SlideShare a Scribd company logo
1 of 14
MOBILE DEVICE FORENSICS
Submitted by
S.Tamilmannavan
811719104102
CYBER FORENSICS
Understanding Mobile Device Forensics
 People store a wealth of information on cell phones and mobile devices
 People don’t think about securing their mobile devices
 Items stored on mobile devices:
 Incoming, outgoing, and missed calls
 Text and Short Message Service (SMS) messages
 E-mail
 Instant-messaging (IM) logs
 Web pages
 Pictures
 Personal calendars
 Address books
 Music files
 Voice recordings
 GPS data
 Investigating cell phones and mobile devices is one of the most challenging
tasks in digital forensics
Understanding Cellular Connected Mobile
Devices
 A Mobile Switching Center(MSC) is the switching system
for the cellular network. The MSC is also responsible for
communications between mobile and landline phones.
 The Base Transceiver Station(BTS) is the part of the
cellular network responsible fro communications
between mobile phone and network switching
systems.
 The Home Location Register is a database used
by the MSC that contains subscriber and service
information.
 It is related to the VLR for roaming status.
Inside Mobile Devices
 IMEI and IMSI
 International Mobile Equipment Identifier
 International Mobile Subscriber Identifier
 Also MEID (Mobile Equipment Identifier) or ESN (electronic
serial number)
 Phones store system data in electronically erasable
programmable read-only memory (EEPROM)
 Enables service providers to reprogram phones without having to
physically access memory chips
 OS is stored in ROM
 Nonvolatile memory
Inside Mobile Devices
 Subscriber identity module (SIM) cards
 Found most commonly in GSM(Global System for Mobile
Communications) devices
 GSM refers to mobile phones as “mobile stations” and divides a
station into two parts:
◾The SIM card and the mobile equipment (ME)
 Portability of information makes SIM cards versatile
◾Integrated Circuit Card Identifier(ICCID)
◾Identifies the subscriber to the network
◾Stores service-related information
◾PIN – unlock the device
◾PUK – reset the PIN
🢝 Wipes phone is incorrectly entered > 10 time
◾Cipher Algorithm
Mobile Device Forensic Analysis Process
 Biggest challenge is dealing with constantly changing
models of cell phones
 When you’re acquiring evidence, generally you’re
performing two tasks:
 Acting as though you’re a PC synchronizing with the device (to
download data)
 Reading the SIM card
 First step is to identify the mobile device
 Question: Why is this important?
Understanding Acquisition Procedures for Cell
Phones and Mobile Devices
 The main concerns with mobile devices are loss of
power and synchronization with PCs
 All mobile devices have volatile memory
 Making sure they don’t lose power before you can
retrieve RAM data is critical
 Mobile device attached to a PC via a cable or
cradle/docking station should be disconnected
from the PC immediately
 Communication or system messages might be
received on the mobile device after seizure
 Isolate the device from incoming (RF)signals
 The drawback to using these isolating options is that the
mobile device is put into roaming mode, which
accelerates battery drainage
Data Acquisition Procedures for Cell Phones
and Mobile Devices
 Check these areas in the forensics lab :
 Internal memory
 SIM card
◾file system is a hierarchical structure
 Removable or external memory cards
 Information that can be retrieved:
 Service-related data, such as identifiers for the SIM card and the subscriber
 Call data, such as numbers dialed
 Message information
 Location information
 If power has been lost, PINs or other access codes might be
required to view files.
 Encryption
Access Methods
(6 types according to NIST)
 Manual Extraction
 looking at pages of info directly on
the device
 Logical Extraction
 filesystem dump
 Hex dumping and JTAG
 can work on damaged devices and bypass lock screens. Reads
directly from RAM/ROM
 Chip off
 unsolder or cut flash memory from circuit board
 Micro read
 use a SEM to view data
Don’t ignore useful properties
When was the last time this phone was at 2SP?
Poke around and you will find…
Encoded Secrets
This has been truncated, the app stores your password
Application Data
 Found in plists or sqlite files
 Apps continue to change formats
 Looking primarily for location and message data
Rooting
 Usually an alternate OS (may be command injection)
 Removes built-in restrictions on access to data
 Removes or makes possible to add 3rd party applications
 Consumers do it for functionality
 Investigators do it for access to data
 Manufacturers are making this more challenging
Summary
 People store a wealth of information on their cell phones
 Various generations of mobile phones
 Data can be retrieved from several different places in
phones
 As with computers, proper search and seizure procedures
must be followed for mobile devices
 To isolate a mobile device from incoming messages, you
can place it in a specially treated paint can, a wave-
blocking wireless evidence bag, or eight layers of
antistatic bags
 SIM cards store data in a hierarchical file structure

More Related Content

Similar to Mobile Device Forensics: Understanding Data Acquisition

Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesSTO STRATEGY
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 

Similar to Mobile Device Forensics: Understanding Data Acquisition (20)

Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
M Commerce
M CommerceM Commerce
M Commerce
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Test
TestTest
Test
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
776 s0005
776 s0005776 s0005
776 s0005
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 

Recently uploaded

VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...Suhani Kapoor
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...Hot Call Girls In Sector 58 (Noida)
 
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一nsrmw5ykn
 
Introduction of Basic of Paint Technology
Introduction of Basic of Paint TechnologyIntroduction of Basic of Paint Technology
Introduction of Basic of Paint TechnologyRaghavendraMishra19
 
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfExcavator
 
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagardollysharma2066
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Hot Call Girls In Sector 58 (Noida)
 
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Niya Khan
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technologyquickpartslimitlessm
 
The 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyThe 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyHyundai Motor Group
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 
How To Troubleshoot Mercedes Blind Spot Assist Inoperative Error
How To Troubleshoot Mercedes Blind Spot Assist Inoperative ErrorHow To Troubleshoot Mercedes Blind Spot Assist Inoperative Error
How To Troubleshoot Mercedes Blind Spot Assist Inoperative ErrorAndres Auto Service
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Delhi Call girls
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111Sapana Sha
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubaikojalkojal131
 
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一mjyguplun
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaMalviyaNagarCallGirl
 

Recently uploaded (20)

VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
 
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
 
Introduction of Basic of Paint Technology
Introduction of Basic of Paint TechnologyIntroduction of Basic of Paint Technology
Introduction of Basic of Paint Technology
 
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
 
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
 
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technology
 
The 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyThe 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journey
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 
How To Troubleshoot Mercedes Blind Spot Assist Inoperative Error
How To Troubleshoot Mercedes Blind Spot Assist Inoperative ErrorHow To Troubleshoot Mercedes Blind Spot Assist Inoperative Error
How To Troubleshoot Mercedes Blind Spot Assist Inoperative Error
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
 
Hotel Escorts Sushant Golf City - 9548273370 Call Girls Service in Lucknow, c...
Hotel Escorts Sushant Golf City - 9548273370 Call Girls Service in Lucknow, c...Hotel Escorts Sushant Golf City - 9548273370 Call Girls Service in Lucknow, c...
Hotel Escorts Sushant Golf City - 9548273370 Call Girls Service in Lucknow, c...
 
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 DelhiCall Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
 
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
 

Mobile Device Forensics: Understanding Data Acquisition

  • 1. MOBILE DEVICE FORENSICS Submitted by S.Tamilmannavan 811719104102 CYBER FORENSICS
  • 2. Understanding Mobile Device Forensics  People store a wealth of information on cell phones and mobile devices  People don’t think about securing their mobile devices  Items stored on mobile devices:  Incoming, outgoing, and missed calls  Text and Short Message Service (SMS) messages  E-mail  Instant-messaging (IM) logs  Web pages  Pictures  Personal calendars  Address books  Music files  Voice recordings  GPS data  Investigating cell phones and mobile devices is one of the most challenging tasks in digital forensics
  • 3. Understanding Cellular Connected Mobile Devices  A Mobile Switching Center(MSC) is the switching system for the cellular network. The MSC is also responsible for communications between mobile and landline phones.  The Base Transceiver Station(BTS) is the part of the cellular network responsible fro communications between mobile phone and network switching systems.  The Home Location Register is a database used by the MSC that contains subscriber and service information.  It is related to the VLR for roaming status.
  • 4. Inside Mobile Devices  IMEI and IMSI  International Mobile Equipment Identifier  International Mobile Subscriber Identifier  Also MEID (Mobile Equipment Identifier) or ESN (electronic serial number)  Phones store system data in electronically erasable programmable read-only memory (EEPROM)  Enables service providers to reprogram phones without having to physically access memory chips  OS is stored in ROM  Nonvolatile memory
  • 5. Inside Mobile Devices  Subscriber identity module (SIM) cards  Found most commonly in GSM(Global System for Mobile Communications) devices  GSM refers to mobile phones as “mobile stations” and divides a station into two parts: ◾The SIM card and the mobile equipment (ME)  Portability of information makes SIM cards versatile ◾Integrated Circuit Card Identifier(ICCID) ◾Identifies the subscriber to the network ◾Stores service-related information ◾PIN – unlock the device ◾PUK – reset the PIN 🢝 Wipes phone is incorrectly entered > 10 time ◾Cipher Algorithm
  • 6. Mobile Device Forensic Analysis Process  Biggest challenge is dealing with constantly changing models of cell phones  When you’re acquiring evidence, generally you’re performing two tasks:  Acting as though you’re a PC synchronizing with the device (to download data)  Reading the SIM card  First step is to identify the mobile device  Question: Why is this important?
  • 7. Understanding Acquisition Procedures for Cell Phones and Mobile Devices  The main concerns with mobile devices are loss of power and synchronization with PCs  All mobile devices have volatile memory  Making sure they don’t lose power before you can retrieve RAM data is critical  Mobile device attached to a PC via a cable or cradle/docking station should be disconnected from the PC immediately  Communication or system messages might be received on the mobile device after seizure  Isolate the device from incoming (RF)signals  The drawback to using these isolating options is that the mobile device is put into roaming mode, which accelerates battery drainage
  • 8. Data Acquisition Procedures for Cell Phones and Mobile Devices  Check these areas in the forensics lab :  Internal memory  SIM card ◾file system is a hierarchical structure  Removable or external memory cards  Information that can be retrieved:  Service-related data, such as identifiers for the SIM card and the subscriber  Call data, such as numbers dialed  Message information  Location information  If power has been lost, PINs or other access codes might be required to view files.  Encryption
  • 9. Access Methods (6 types according to NIST)  Manual Extraction  looking at pages of info directly on the device  Logical Extraction  filesystem dump  Hex dumping and JTAG  can work on damaged devices and bypass lock screens. Reads directly from RAM/ROM  Chip off  unsolder or cut flash memory from circuit board  Micro read  use a SEM to view data
  • 10. Don’t ignore useful properties When was the last time this phone was at 2SP?
  • 11. Poke around and you will find… Encoded Secrets This has been truncated, the app stores your password
  • 12. Application Data  Found in plists or sqlite files  Apps continue to change formats  Looking primarily for location and message data
  • 13. Rooting  Usually an alternate OS (may be command injection)  Removes built-in restrictions on access to data  Removes or makes possible to add 3rd party applications  Consumers do it for functionality  Investigators do it for access to data  Manufacturers are making this more challenging
  • 14. Summary  People store a wealth of information on their cell phones  Various generations of mobile phones  Data can be retrieved from several different places in phones  As with computers, proper search and seizure procedures must be followed for mobile devices  To isolate a mobile device from incoming messages, you can place it in a specially treated paint can, a wave- blocking wireless evidence bag, or eight layers of antistatic bags  SIM cards store data in a hierarchical file structure