Mobile Phone Basics, Inside Mobile Devices, Digital Networks, Mobile Phone Seizure, Mobile Phone Examination, Mobile Forensics Equipment, Cell Seizure Tool, SIMIS, XRY,
3. Contents
Introduction
Understanding Mobile
Device Forensics
Mobile Phone Basics
Inside Mobile Devices
Sources of Evidences
Forensic Issues
Principles of ACPO
Mobile Phone Seizure
Preparation of
examination
Mobile Forensic
equipment
Forensic Tools for
examination
4. Introduction
More than 7 billion Mobile Phones are being
used world wide.
A new phone model is released worldwide
about every 4 days.
5. Major manufacturers make 80% of phones -
Others are Oppo, Vivo, etc..
More than 50 manufacturers make up other 20%
Many Operating Systems –
Android 60%, Apple 30%, Windows 8% and others
Each phone model on each network may have a different version
of OS
7. Understanding Mobile Device Forensics
People store a wealth of information on cell
phones
People don’t think about securing their cell phones
Items stored on cell phones:
Incoming, outgoing and missed calls
Text and Short Message Service (SMS) messages
E-mail
Instant-messaging (IM) logs
Web pages
Pictures
8. Items stored on cell phones: (continued)
Personal calendars
Address books
Music files
Voice recordings
Video Files
Investigating cell phones (mobile devices) is one of the
most challenging tasks in digital forensics
9. Mobile Phone Basics
Mobile phone technology has been
advanced rapidly
Several digital networks are used in the
mobile phone industry
11. Digital Networks:
CDMA (Code Division Multiple Access)
GSM (Global System for Mobile
Communications)
TDMA (Time Division Multiple Access)
iDEN (Integrated Digital Enhanced Network)
D-AMPS (Digital Advanced Mobile Phone
Services)
EDGE (Enhanced Data GSM Environment)
3G (3rd Generation)
4G
13. Inside Mobile Devices
Mobile devices can range from simple phones to
small computers
Also called smart phones
Hardware components
Microprocessor, ROM, RAM, a digital signal
processor, a radio module, a microphone and
speaker, hardware interfaces, and an LCD
display
Most basic phones have a proprietary OS
Although some smart phones use the same OSs
as PCs
14. Phones store system data in electronically
erasable programmable read-only memory
(EEPROM)
Enables service providers to reprogram phones
without having to physically access memory
chips
OS is stored in ROM
Nonvolatile memory
16. SIM Cards
Subscriber identity module (SIM) cards
Found most commonly in GSM devices
It has a Microprocessor and from 16 KB to 4 MB EEPROM
GSM refers to mobile phones as “mobile stations” and
divides a station into two parts:
The SIM card and the mobile equipment (ME)
SIM cards come in two sizes – Mini & Micro
Additional SIM card purposes:
Identifies the subscriber to the network
Stores personal information
Stores address books and messages
Stores service-related information
20. Sources of Evidence
Subscriber (You).
SIM (Subscriber Identity Module).
Phone.
Base Station.
Network.
21. Forensic Issues
Cables are a big problemForensic software supportBlock incoming signals
Battery PUK Code- network
Personal Pin codes -
3 attempts only
22. Principles of ACPO
The four ACPO (Association of Chief Police Officers)
Principles of Digital Evidence are presented and discussed
in turn, both in terms of the implication on the personnel
involved in seizing mobile devices and also the
implications for those examining such devices.
Principle 1:
No action taken by law enforcement agencies or their
agents should change data held on a computer or
storage media which may subsequently be relied upon
in court.
23. Principle 2:
In circumstances where a person finds it necessary to
access original data held on a computer or on storage
media, that person must be competent to do so and be
able to give evidence explaining the relevance and the
implications of their actions.
Principle 3:
An audit trail or other record of all processes applied to
computer-based electronic evidence should be created
and preserved. An independent third party should be able
to examine those processes and achieve the same result.
Principle 4:
The person in charge of the investigation (the case
officer) has overall responsibility for ensuring that the
law and these principles are adhered to.
24. MOBILE PHONE SEIZURE
Identify the item. Is it actually a telephone? Is it a dummy
phone?
Note if it is switched on or off.
Note what is displayed on the screen - pay particular attention
to icons displayed as Envelopes, or messages informing of new
unread text messages.
Protect the phone with antistatic bag or Faraday bag.
Do not dismantle the phone - Do not back off the phone, or
remove the SIM card as this can cause important data to be lost
from the phone, time/date etc.
ASK the owner, or appropriate person for any passwords or PIN
numbers that may lock out the examiner during the examination
of the phone or SIM - This can save lots of time should these PIN
numbers or password be required, as the Service Provider will
not have to be contacted.
25. Check for handset boxes, SIM card holders, phone bills, etc. -
These can hold very important information, such as PIN
numbers, PUK numbers, account details, account holder details,
telephone numbers, etc.
Search for Phone chargers - These are as important as the
handset itself, certainly from an examiner's point of view.
Telephones ideally should be fully charged during an
examination, and what better charger than the phone's own
charger?
Place the telephone in a sealed evidence bag, and preferably in
a box where the buttons cannot be pressed on the phone once
sealed. – this prevents “helpful” interaction with the phone and
in any case prevents the telephone being turned on accidentally.
Are there any other forensic Issues such as protecting the phone
for DNA / Fingerprints? If so the phone will need to be submitted
to the appropriate unit prior to a mobile forensic examination.
26. Preparation of Examination
Photograph evidence inside the seizure enclosure.
Document seizure labels.
Open seizure enclosure.
Photograph and detail any marks or peculiarities of note
Caveat if the evidence is on and within a antistatic bag
you may not want to perform this step until an
acquisition has taken place unless it is absolutely
necessary to determine the make and model of phone.
Determine specifications of phone and what software is
appropriate to download information from handset.
27. Examination
Connect phone with appropriate cables or method, I.e. Infra-
red or Bluetooth
Acquire with software
Bookmark items of note
If the phone is a GSM phone note IMEI number on screen (by
typing *#06#) and employ other manufacturer-specific
handset codes to obtain handset information.
Remove handset from RF-Isolation / Faraday Bag / Anti-static
bag and turn power cycle the unit. Photograph any startup
screens or messages.
Note time and date on handset.
28. Examination (Cont.)
Power off handset, and remove casing.
Photograph battery, and label behind it once battery
removed (usually shows IMEI)
If the phone is a Nextel or GSM remove SIM and photograph
both sides.
Acquire SIM with software
Bookmark items of note
Perform of memory cards if present.
Reassemble handset.
Reseal and return evidence to property locker.
Create reports and burn onto CD/DVD.
29. Mobile Forensics Equipment
Mobile forensics is a new science
Biggest challenge is dealing with constantly changing
models of cell phones
When you’re acquiring evidence, generally you’re
performing two tasks:
Acting as though you’re a PC synchronizing with
the device (to download data)
Reading the SIM card
First step is to identify the mobile device
30. Make sure you have installed the mobile device
software on your forensic workstation
Attach the phone to its power supply and connect
the correct cables
After you’ve connected the device
Start the forensics program and begin
downloading the available information
31. SIM card readers
A combination of hardware/software device
used to access the SIM card
You need to be in a forensics lab equipped
with appropriate antistatic devices
General procedure is as follows:
Remove the back panel of the device
Remove the battery
Under the battery, remove the SIM card from
holder
Insert the SIM card into the card reader
32. SIM card readers (continued)
A variety of SIM card readers are on the market
Some are forensically sound and some are not
Documenting messages that haven’t been read yet is critical
Use a tool that takes pictures of each screen
Mobile forensics tools
Paraben’s SIM card Seizure & Paraben’s Device Seizure
XRY Device Extractor
Cell Seizure Tool
SIMIS
BitPim
MOBILedit!
SIMCon
Software tools differ in the items they display and the level of
detail.
45. Cell Seizure Tool
The main goal of Cell Seizure is to organize and report
various types of files.
Cell Seizure is able to generate comprehensive HTML
reports of acquired data.
The software is able to retrieve deleted files and check
for file integrity.
46. Advantages of Cell Seizure
It is designed not to change the data stored on the SIM card or cell phone. In
other words, all of the data can be examined while keeping the process
undetected.
In fact, even some forensic software warns of possible data loss. Cell Seizure does
not allow data to be changed on the phone
Disadvantages of Cell Seizure
It does not support all models of cell phones. However, this application can
acquire information from most models made by the following companies: Nokia,
LG, Samsung, Siemens, Motorola, Sony-Ericcson, and can also acquire GSM SIM
Cards.
Another disadvantage would be that the format of acquired data can sometimes
be confusing. The data is not organized nice and neat and given to the user in a
way that they can easily understand what they are seeing.
47. Cell Seizure Features
Supports GSM, TDMA and CDMA cell phones
Acquires text messages, address books, call logs, etc.
Acquires complete GSM SIM card
Recovers deleted data and full flash downloads
Supports multiple languages
Contains comprehensive HTML reporting and other
reporting formats
Provides advanced searching including text & hex values
Contains viewers for proprietary media file formats
Allows viewing of multiple workspaces at one time
48. SIMIS
SIM card Interrogation System is the world's
leading forensic tool for examining SIM cards
forensically.
Used throughout the world since 1997, SIMIS has
become an integral tool for law enforcement and
digital investigators.
The SIMIS desktop software has been evaluated by
the DoD (Department of Defense), and is
complimented by a mobile handheld device for
data collection in the field
49. XRY
XRY is a software application designed to run on the Windows
operating system which allows you to perform a secure forensic
extraction of data from a wide variety of mobile devices, such as
smartphones, GPS navigation units, 3G modems, portable music
players and the latest tablet processors such as the iPad.
Extracting data from mobile / cell phones is a special skill and not
the same as recovering information from computers. Most mobile
devices don't share the same operating systems and are proprietary
embedded devices which have unique configurations and operating
systems. What does that mean in terms of getting data out of
them? Well in simple terms, it means it is very difficult to do.
XRY has been designed and developed to make that process a lot
easier for you, with supports for about 7,000 different mobile
device profiles. XRY supplies a complete solution to get you what
you need and the software guides you through the process step by
step to make it as easy as possible.
66. Scenario .XRY Results Ranking Results
Call Logs 100 3 Meet
SMS 120 (all retrieved, deleted not recovered) 3 Meet
Contacts 1511 3 Meet
Email 0 1 Below
Calendar 3188 3 Meet
Notes 1 3 Meet
Pictures 312 (photos taken with iPhone included GPS coordinates) 4 Above
Songs none loaded podcasts retrieved 3 Meet
Web History Yes, 28 were listed. Also listed recent searches. 4 Above
Bookmarks 2 3 Meet
Cookies 89 3 Meet
App Info Some apps left evidence 2 Below
Google Maps 1 Address record and GPS location 3 Meet
Voicemail 0 0 Below
Password None found 0 Below
Plists/XML Many retrieved 3 Meet
Phone Info Yes 3 Meet
Video 1 3 Meet
Podcasts 4 3 Meet
Speed Dials Found programmed speed dial in plist 3 Meet
VPN 0 0 Below
Bluetooth 0 0 Below
GPS Coordinates found in both images and plist. Specific info from the GPS not pulled. 3 Meet
File Hashes An available option 3 Meet
You Tube 0 0 Below
HTML 0 0 Below
67. 1. XRY Logical
Here, only LOGICAL extraction is performed.
It means it is only communicated with operating system and requests system
information.
2. XRY Physical
Here, PHYSICAL extraction is performed.
All available raw data stored on the device is recovered.
Typically, this is performed bypassing the operating system and this offers you the
opportunity to go deeper and recover deleted data from the device.
XRY Physical is particularly useful when faced with a GSM mobile phone without a SIM
Card, or with security locked devices.
3. XRY Complete
This is the top of the range solution combining the best of both worlds with XRY
Logical and XRY Physical in one complete package, hence the name.
With XRY Complete you will be able to perform both logical and physical extractions
from a device, giving you the best possible opportunity to recover all the available
data from a mobile device. Allowing you to compare the results between the different
recovery methods.
This system is supplied with all the necessary hardware from both the Logical and the
Physical systems to ensure you have everything you need to do complete the task.
68. 4. XACT
XACT is a separate hex viewer software application which complements XRY
Physical, allowing examiners to view the raw hexadecimal data extracted
during a physical dump of a mobile device.
With XACT you can import binary files from other sources if required and
view the hexadecimal data to see for yourself exactly where the data is.
5. SIM id-Cloner
It is specifically designed to assist you in the forensic recovery of data from
GSM SIM Cards and also provide a secure environment for forensic examiners
to investigate a mobile device free from the risks associated with examining
GSM devices.
SIM id-Cloner will allow you to create a replica of the SIM card found within a
mobile device so that you can enable the operating system without the risk
of it making a network connection and changing data held on the device.