3 research outputs found

    First Responder Assistance Tool for Mobile Device Forensics

    Get PDF
    The growing importance of mobile telephones, especially so called smartphones , the problem of identifying these phones has become a real issue. There is a prevalence of these devices being used by criminals, foreign agents and terrorists. The need to be able to quickly identify these phones and determine what forensics tools maybe compatible with the device. The issue of imitation phones and the potential of hidden operating systems have further muddied the forensics waters. Having a starting point from which to perform this analysis is important first step. The purpose of this research is to provide that starting point. By analyzing basic aspects of the phone and viewing the compatibility with other forensics tools it will give the investigator ideas as to what they can reasonably expect to gain from analyzing the phone. Additionally this software attempts to gather information about the software with the intention of detecting hidden partitions and secondary operating systems

    First Responder Assistance Tool for Mobile Device Forensics

    No full text
    The growing importance of mobile telephones, especially so called "smartphones", the problem of identifying these phones has become a real issue. There is a prevalence of these devices being used by criminals, foreign agents and terrorists. The need to be able to quickly identify these phones and determine what forensics tools maybe compatible with the device. The issue of imitation phones and the potential of hidden operating systems have further muddied the forensics waters. Having a starting point from which to perform this analysis is important first step. The purpose of this research is to provide that starting point. By analyzing basic aspects of the phone and viewing the compatibility with other forensics tools it will give the investigator ideas as to what they can reasonably expect to gain from analyzing the phone. Additionally this software attempts to gather information about the software with the intention of detecting hidden partitions and secondary operating systems.</p

    Neuroplasticity in Post-Stroke Aphasia: A Systematic Review and Meta-Analysis of Functional Imaging Studies of Reorganization of Language Processing

    No full text
    corecore