Module 4.1 Mobile and Network Forensics
Module 4.1 Mobile and Network Forensics
● The Mobile Station (MS) initiates the call by sending a signal to the
BTS.
● The BTS sends the request to the BSC, which controls the radio
resources and manages the connection.
● The BSC communicates with the MSC to route the call. If the call is
local, the MSC handles the connection internally; if it’s to an external
network, the MSC interfaces with the PSTN or another mobile
network.
Interaction of Components in GSM
Authentication:
● The MSC checks the VLR for temporary subscriber information. If
the VLR doesn’t have the data, it queries the HLR for permanent
subscriber data.
● The AUC verifies the subscriber’s identity using encryption keys
stored in the SIM and AUC.
Call Termination:
● Once the communication is complete, the MSC terminates the call.
The BSC and BTS release the radio channel.
● The MSC communicates with the VLR to update the subscriber's
location, and the call details are logged for billing purposes.
Triangulation and Trilateration
Triangulation in Mobile Networks:
Principle: Uses the angles at which signals from a mobile device are
received by multiple cell towers.
Method:
When a mobile device communicates with multiple cell towers, the
network measures the Angle of Arrival (AoA) of the signal at each tower.
With at least two cell towers, the angles of the signals received from the
mobile device are used to form geometric triangles.
The exact position of the device is determined using trigonometry, similar
to how it is done in land surveying.
Triangulation and Trilateration
Triangulation in Mobile Networks:
Accuracy: Depends on precise measurement of angles. Works best with
high-resolution directional antennas and minimal signal reflection (line of
sight).
Resource Requirements:
Directional antennas or AoA measurement equipment.
Multiple base stations with overlapping coverage areas.
Challenges:
Signal reflection or multipath propagation in urban environments can
distort angle measurements.
Limited accuracy in non-line-of-sight (NLOS) conditions.
Triangulation and Trilateration
Trilateration in Mobile Networks:
Principle: Relies on measuring the distances between the mobile device
and multiple cell towers.
Method:
In trilateration, the mobile network measures the time it takes for a signal
to travel between the mobile device and the nearest cell towers, known as
Time of Arrival (ToA) or Time Difference of Arrival (TDoA).
By calculating the distance from the device to at least three towers, circles
(in 2D) or spheres (in 3D) are drawn around the towers.
The intersection of these circles or spheres represents the mobile device’s
location.
Triangulation and Trilateration
Trilateration in Mobile Networks:
Accuracy: Generally more reliable than triangulation, especially with accurate
distance measurements. However, accuracy depends on:
● The precision of ToF or RSSI measurements.
● Placement and density of reference points.
Resource Requirements:
● Requires synchronized clocks (for ToF) or calibrated signal strength
measurements (for RSSI).
● Multiple reference points with known positions.
Challenges:
● Multipath effects, signal interference, and environmental factors can distort
distance estimates.
● NLOS conditions reduce accuracy.
Triangulation and Trilateration Comparison
Triangulation Trilateration
● Including the database files, system files and logs. File System
Extraction can examine the file structure, the web browsing including
history and downloads and logins, usage of Apps, their history and
chats etc.
What is a Filesystem Extraction?
● Deleted data remains intact within the database and is recoverable
until the database performs routine maintenance and is cleaned up.
e.g. iMessage, SMS, MMS, Calendar and others, store their
information in database files.
What is a Physical Extraction?
● least supported extraction method
● because getting full access to the internal memory of a mobile device
is completely dependent upon the operating system and security
measures employed by the manufacturer like Apple and Samsung.
● File System Extraction and the Physical Extraction they bypass the OS
of the device. This is done at a stage just before the OS of device
starts to set in. The stage is called BOOTLOADER.
Methodology used by Forensic Experts
Bootloader
● starts up when a device is turned on.
● is the low-level software on your device that allows the next Software
on your device i.e. OS to run.
● Without a Bootloader your OS will not run and you will not be able to
see the Graphic User Interface (GUI) on your mobile.
Methodology used by Forensic Experts
Forensic Tools
● The Forensic Experts use their Forensic Tools to disturb the working
of Bootloader.
● In the normal course of working a Bootloader prompts the OS to start.
● But the Forensic Tools used would give a command to the Bootloader
not to prompt the OS of the device rather they force their own
different OS to start and fetch the data available in device.
Methodology used by Forensic Experts
Data Extraction
everything depends upon the comparative penetrating power of the tools
employed by the Forensic Experts and the structure in which the data of
the device is kept in the internal memory
i.e. the file structure
Even the latest tools are unable to fetch data from some closed source of
OS e.g. iOS, Symbian, BlackBerry.
Characteristics of methods
1 Logical Extraction File System Extraction Physical Extraction
Process Retrieves data from the user- Creates a snapshot of the entire Accesses the raw storage of the
accessible areas of the device, file system, requiring root/jailbreak device directly, often bypassing the
often using standard protocols access for modern devices. operating system.
(e.g., USB, Wi-Fi).
Method of Data Retrieval Uses the operating system's Copies the entire file system, Copies raw data directly from the
interface to extract visible data. including system files and hidden NAND flash storage (physical
files. memory).
Data Retrieved User-accessible data such as User data, app data (including All data on the device, including
contacts, call logs, text messages, caches), system files, and partially deleted data, unallocated space,
photos, and app data. deleted files. and system files.
Tools Used XRY, Cellebrite UFED, mobile Oxygen Forensic Detective, UFED Chip-off, JTAG, FTK Imager,
device management software. Physical Analyzer, EnCase. Cellebrite Physical Analyzer.
Example Data Text messages, call logs, photos, App caches, system settings, app All data, including deleted text
contacts, calendar events. databases, and partially deleted messages, photos, and
data. unallocated space.
Tools needed in a Mobile Device Investigation.
● Oxygen Forensic Detective
● Cellebrite UFED
● XRY
● CAINE
● SANS SIFT
● HELIX3
Oxygen Forensic Detective
● Oxygen Forensic Detective is capable of extracting data from a
number of different platforms, including mobile, IoT, cloud services,
drones, media cards, backups and desktop platforms.
● The main UFED offering focuses on mobile devices, but the general
UFED product line targets a range of devices, including drones, SIM
and SD cards, GPS, cloud and more. The UFED platform claims to
use exclusive methods to maximize data extraction from mobile
devices.
XRY
● XRY is a collection of different commercial tools for mobile device
forensics. XRY Logical is a suite of tools designed to interface with
the mobile device operating system and extract the desired data.
● XRY Physical, on the other hand, uses physical recovery techniques
to bypass the operating system, enabling analysis of locked devices.
CAINE
This platform was developed by the SANS Institute and its use is taught in
a number of their courses.
HELIX3
If you want the free version, you can go for HELIX3 2009 R 1.