20.4.3 Bootloaders: Loader. This Code Has Very Basic Functionality and Is Comparable To The BIOS
20.4.3 Bootloaders: Loader. This Code Has Very Basic Functionality and Is Comparable To The BIOS
cases, the only available option may be to run a software agent in order
to acquire data from a specific mobile device. Digital investigators must
weigh these issues against the benefits of acquiring some information from
a device. In addition, it may be necessary to explain that the acquired digital
evidence is trustworthy despite any concerns raised by the use of a software
agent on the device.
20.4.3 Bootloaders
When a mobile device is powered on, the first code it executes is called a boot
loader. This code has very basic functionality and is comparable to the BIOS
on Intel computers. During normal use of a mobile device, the boot loader
simply launches the operating system to enable the user to interact with the
device. However, the boot loader can be interrupted during the startup process
to prevent the operating system from launching and can then be instructed to
execute custom operations. In this way, forensic tools can use the boot loader
to gain access to memory on a mobile device.
FIGURE 20.17
Twister Flasher box can
connect to FBUS interface
on Nokia device to acquire
data using the Sarasoft
program.
28 CHAPTER 20: Digital Evidence on Mobile Devices
20.4.5 JTAG
JTAG (Joint Action Test Group) refers to the IEEE 1149.1 standard (http://
grouper.ieee.org/groups/1149/1/). The JTAG standard specifies an interface
for standardized approaches to test integrated circuits, interconnections
between components, and a means of observing and modifying circuit
activity during a component’s operation (Breeuwsma, 2006). It is a stan-
dard feature found in many mobile phones, as it provides manufacturers
a low-level interface to the device that is not dependent on the operating
system. However, the JTAG specifications for individual phones are not avail-
able outside the manufacturer. JTAG is of interest to forensic investigators
and analysts, as it can theoretically provide direct access to a mobile phone’s
memory without any chance of altering it. However, the time and knowledge
required to achieve this is substantial—not only requiring an understanding
of JTAG for the specific model of phone, but also to reconstruct the resulting
binary comprised of the device’s memory structures. Despite the limitations
in using JTAG as a forensic extraction mechanism, it provides the most com-
mon method of physical extraction. JTAG is common across multiple device
manufacturers and there are multiple devices that extract memory structures
through JTAG.
■ Survey the available items to become familiar with the main sources of
information on the mobile device.
■ Recover any deleted items including files, SMS messages, call logs, and
multimedia.
■ Harvest metadata from active and recovered items such as date-time
stamps, file names, and whether messages were read and calls were
incoming, outgoing, or missed.
■ Conduct a search and methodical inspection of the evidence, including
keyword searches for any specific, known details related to the
investigation.
■ Perform temporal and relational analysis of information extracted from
memory, including a timeline of events and link chart.
■ Validate important results because even forensic tools have bugs.
When dealing with active data on a baseline mobile device, it may be pos-
sible to examine all of the acquired messages, call logs, calendar entries, and
other items stored on the device. However, when the complete file system or
a full physical memory dump was acquired from a mobile device, it is gener-
ally infeasible to examine every file or data fragment stored on the device. In
such cases, digital investigators must develop a strategy to find relevant digital
evidence. Surveying the acquired data by looking through folders and viewing
the contents of files on a mobile device can lead to some useful items and may
help with the development of a strategy, but this process is not a substitute
for a methodical forensic examination. A strong forensic examination strat-
egy should take into account what is known about the crime and the types of
information that are being sought. For example, when there is a specific time
period of interest in a case, examining all activities on the mobile device and
reconstructing a timeline of events may be an effective strategy. As another
example, when digital photographs are of interest in a case, an effective strategy
to findings all relevant items on a mobile device may be to employ a combina-
tion of file system examination, keyword searching, and file carving.
operating system developed by Qualcomm, which has its own file system.
The file system on many CDMA devices can be viewed using BitPim as shown
in Figure 20.18. However, using BitPim it may not be possible to view date-
time stamps associated with files or acquire the entire file system for later
examination using other tools. Commercial forensic tools such as Cellebrite
can acquire the full logical file system from many mobile devices, including
metadata such as date-time stamps.
FIGURE 20.18
BitPim used to browse the
file system on a Motorola
CDMA device.
Some mobile devices use the FAT file system to arrange data in memory,
others use Linux ext2/ext3 file systems, and iPhones use HFSX which is
unique to Apple computer systems. As a result, it is often possible to per-
form a forensic analysis of a physical forensic duplicate of mobile devices
using file system forensic tools such as those covered in Chapters 17, 18,
and 19. Figure 20.19 shows a forensic duplicate of an iPhone being exam-
ined using FTK.
20.5 Forensic Examination and Analysis of Mobile Devices 31
FIGURE 20.19
Examination of iPhone physical forensic duplicate using FTK.
Even when a full copy of physical memory is not possible, for many devices the
complete logical file system can be acquired. Although this generally does not
include deleted items, it can still provide access to substantial digital evidence
including MMS messages, IM fragments, and Web browsing history that are
not displayed automatically by forensic tools. In such situations, the foren-
sic examiners must locate the desired information within the file system and
interpret it themselves. This is one of the main reasons why it is important for
practitioners to have an understanding of the underlying technology and not
be overly reliant on automated tools.
As an example, Figure 20.20 shows a file named “MMS937483931.PDU” that
was extracted from the file system of an LG mobile device. This file contains an
MMS message with a video that can be recovered even after the original video
file was deleted from the device. These MMS files start with an SMIL header that
includes the name of the attached file, followed by the actual content of the
attachment (Casey, 2009).
32 CHAPTER 20: Digital Evidence on Mobile Devices
FIGURE 20.20
File from an LG mobile device containing an MMS message with a video attachment that can be recov-
ered even after the original video has been deleted from the file system.
FIGURE 20.21
Deleted photographs recovered from the reconstructed FAT file system in a physical memory dump of a Samsung mobile device.