FSCI 3400- Exam2

0.0(0)
Studied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:18 PM on 3/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

81 Terms

1
New cards

What Is Glass

Glass is a hard, brittle, amorphous substance composed primarily of silicon oxides derived from sand, combined with various metal oxides to achieve desired properties.

2
New cards

Glass Key Additives

Sodium carbonate (soda) — lowers the melting point of sand, making glass production more energy-efficient

Calcium carbonate (lime) — prevents glass from dissolving in water and increases chemical durability

Comprises approximately 90% of manufactured glass products

3
New cards

Glass Composition

Silicon Dioxide (SiO₂) Forms the glass network structure

Sodium Oxide (Na₂O) Reduces melting temperature

Calcium Oxide (CaO) Provides stability and durability

Other Metal Oxides Modifies color and properties

4
New cards

Physical Properties of Glass

Characteristics that can be observed or measured without changing the substance's identity.

Density

• Refractive index

• Color and transparency

• Hardness

• Fracture patterns

physical properties are typically more useful for comparison and identification because they can

be measured non-destructively.

5
New cards

Chemical Properties

Characteristics that describe how a substance interacts with other substances

• Elemental composition

• Chemical reactivity

• Resistance to corrosion

• Thermal stability

6
New cards

Glass Examination

Density: Mass per unit volume — highly discriminating property that varies with glass composition

Refractive Index: Measure of how light bends when passing through glass — precise and reliable for comparisons

Surface Characteristics: Texture, striations, and manufacturing marks that may be unique to a source

7
New cards

Density

Density is defined as mass per unit volume, typically expressed as grams per cubic centimeter (g/cm³) for glass.

Density is an intensive property — it remains constant regardless of sample size, making it ideal for forensic comparisons.

<p>Density is defined as mass per unit volume, typically expressed as grams per cubic centimeter (g/cm³) for glass.</p><p>Density is an intensive property — it remains constant regardless of sample size, making it ideal for forensic comparisons.</p>
8
New cards

Flotation Method-Principle of Operation

The flotation method exploits Archimedes' principle to determine density by observing whether a glass fragment floats (Glass density is greater than liquid density), sinks, or remains suspended in liquids of known density.

9
New cards

Measuring Density: Water Displacement Method- A Simple Procedure for Determining the Density of a Solid

  1. Measure Mass

  2. Measure Volume

  3. Calculate Density obtain density in g/cm³

<ol><li><p>Measure Mass</p></li><li><p>Measure Volume</p></li><li><p>Calculate Density obtain density in g/cm³</p></li></ol><p></p>
10
New cards

Refraction

Refraction is the bending of light waves as they pass from one transparent medium into another of different optical density. This phenomenon occurs because light travels at different speeds through different materials.

11
New cards

Reflection Key Concepts

• Light travels fastest in a vacuum

• Light slows down when entering denser media

• The degree of bending depends on the difference in optical densities

• Refraction only occurs when light strikes the interface at an angle

12
New cards

Reflection Forensic Significance

Refraction properties are highly specific to glass composition, making them invaluable for distinguishing between different glass sources in forensic investigations.

13
New cards

Understanding Light Behavior and Critical Angle

When light passes from air into glass at an angle, it bends toward the normal (an imaginary line perpendicular to the surface). When exiting glass back into air, light bends away from the normal.

Critical Angle: At steep angles, light may be totally reflected rather than refracted — this is called total internal reflection and is the principle behind fiber optics.

14
New cards

Refraction vs. Refractive Index

Quantifying Refraction

While refraction is the phenomenon of light bending, the refractive index is the numerical value that quantifies this behavior for a specific material.

The refractive index (n) represents the ratio of the speed of light in a vacuum to its speed in the material. Higher refractive indices indicate that light travels more slowly through the material and bends more dramatically.

Temperature Dependence and Wavelength Dependence

<p>While refraction is the phenomenon of light bending, the refractive index is the numerical value that quantifies this behavior for a specific material.</p><p>The refractive index (n) represents the ratio of the speed of light in a vacuum to its speed in the material. <strong>Higher</strong> refractive indices indicate that light travels <strong>more slowly</strong> through the material and <strong>bends more dramatically.</strong></p><p>Temperature Dependence and Wavelength Dependence </p>
15
New cards

Glass Immersion Method

The immersion method is the primary technique for determining the refractive index of glass fragments in forensic laboratories. This method involves immersing glass particles in liquids with known refractive indices.

16
New cards

Glass Immersion Method Process

Sample Preparation: Place glass fragment in a specialized immersion liquid on a microscope slide

Temperature Control: Heat the slide gradually while observing under a microscope with specialized lighting

Match Point Detection: When the glass "disappears" (Becke line vanishes), its refractive index matches the liquid

Index Determination: Record the temperature and calculate the glass refractive index using calibration data

17
New cards

Analyzing Cracks-Fracture Pattern Analysis

When glass breaks, it creates distinctive fracture patterns that reveal critical information about the direction of force, sequence of impacts, and sometimes even the type of object used to break it.

Radial Cracks: Fractures extending outward from the point of impact like spokes on a wheel

Concentric Cracks: Circular fractures connecting radial cracks around the impact point

Stress Marks: Microscopic surface features revealing the direction of crack propagation

18
New cards

Formation Sequence

(a) Radial cracks are formed first, commencing on the side of the glass opposite to the destructive force

(b) Concentric cracks occur afterward, starting on the same side as the force

19
New cards

The 3R Rule

Radial cracks form on the Reverse side

Concentric cracks form on the Contact side (same)

20
New cards

Analyzing Cracks-Determining Impact Sequence

The sequence of impacts (when there are multiple penetrations of the glass) can be determined because a fracture always terminates at an existing line of fracture.

Critical Principle: When glass sustains multiple impacts, subsequent fractures cannot cross pre-existing cracks.

21
New cards

Glass Fragments

Collection: Glass fragments are carefully collected from suspects' clothing, vehicles, or crime scenes

Documentation: Each fragment's location, appearance, and context is meticulously recorded

Analysis: Physical and optical properties are measured and compared to known samples

Comparison: Results determine if questioned fragments match a known source

22
New cards

Collection of Glass - Evidence Collection Procedures

Meticulous collection of glass evidence is critical to maintaining chain of custody and ensuring the integrity of forensic analysis.

Clothing Evidence: Carefully collect clothing from suspects and wrap separately in clean paper to prevent glass transfer

Vehicle Examination: Vacuum carpets and seats; examine tire treads and undercarriage for glass fragments

Crime Scene Glass: Collect representative samples from all broken glass sources for comparison analysis

Packaging: Store glass fragments in rigid containers with secure lids to prevent loss or cross-contamination

23
New cards

Collection of Glass - Best Practices and Considerations

  1. Document Location: Photograph and diagram the exact position of glass fragments before collection

  2. Use Proper Tools : Employ clean tweezers, tape lifts, or vacuum filters to collect microscopic particles

  3. Prevent Contamination: Change gloves between samples and use separate containers for each source

  4. Collect Reference Samples: Always obtain known samples from the suspected source for comparison

  5. Maintain Chain of Custody: Label all evidence with case number, date, time, location, and collector's initials

24
New cards

Hairs and Fibers

Hair and fiber evidence represents one of the most common types of trace evidence encountered at crime scenes.

25
New cards

Morphology of Hair

Hair is a complex biological structure composed of three distinct layers, each with unique characteristics that can be observed under microscopic examination.

The cuticle forms a protective outer shell, while the cortex contains the structural proteins and pigments that give hair its strength and color.

<p>Hair is a complex biological structure composed of three distinct layers, each with unique characteristics that can be observed under microscopic examination.</p><p>The cuticle forms a protective outer shell, while the cortex contains the structural proteins and pigments that give hair its strength and color.</p>
26
New cards

Cuticle: The Protective Outer Layer

The cuticle is the outermost covering of the hair shaft, consisting of overlapping scales that point toward the distal end of the hair.

Forensic Significance: Cuticle scale patterns vary significantly between species

Examination Methods: Scale patterns are best observed by making a cast of the hair surface or by electron microscopy

27
New cards

Cuticle scale patterns types-Coronal Scale Pattern

Coronal Scale Pattern: "Crown-like" appearance with distinctive overlapping structure. Overlapping and encircling scales create a stacked appearance

resembling a crown.

This scale pattern is a diagnostic feature that can immediately exclude human origin when observed during microscopic examination.

<p>Coronal Scale Pattern: "Crown-like" appearance with distinctive overlapping structure. Overlapping and encircling scales create a stacked appearance</p><p>resembling a crown. </p><p>This scale pattern is a diagnostic feature that can immediately exclude human origin when observed during microscopic examination.</p>
28
New cards

Cuticle scale patterns types- Spinous Scale pattern

"Petal-like" Scales: Generally triangular in shape, resembling petals or thorns protruding outward.

Distinctive Projection: Scales protrude outward from the hair shaft creating a unique three-dimensional structure

Spinous scale patterns are never found in human hair.

<p>"Petal-like" Scales: Generally triangular in shape, resembling petals or thorns protruding outward. </p><p>Distinctive Projection: Scales protrude outward from the hair shaft creating a unique three-dimensional structure</p><p>Spinous scale patterns are never found in human hair. </p>
29
New cards

Cuticle scale patterns types- Imbricate Scale Pattern

"Flattened" Configuration. Very narrow, flattened scales that overlap in a shingle-like pattern along the hair shaft

Partial Encirclement. Unlike coronal patterns, imbricate scales do not completely encircle the hair shaft, creating a distinctive asymmetric appearance

Human Hair Indicator, Very common to human hair and serves as a primary identifying characteristic in forensic examinations

<p>"Flattened" Configuration. Very narrow, flattened scales that overlap in a shingle-like pattern along the hair shaft</p><p>Partial Encirclement. Unlike coronal patterns, imbricate scales do not completely encircle the hair shaft, creating a distinctive asymmetric appearance</p><p>Human Hair Indicator, <strong>Very common to human hair</strong> and serves as a primary identifying characteristic in forensic examinations</p>
30
New cards

Cortex: The Main Body

The cortex forms the main body of the hair shaft, lying between the cuticle and medulla.

This layer contains pigment granules (melanin) that determine hair color, as well as cortical fusi and ovoid bodies that can be observed microscopically. The cortex provides the hair with its strength, texture, and color, making it crucial for forensic comparisons.

31
New cards

Medulla: The Central Core. Medullary Index; Human Hair and Animal Hair

Medullary Index: Measures the diameter of the medulla relative to the diameter of the hair shaft, providing a key species differentiation tool.

Human Hair: The medulla generally occupies less than one-third the diameter of the shaft.

Animal Hair: The medulla typically occupies one-half or greater of the shaft diameter.

The medulla may be continuous, interrupted, fragmented, or absent entirely.

32
New cards

Medulla Patterns

Continuous: An uninterrupted column running the length of the hair shaft

Interrupted: Regular intervals of presence and absence along the shaft

Fragmented: Irregular, sporadic presence with inconsistent patterns

Absent: No visible medulla present in the hair shaft

The medullary index and pattern type together provide powerful discriminating characteristics.

33
New cards

Root Structure and Growth

Root characteristics can indicate the manner of hair removal and the growth phase at the time of loss.

Growth Phases: Hair grows in cyclical phases—anagen (active growth), catagen (transitional), and telogen (resting)—each producing distinctive root appearances.

Forensic Value: Root structure helps determine if hair was forcibly removed, fell out naturally, or was cut, providing important context for crime scene analysis.

34
New cards

Hair Growth Phases

Anagen Phase: Active growth phase lasting 2-7 years. Root shows an elongated follicular tag with attached tissue. Hair is firmly anchored in the follicle.

Catagen Phase: Transitional phase lasting 2-3 weeks. Growth stops and follicle shrinks. Root becomes club-shaped as follicle detaches.

Telogen Phase: Resting phase lasting 2-4 months. Hair easily detaches naturally. Root appears as a bulbous club with no tissue attached.

Identifying the growth phase helps forensic scientists determine whether hair was forcibly removed or shed naturally, which can have significant implications for case reconstruction.

35
New cards

Comparing Hair Strands

The comparison involves assessing both class characteristics (features common to a group) and individual characteristics (unique features).

Examiners must consider the full range of morphological features including color, length, diameter, cuticle patterns, cortex characteristics, medulla type, and root structure.

36
New cards

Hair Comparison Methodology

Macroscopic Examination: Initial visual assessment of color, length, curl, and overall appearance to identify obvious differences or similarities.

Microscopic Analysis: Detailed comparison of cuticle scales, cortex pigmentation, medulla patterns, and other morphological features using comparison microscopy.

Documentation: Systematic recording of observations, measurements, and photomicrographs to support conclusions and enable peer review.

Conclusion: Determination of whether questioned and known samples could have originated from the same source based on comparison results.

37
New cards

Hair Comparison Methodology Limitation

Microscopic hair comparison cannot positively identify a hair as originating from a specific individual. It can only determine that hairs are consistent with originating from the same source. DNA analysis is required for individualization.

38
New cards

Hair Comparison Methodology Questions

Is the hair of human or animal origin?

From what part of the body does the hair originate?

What is the racial ancestry of the individual?

39
New cards

Determining Body Area of Origin

Head Hair: Generally longest with fairly uniform diameter throughout shaft. Medulla may be continuous, interrupted, or absent. Cut ends are common.

Facial Hair: Coarse and wiry with triangular cross-section. Often shows evidence of cutting or shaving. Medulla usually continuous.

Body Hair: Generally shorter with arc-like shaft. Diameter varies considerably along length with tapered tips. Fine to coarse texture.

Pubic Hair: Coarse with continuous wide medulla. Shaft diameter varies considerably. Often has buckling and twisting characteristics.

40
New cards

Racial Ancestry Determination

Caucasian

Straight to wavy; Oval cross-section; Fine to medium texture; Evenly distributed pigment

African

Curly to kinky; Flattened cross-section; Coarse texture with buckling; Dense, clumped pigment

Asian

Straight configuration; Round cross-section; Coarse texture with thick diameter; Continuous broad medulla

Racial determination from hair is based on population-level characteristics and represents probabilities rather than certainties.

<p>Caucasian</p><p>Straight to wavy; Oval cross-section; Fine to medium texture; Evenly distributed pigment</p><p>African</p><p>Curly to kinky; Flattened cross-section; Coarse texture with buckling; Dense, clumped pigment</p><p>Asian</p><p>Straight configuration; Round cross-section; Coarse texture with thick diameter; Continuous broad medulla</p><p>Racial determination from hair is based on population-level characteristics and represents <strong>probabilities rather than certainties</strong>. </p>
41
New cards

Racial Ancestry Questions

Has the hair been artificially treated?

What is the condition of the root?.

Is there evidence of disease or damage?

Are the questioned and known hairs consistent?

42
New cards

Hair and Mitochondrial DNA Analysis

Mitochondrial DNA (mtDNA) can be extracted from the hair shaft, even when nuclear DNA is not recoverable. mtDNA is located in cellular material outside the

nucleus and is transmitted exclusively from mother to child through maternal inheritance.

Limitations: MtDNA has a relatively high frequency of occurrence in populations.

It cannot be used to individualize a hair to a single person

All positive microscopic hair comparisons must be confirmed by DNA analysis

43
New cards

Collection and Preservation of Hair Evidence

Recognition

Documentation

Collection

Packaging

Labeling

Known Standards: When collecting reference samples from individuals, obtain at least 25-50 full-length hairs from different areas of the scalp by pulling (not cutting) to include root structure. Package separately from questioned samples to prevent cross-contamination.

44
New cards

Fiber Classifications: Natural vs. Man-Made Fibers

Natural Fibers: Derived from plant, animal, or mineral sources. Examples include cotton, wool, silk, and asbestos.

Man-Made Fibers:

  1. Regenerated fibers are manufactured from natural raw materials through chemical processing. Common types include rayon, acetate, and triacetate, which maintain some natural characteristics.

  2. Synthetic fibers are produced entirely from synthetic chemicals, including polymers such as nylons, polyesters, and acrylics. These represent the majority of modern textile fibers.

Synthetic fibers are composed of polymers or macromolecules

45
New cards
46
New cards

Polymer Structure

Monomers: Individual molecular units that serve as building blocks, like individual chain links

Polymerization: Chemical process joining thousands of monomers into long molecular chains

Polymer Fiber: Final product with distinct physical and chemical properties based on monomer composition

The specific arrangement and composition of monomers determines the fiber's physical properties, appearance, and forensic significance.

47
New cards

Fiber Evidence in Criminal Investigations

Fiber evidence can provide crucial links between suspects, victims, and crime scenes through transfer and persistence.

Primary Transfer: Direct transfer of fibers from source to recipient during physical contact between individuals or objects

Secondary Transfer: Subsequent transfer of already-transferred fibers to a third location or person through additional contact

Persistence: Duration that fibers remain on recipient surface, affected by fiber type, contact nature, and subsequent activity

Recovery: Collection of transferred fibers through tape lifting, vacuuming, or manual removal for laboratory analysis

48
New cards

Forensic Fiber Examination Techniques

Purpose: combination to provide comprehensive fiber characterization

Microscopy: Comparison microscopy allows side-by-side evaluation of questioned and known samples.

Microspectrophotometry: Creates spectral fingerprint unique to specific dyes and pigments used in fiber production.

FTIR Spectroscopy: Identifies polymer type by measuring molecular vibrations. Distinguishes between fiber types with similar appearance but different chemical composition.

Thermal Analysis: Determines melting point and thermal decomposition patterns.

49
New cards

Cross-Sectional Shapes of Fibers

It is a distinctive characteristic determined by the manufacturing process

Natural Fibers: Cotton shows kidney-bean or ribbon-like shape. Wool exhibits circular to oval cross-section with scales. Silk displays triangular morphology.

Synthetic Fibers

Cross-sections vary widely: round, trilobal, pentalobal, dog-bone, or irregular shapes determined by spinneret design during manufacturing.

<p>It is a <strong>distinctive characteristic determined</strong> by the manufacturing process </p><p>Natural Fibers: Cotton shows kidney-bean or ribbon-like shape. Wool exhibits circular to oval cross-section with scales. Silk displays triangular morphology.</p><p>Synthetic Fibers</p><p>Cross-sections vary widely: round, trilobal, pentalobal, dog-bone, or irregular shapes determined by spinneret design during manufacturing.</p>
50
New cards

Collection and Preservation of Fiber Evidence

Unlike hair, fibers are often smaller and more easily lost or contaminated.

Visual Examination

Tape Lifting; Manual Collection

Garment Packaging: Wrap garments individually in clean paper, never allowing items to contact each other.

Documentation

Maintain strict separation between questioned and known samples

51
New cards

Computer Forensics

It represents the scientific analysis of digital evidence to support criminal investigations and legal proceedings.

Recovery: Systematic extraction of digital data from storage

Chain of Custody

Technical Analysis

52
New cards

Hardware VS. Software

Hardware: Physical and tangible computer

Software: Set of instructions complied into programs

53
New cards

Computer Terminology

Computer Case: The house and protects all internal computer components

Power Supply: Convers alternative current from wall outlets to different current at various voltage required by the computer

Motherboard: The primary circuit board containing the system’s core components

System Bus: Electrical pathway on the motherboard that facilitates data transfer

54
New cards

Computer Hardware Components

knowt flashcard image
55
New cards

Computer Critical components

Read only memory (ROM) - programs essential for system initialization. those non-volatile storage devices retain their contents even when power is removed.

Central Processing Unit (CPU)- Computer’s processing center, executing instructions and managing system operations. Modern processors contain cache memory that retain certain data.

Random Access Memory (RAM)- system performance enhance , providing high speed temporary storage. Dynamic data management, Computer strategically loads frequently accessed data into RAM for immediate availability. Volatile Evidence Concerns, complete lost when power is removed

56
New cards

Input and Output devices

Input: Keyboard; mouse; joystick; scanner

Output: Monitor; Printer; Speakers

57
New cards

Digital Storage Architecture

  1. Storage Device Types: Hard Disk Drives; Solid State Drives and optical media each employ different storage technologies

  2. File System Structures: Various file system like NTFS organize data differently

  3. Metadata preservation: File creation dates, modification times and assess logs

58
New cards

Hard disk drive data organization

Partitioning: initial division of storage space into logical sections for organization and management

Formatting: Define how data will be stored and assessed

Binary Storage: Data stored as bits (0-1) with 8 bits forming one byte and 512 bytes forming one sector

Logical Division: Organization into sectors, clusters, tracks and cylinders for precise data location

59
New cards

Hard disk drive data partitions

Disk partitioning creates logical divisions within physical storage devices, enabling organized data management and forensic analysis.

  1. Primary: Main bootable section containing operating system and core applications

  2. Extended partitions: hold multiple logical dives within their boundaries

  3. Hidden partitions: Concealed storage areas that many contain deleted or sensitive evidence

60
New cards

Advanced data storage concepts

Critical for forensic investigators to recover deleted files

File allocation tables: track file locations and storage status

Unallocated space: Areas where deleted files may still exist until overwritten

File Fragmentation: When files are split across non-contiguous sections.

61
New cards

Forensic DATA recovery methods

Logical analysis: system level exam

Physical analysis: bit by bit exam of storage media. unallocated and damaged areas

Network analysis: exam network traffic and communication logs

62
New cards

Processing Electronic Crime Scene

  1. Initial assessment: Document, identify potential evidence and establish security

  2. Evidence ID

  3. Preservation decisions

  4. Secure Transportation

63
New cards

Shutdown vs. Pulling the Plug

encryption considerations: Abrupt power loss may trigger encryption protocols

Volatile memory evidence: RAM will be permanently lost if not captured before power removal

Equipment Seizure protocol

64
New cards

Forensic Image Acquisition

Fundamental process of creating exact bit by bit copies of digital storage media while maintaining the integrity of original evidence.

Write Protection: Use hardware write blockers to prevent any modification of the original evidence including imaging

Bit by bit copying: Create exact sector- level duplications of the entire storage device

Hash verification: verify the integrity and authenticity of images.

65
New cards

Advanced Imaging Techniques

Modern digital forensics requires mastery of multiple imaging approaches to handle diverse technology environments and evolving security measures.

Live System Imaging: Capturing system state while running to preserve volatile memory and active processes

Network-based Acquisition: Remote imaging of systems

Mobile Device Imagine

66
New cards

Quality assurance and legal admissibility

Adherence to strict quality assurance protocols.

  1. Legal standard

  2. Documentation

  3. Chain of custody

  4. Technical verification

67
New cards

Computer fingerprinting

  1. Initial Hash Creation

  2. 32-character string generation

  3. verification process: Matching string prove the image is comprehensive and unaltered

68
New cards

Visible Data

Active file: Documents, images. videos and applications accessible through the operating system’s file

System file: Operating system components, drivers and configuration files that maintain computer function

User-Created content: Personal document, downloads installed programs

69
New cards

Temporary files and swap space

Temporary file creation: store intermediate data from applications, system processes and user activities

Swap space function: When RAM reaches capacity, the system moves less frequently accessed data to swap space on the hard drive

Forensic significance: contains fragments of deleted files; preserves application sates; stores particle user inputs and maintains system activity logs

70
New cards

Data Swapping process

User switch between applications and perform multiple tasks, data continuously moves between RAM and the computer’s hard drive through sophisticated memory management

  1. Ram storage 2. Memory pressure 3. hard drive swap

71
New cards

Latent Data

Hidden information

Forensic recovery

Investigation value: Often contains the most valuable forensic evidence including deleted files

72
New cards

Latent Data Categories

Deleted files

File slack- unused space within allocated file clusters

Registry Remnants

RAM Artifacts

73
New cards

Unallocated Space Concept

How data can persist even after deletion from the visible file system

Allocated Sectors: Areas of the hard drive actively used by the file system to store current files and system data

Unallocated sectors: Free space that may contain remnants of deleted files

74
New cards

Analysis of Internet Data

Internet Cache- Temporary files storing website content, images and scripts

Cookies: Small data files containing user preferences, login info and tracking data from visited web

Browser History: Chronological record of visited web, search queries and browsing patters

Bookmarks: Saved web links and favorite places and frequently accessed online resources

75
New cards

IP address

Unique ID- internet receives a unique IP address, serving as its digital postal address for network communication

Forensic Tracking: IP addresses (backbone of investigation) enable investigators to trace digital activities back to specific location, devices and internet servicer

76
New cards

Investigation of Internet Communications

  1. Traffic Interception: Monitoring tools capture data packets traveling between computers during active communication sessions

  2. Protocol Analysis: Exam the nature, timing and content of digital conversation

  3. Content reconstruction- Tools reassemble fragmented communications to reconstruct complete messages

  4. Evidence correlation- Multiple communication sources

77
New cards

Internet Communications Process

  1. Source ID: Sending computer packages data with destination IP address info

  2. Network Routing: Examine packet headers and forward data through optimal pathway toward the intended destination address

  3. Delivery Confirmation: Receiving computer acknowledges successful packet receipt

78
New cards

Mobile Forensic

Comprehensive Data sources: Mobile devices provide vast amounts of evidentiary data

Preservation Challenges requires specialized containment methods that block communication signal without powering down the device

Extraction Complexity: Diversity of platforms operating system and security measures

79
New cards

Operating system

Android: Open source platform, making forensic analysis complex

IOS closed ecosystem requiring specialized tool for data extraction

Other platforms: BlackBerry, Windows…

80
New cards

Variability of Mobile Devices

Hardware differences

Security Features

Data storage

Application ecosystems

Connectivity options

81
New cards

Data extraction from Mobile devices

Device isolation: Secure the device in a Faraday container or airplane mode

Access Authentication: Bypass or overcome device security measures

Data Acquisition: Create bit by bit forensic images

Evidence Analysis: Parse extracted data to recover deleted files.