SCI4201 Lecture 10 - Mobile Forensics
SCI4201 Lecture 10 - Mobile Forensics
Lecture 10
Mobile Forensics
Objectives
• Explain the basic concepts of mobile
device forensics
• Describe procedures for acquiring data
from cell phones and mobile devices
• Identify Mobile Forensics Tools
• Discuss Mobile Forensics Challenges
Introduction
• Criminals use mobile phones, laptop computers
and network servers in the course of
committing their crimes.
• Mobile phone forensics is the science of
recovering digital evidence from a mobile
phone under forensically sound conditions.
• It includes recovery and analysis of data from
mobile devices’ internal memory,SD cards and
SIM cards.
• Data from GSMA Intelligence (2023) shows that
there were 14.08 million cellular mobile
connections in Zimbabwe at the start of 2023.
Mobile Device Forensics Overview
Cell Phone Forensics Short History
• Originated in Europe and focused on the GSM
SIM card. Roaming of Devices from Network and
Spectrum Required - I.D. Info on SIM – Also SMS,
Phonebooks, and Last Numbers Dialled on SIM
• Terrorist use of phones as IED detonators
Increased the demand for mobile forensics. Mobile
device forensics is making a real impact in the war on
terror.
• Adoption Has Moved Quickly.
Mobile Device Forensics Overview
Mobile Device Forensics Today
The offence is also committed when an individual acquires data within a computer
system or data which is transmitted to or from a computer system. The offence attracts a
fine not exceeding level 14 or imprisonment for a period not exceeding five years or both
a fine and imprisonment.
Mobile Forensics - Cellular Networks
code (PUK)
Typical Network Structure
Network Structure
b EIR – Equipment Identity Register -
Holds Phone Identity. Can Be Used to Locate Stolen Devices
VLR
BSC
BTS
Interface)
b Call Type for Billing Purposes (Day/Night +
Weekend)
b Length of Call
b Start and Stop Time
b Location Area Code (LAC)
b Cell Identity – Start CI and Finish CI
A PIN Locked SIM is Not Accessible Without PIN – Requires PUK From Carrier
Data Capture Options
• Screen Captures: The simplest way. Use a camera to take pictures of
what’s on the screen. Reporting tools available. Sometimes this is the
only way.
• Logical Analysis: – Extracting the data on the device that you see and
can access on the device. No deleted information with this method. Call
logs, phone books, sms messages, pictures, email, browsing etc. The
“active” information on the device can be extracted using a “Logical”
extraction tool. This is the standard method today. Plenty of tools and
easy to use.
• Physical Analysis: – The practice of extracting data from the physical
memory of the device, and removable memory. Like PC forensics, you
are getting the raw binary / hex data. Requires decoding and
understanding of language and techniques used by device
manufacturers. Physical analysis is the way to deleted information, but it
is difficult and sparsely supported. Only a few tools. Mostly Nokia
supported. Early days of the new standard.
• Chip Level Analysis: - Analysis of the chips in the phone by removing
them from the device and probing for data, or rebuilding another phone.
Extremely technical. Broken SIMs analyzed this way.
Cell Site Analysis
Other Data Available For Investigators -
Cell Site Analysis
What Is It?
The Analysis of a Mobile Network’s Radio
Signal Coverage Relative to Its Users
Cell Site Analysis
Other Data Available For Investigators -
Cell Site Analysis
How Is It Useful?
Cell Site Analysis Shows the Real Coverage of the
Network’s Signal – Used In Conjunction with
Network Call Data Records to Prove / Disprove
Users Location on the Network.
“Logical” Acquisition
Pulls the “Active”
Data off the device…
Basically, anything
you can see or
access using the
keypad.
Static Acquisition
Today’s Top
Tools:
XRY
Physical
And
UFED Physical
“Physical” Acquisition Accesses the Internal Memory and Pulls the Raw Data
from the Memory. Formats and Storage Differ From Manufacturer to
Manufacturer.
Seizing Evidence from an iPhone
• iPhone has four-digit pin
– Use automated process to break, e.g., XRY
• If forensic workstation has iTunes:
– Plug iPhone into the workstation, and use
iTunes to extract device information
Information from an iPhone device
image
• Library_CallHistory_call_history.db
– Contains entire call history
• Library_Cookies_Cookies.plist
– Contains cookies (history of the user’s Internet
activities)
• Library_Preferences_com.apple.mobileemail.plist
– Information about e-mail sent and received from the
phone
• Library_Preferences_com.apple.mobilevpn.plist
– Indicates if user used device to communicate
over a VPN
• Deleted files are in .Trashes\501
Mobile Forensics Tools
• Mobile phone forensics tools
– Andriod: AccessData FTK Imager
– iOS: MacLockPick 3.0
• Paraben Software offers several tools:
– Device Seizure - used to acquire data from a
variety of phone models
– Device Seizure Toolbox - contains assorted
cables, a SIM card reader, and other
equipment
• BitPam – Can view data on many CDMA phones
• Cellebrite UFED Forensic System - works on
smartphones, PDAs, tablets, and GPS devices
• MOBILedit Forensic - contains a built-in write-
blocker
Mobile Forensics Tools (Cont.)
• SIMcon used to recover files on a GSM/3G SIM
or USIM card and includes the following
features:
– Reads files on SIM cards
– Analyzes file content
– Recovers deleted text messages
– Manages PIN codes
– Generates reports that can be used as evidence
– Archives files with MD5 and SHA-1 hash values
– Exports data to files that can be used in spreadsheets
– Supports international character sets
Mobile Forensic Tools
Mobile Forensics Tools
Android Devices iOS Devices