unplayable sound file. Per the request of
the case agent, the file was viewed with additional scrutiny. Using a hex editor, it was found that the file
header and footer were missing, but the case agent may be correct; based on the size of the file, and the time
and date of its creation, she probably did record her own death.
Question 1
If we define Mobile Forensics as the process of (a) recovering mobile-related (b) data through a forensic
examination using (c) validated means. Considering the highlighted and underlined keywords in this definition
(a), (b) and (c),
(a) Explain with reference to the given study what (i) recovering and (ii) data entails.
{4 marks]
(b) Explain the four ways in which data that is acquired off mobile devices from the case study, will be
validated.
[Bmarks]
Question 2
In the context of the given case study, (a) Give and explain any strengths and (b) any two weaknesses for
the two types of data available for this case?
[12 Marks]
I Section B: 26 Marks
Question 1
(a) Base stations are key components in Mobile Forensics. Explain why that is the case, giving an example
where necessary.
{3 Marks]
(b) What would you say is the primary function of a SIM card?
[2 Marks]
(c) In addition to a SIM, most cellphones have a (n)? (for unique identification)
[1 Mark]
Question 2
(a) Those involved in system administration should know about Mobile Forensics. Give and explain any
three reasons.
[6 Marks]
Page 2