Question Description

I’m working on a Programming exercise and need support.

WEEK 1

Discussion 1

For this assignment, you must reply to this post and address the questions below, prior to 11:59 p.m. ET on Thursday, January 14th. Continue to follow your classmates’ posts for the remainder of the week and post follow-up messages to at least two of your classmates’ posts prior to 11:59 p.m. ET on Sunday, January 17th. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words. All follow-up posts to your classmates must be a minimum of 150 words for each required post. Peer responses posted after 11:59 pm on Sunday evenings will not be accepted or calculated into the weekly forum grade.

Discussion Grading Rubric (100 Points)

Synthesis of Concepts 55

Clear Citations using APA format 10

Writing Standards 10

Peer Reviews (minimum of 2) – Responses posted after the current week will not be accepted 25

Timeliness – 10% penalty per week for late work

1. Take a minute and think back to your first mobile phone. Discuss the features and the changes that have taken place since that first phone? Before you discuss the differences please review the below video.

2. In the past 5 years there have been significant changes to mobile technology. Discuss as least one change in mobile technology and explain the impact on the world.

student 1 :

MICHAEL GRAHAM

Discussion Week 1

1. Take a minute and think back to your first mobile phone. Discuss the features and the changes that have taken place since that first phone?

I got my first cell phone back in 2004 and it was vastly different than phones today. My first phone was a LG flip phone that had true unlimited data and was only 50.00/month. It had a short antenna which is virtually eliminated from phones today. My phone hardly had any storage (8 GB) but you could only store contact information because it didn’t have any apps on it because apps were not invented yet. In 2004, phones did not have the internet or even a browser on it and it was a true “phone” in a sense where people still carried them all the time, but they did not feel the need to look at them 24 hours a day. My phone had physical buttons because touchscreens were not integrated into cell phones and to text, we used a QWERTY keyboard which made texting very difficult to do. People also still carried an iPod and their phones with them because phones did not have music apps or any storage to download music on the phone. Mobile phones have drastically changed in the 17 years since I had my first phone.

2. In the past 5 years there have been significant changes to mobile technology. Discuss as least one change in mobile technology and explain the impact on the world.

I believe one of the most significant change in mobile technology in the last 5 years is the use of smart watches. Apple released the smart watch back in 2015 and it condensed the use of a phone to a small computer on your wrist. Even though smartwatches were around since the late 70’s, Apple’s smartwatch that was released in 2015 made it a seamless extension of your phone and that’s when the concept of a smartwatch really took off. Smart watches can do everything that your phone can do but it is more convenient to just look at your wrist for information rather than pulling out your phone. You can monitor your health, take calls, text others, and listen to music all on your smartwatch. Today, you see smartwatches virtually everywhere and I feel like this made a significant impact on society and mobile technology throughout the world.

References:

Student 2 :

CHRIS SUSALLA

Discussion 1

I cannot remember the first cell phone that I had, but I know it was a flip phone. I do, however, remember my first 3G smartphone, a Samsung Blackjack. It was in the mid-2000s, and I thought it was the coolest thing ever made at the time. The Blackjack had a full keyboard that was great for texting. It was way better than typing multiple number presses to get to the right letter that my previous phones required. This phone could browse the internet as well as send email and had a Windows operating system. It had a color screen, and I liked it so much that I bought the Blackjack 2 when it came out.

Although drones have been around for a long time, there have been significant advancements over the last few years, and the technology will continue to grow into the future. Drones are used by the military and they are expected to spend over twenty three billion dollars on the technology by 2027. Drones have been steadily increasing in commercial businesses, and delivery drones are expected to reach almost thirty million deliveries by the end of this year. There are drones available that can fly over four miles away and all while filming in 4K and taking 20MB resolution pictures. Drones are also leaving this planet for another. In July 2020, NASA launched a new rover to explore Mars. This rover comes with a flying drone companion called Ingenuity. They are expected to land in February of this year. Ingenuity is solar powered and has a wireless communication system. It has computers, navigation, and two cameras, weighing only four pounds.

Divya Joshi. “Future of Drones: Applications & Uses of Drone Technology in 2020 – Business Insider.” Business Insider, Business Insider, 18 Dec. 2019, www.businessinsider.com/drone-technology-uses-applications.

TDL. 2021. How Far Can Drones Fly From The Controller | Capabilities & Laws. [online] Available at: [Accessed 15 January 2021].

M. (2021). Mars Helicopter. NASA Mars. https://mars.nasa.gov/technology/helicopter/

——————————————————————————————————————————————————————————————————————————————————-

WEEK 2

Discussion 2 :

For this assignment, you must reply to this post and address the questions below, prior to 11:59 p.m. ET on Thursday, January 21st . Continue to follow your classmates’ posts for the remainder of the week and post follow-up messages to at least two of your classmates’ posts prior to 11:59 p.m. ET on Sunday, January 24th. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words. All follow-up posts to your classmates must be a minimum of 150 words for each required post. Peer responses posted after 11:59 pm on Sunday evenings will not be accepted or calculated into the weekly forum grade.

Discussion Grading Rubric (100 Points)

Synthesis of Concepts 55

Clear Citations using APA format 10

Writing Standards 10

Peer Reviews (minimum of 2) – Responses posted after the current week will not be accepted 25

Timeliness – 10% penalty per week for late work

1. The Fourth Amendment deals with search and seizure. How can the Fourth Amendment be applied to mobile devices? How does data volatility play a part when it comes to search and seizure?

2. To answer this question you will need to watch the videos on Wi-Fi and Bluetooth which can be found within the Week 2 tab. Please discuss vulnerabilities of using your personal mobile device and things that you might do different.

Student 1:

ADRIAN OLIVERIO

Week 2 Discussion

The Fourth Amendment protects us against unlawful searches or seizures. This also applies when dealing with mobile devices. For example, if you are pulled over for a routine traffic stop, a cop does not have the right to search through the contents of you phone. “In Riley v. California, Riley was stopped by the police for driving with expired tags. During this traffic, stop officers found his cell phone and searched it finding videos and photos that linked him to a previous crime. The Supreme Court ruled that the government needs a warrant, based on probable cause, to search a cell phone. Id at 401” (Gatlin Voelker Law Firm, n.d). There are some situations where the argument comes into play that the evidence cops are looking for would not be there if they waited. Volatile data can change in an instant and all evidence that would have been found in the volatile memory locations, like the RAM of a computer, would disappear. In those situations, I believe that strong probable cause is a must. The evidence found must also match the evidence that they were initially looking for.

Mobile devices are probably most vulnerable technology to be hacked. In the videos provided, they discuss the dangers of using public WIFI. Personally, I avoid using public WIFI anytime I can. If I have to use public WIFI, I use methods like a VPN to try to protect my data traffic. Programs like Wire shark are very easily accessible to anyone and they are used to sniff through all the data traveling through the network. These programs can be used to gain password information or even personal identity information. When you connect through a public WIFI hotspot, you are first met with the possibility that it might be set-up to lore victims in. For example, you are staying at a hotel and another person puts up a fake network with the SSID as the hotel name you are staying at. Even if the public WIFI hotspot is not set-up by hackers, they can still connect to the hotspot also and gain access to all the information with the same programs. I can’t say id do much different, because I already take steps to protect myself. I believe that the only thing I can do different is completely avoid using any public WIFI hotspots all together.

Gatlin Voelker Law Firm (n.d) Your Cell Phone and the Fourth Amendment. Retrieved from https://gatlinvoelker.com/ask-a-lawyer/your-cell-p…

STUDENT 2 :

PATRICK HANASEWYCH

Discussion 2

  1. The fourth amendment protects from unlawful searches and seizures, and only recently have mobile devices been classified as protected under that law. Because of this there is all kinds of information about the device and what exactly you are searching for that needs documented before a warrant is granted. Many do not understand the specifics surrounding mobile searches and either do not find the data or do not preserve it and it becomes invalid. In the past PDA’s and other mobile devices stored call logs and other data in volatile memory because it was much cheaper then spending money on flash storage at the time. The downside to this is if the device loses power It also loses its stored data, this can be a problem if a device is needed to be held for long periods of time. However volatile storage is obsolete and huge internal flash storage is possible, so the main thing lost with power is access to the device.
  2. It is common for people to use free public Wi-Fi while at Starbucks or Panera, however this can pose huge risk to the data stored on these devices. When using free Wi-Fi all the packets are unencrypted and can be read in plain text by anybody with the proper software sitting on the same Wi-Fi network. So while you check your bank statement somebody across the store is stealing all of your accounts logon credentials. This can also happen by somebody spoofing a network such as what happened in the video, and an unsuspecting person connects to the rogue access point. Every packet of data can be searched through for anything worth stealing. I personally have been avoiding public Wi-Fi and sticking with an unlimited data plan.

Citaitons:

Volitile memory –

Risks of public Wi-Fi vs. cellular –

NortonLifeLock. (2018, July 23). How Safe Is Surfing on 4G vs. Wi-Fi? Retrieved January 20, 2021, from https://us.norton.com/internetsecurity-wifi-how-safe-is-surfing-on-4g-vs-wi-fi.html

Specifics about what needs to be documented before a warrant can be issued –

Reiber, L. (2016). Locations to be Searched. In Mobile forensic investigations: A guide to evidence collection, analysis, and presentation (p. 52). New York, NY: Mc Graw Hill education.

————————————————————————————————————————————————————————-

WEEK3

DISCUSSION : 3

For this assignment, you must reply to this post and address the questions below, prior to 11:59 p.m. ET on Thursday, January 28th . Continue to follow your classmates’ posts for the remainder of the week and post follow-up messages to at least two of your classmates’ posts prior to 11:59 p.m. ET on Sunday, January 31st. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words. All follow-up posts to your classmates must be a minimum of 150 words for each required post. Peer responses posted after 11:59 pm on Sunday evenings will not be accepted or calculated into the weekly forum grade.

Discussion Grading Rubric (100 Points)

Synthesis of Concepts 55

Clear Citations using APA format 10

Writing Standards 10

Peer Reviews (minimum of 2) – Responses posted after the current week will not be accepted 25

Timeliness – 10% penalty per week for late work

1.Research and discuss at least two mobile forensics software tools. Choose one closed and one open source tools. Be sure to discuss the pros and cons of each tool by comparing the tools.

2. Please research one case involving mobile forensics. Discuss the case, the tools used in the case if mentioned, and the outcome. You may not discuss the San Bernardino, CA case and Apple.

NO ONE OF THE STUDENT POST ANY DISCUSSION UNTIL NOW

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at essayloop.com

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at essayloop.com. We assure you of a well written and plagiarism free papers delivered within your specified deadline.