Mobile Forensics Fundamentals
Mobile Forensics Fundamentals
Mobile devices are often seized switched on, as the purpose of their
confiscation is to preserve evidence.
A Faraday box/bag and external power supply are common types of equipment for conducting mobile forensics.
While the former is a container specifically designed to isolate mobile devices from network communications and, at
the same time, help with the safe transportation of evidence to the laboratory, the latter, is a power source embedded
inside the Faraday box/bag. Before putting the phone in the Faraday bag, disconnect it from the network, disable all
network connections (Wi-Fi, GPS, Hotspots, etc.), and activate the flight mode to protect the integrity of the evidence.
Once data is acquired, the data and device need to be securely stored
until they’re needed for further investigation.
Preservation is usually done in either physical or digital storage
systems-or preferably in a smart management system that can
integrate with evidence management systems.
Critical Steps in Preserving Digital Evidence:
They are used to verify the Authenticity and Integrity of the image as an
exact replica of the original media.
When admitting evidence in the court, hash values are critical as altering
even the smallest bit of data will generate a completely new hash value.
When you perform any modifications like creating a new file or editing an
existing file on your computer, a new hash value is generated for that file.
Hash value and other file metadata are not visible in a normal file explorer
window but analysts can access this information using special software.
If the hash values of the image and the original evidence do not match, it
may raise concerns in court that the evidence has been tampered with.
MD5
Message Digest 5 (MD5) is a common hashing
algorithm that produces a 128-bithash.
Hashes are commonly shown in hexadecimal
Hashing format instead of a stream of 1s and 0s.
Algorithms For example, an MD5 hash is displayed as 32
hexadecimal characters instead of 128 bits.
Hexadecimal characters are composed of 4 bits
and use the numbers 0 through 9 and the
characters a through f.
SHA
Secure Hash Algorithm (SHA) is another hashing algorithm. There are several variations
of SHA grouped into four families—SHA-0, SHA-1, SHA-2, and SHA-3:
SHA-0 is not used.
SHA-1 is an updated version that creates 160-bit hashes. This is similar to the MD5 hash
except that it creates 160-bit hashes instead of 128-bit hashes.
SHA-2 improved SHA-1 to overcome potential weaknesses. It includes four
versions. SHA-256 creates 256-bit hashes and SHA-512 creates 512-bit hashes.
SHA-224 (224-bit hashes) and SHA-384 (384-bit hashes) create truncated versions
of SHA-256 and SHA- 512, respectively.
SHA-3 (previously known as Keccak) is an alternative to SHA-2. The S. National
Security Agency (NSA) created SHA-1 and SHA-2. SHA-3 was created outside of the
NSA and was selected in a non-NSA public competition. It can create hashes of the
same size as SHA-2 (224 bits, 256 bits, 384 bits, and 512 bits).
The Daubert standard, named after US Supreme Court
Justice Clarence Thomas, states that when an expert
testifies in the form of an opinion, the expert must be
qualified to provide the opinion.
The expert must have sufficient background
knowledge, training, and experience to provide
meaningful testimony.
Daubert’s
They need to understand the subject matter and
Standard provide a valid basis for their opinion.
The Daubert standard for digital forensics is reliable,
relevant, and trustworthy evidence.
For evidence to be reliable, it must be repeatable. For
evidence to be relevant, it must be material to the
prosecuted case.
Locard’s Consult PDF file shared
Exchange