0% found this document useful (0 votes)
64 views22 pages

Mobile Device Forensic Tool Test Specification V 3.2

Uploaded by

Moussa Fatah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views22 pages

Mobile Device Forensic Tool Test Specification V 3.2

Uploaded by

Moussa Fatah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

1 January 2024

3 Mobile Device Forensic Tool Specification, Test


4 Assertions and Test Cases
5
6
7 Version 3.2
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33

34
35 Disclaimer
36
37 Certain commercial entities, equipment, or materials may be identified in this document in order to
38 describe an experimental procedure or concept adequately. Such identification is not intended to
39 imply recommendation or endorsement by the National Institute of Standards and Technology, nor
40 is it intended to imply that the entities, materials, or equipment are necessarily the best available for
41 the purpose.

2 of 22
42 Abstract
43
44 This specification defines requirements, test assertions and test cases for extracting and reporting
45 evidence of probative value from mobile devices, including smart phones, tablets, Universal
46 Integrated Circuit Cards (UICCs) and feature phones. Mobile devices contain a wealth of
47 information potentially relevant to an investigation.
48
49 This document defines mobile forensic data acquisition tool requirements. The requirements are
50 used to derive test assertions, statements of conditions that are checked after a test case is run. Each
51 test assertion is covered by one or more test cases consisting of a test protocol and the expected test
52 results. The test case protocol specifies detailed procedures for setting up the test, executing the test,
53 and measuring the test results.
54
55 Comments and feedback are welcome. This document, and future revisions, are available for
56 download at: https://www.cftt.nist.gov/mobile_devices.htm.
57

3 of 22
58

4 of 22
59 TABLE OF CONTENTS
60
61 1 Introduction .............................................................................................................................. 6
62 2 Purpose ..................................................................................................................................... 6
63 3 Scope ........................................................................................................................................ 6
64 4 Definitions ................................................................................................................................ 7
65 5 Background ............................................................................................................................ 11
66 5.1 Mobile Device Characteristics – Internal Memory ............................................................ 11
67 5.2 Identity Module (UICC) Characteristics ............................................................................ 11
68 5.3 Extractable Digital Artifacts............................................................................................... 12
69 5.4 SQLite Databases ............................................................................................................... 12
70 6 Requirements & Test Assertions ............................................................................................ 14
71 6.1 Requirements for Core Features ......................................................................................... 14
72 6.2 Requirements for Optional Features .................................................................................. 15
73 7 Mobile Device Test Cases ...................................................................................................... 18
74
75

5 of 22
76 1 Introduction
77 There is a critical need in the law enforcement community to ensure the reliability of computer
78 forensic tools. A capability is required to ensure that forensic tools consistently produce accurate,
79 repeatable and objective test results. The goal of the Computer Forensic Tool Testing (CFTT) project
80 at the National Institute of Standards and Technology (NIST) is to establish a methodology for testing
81 computer forensic tools by the development of functional specifications, test procedures, test criteria,
82 test sets, and test hardware. The results provide the information necessary for toolmakers to improve
83 tools, for users to make informed choices about acquiring and using computer forensics tools, and for
84 interested parties to understand the tools’ capabilities. This approach for testing computer forensic
85 tools is based on well-recognized international methodologies for conformance testing and quality
86 testing. This project is further described at http://www.cftt.nist.gov/.
87
88 The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of
89 Homeland Security (DHS) Science and Technology Directorate, the National Institute of Justice
90 (NIJ), and the National Institute of Standards and Technology.
91

92 2 Purpose
93 This specification defines requirements, test assertions and test cases for mobile device forensic tools
94 capable of performing the following tasks:
95
96 1. Performing a logical acquisition of mobile device data artifacts into an image file.
97 2. Performing a physical acquisition via bootloader of a mobile device’s memory into an image
98 file.
99 3. Extraction and presentation of data artifacts from an image file created by the tool.
100 4. Extraction and presentation of data artifacts from an image file created by a hardware
101 technique such as JTAG (Joint Test Action Group) or chip-off.
102
103 The requirements are used to derive test assertions, statements of conditions that are checked after a
104 test case is run. Each test assertion is covered by one or more test cases consisting of a test protocol
105 and the expected test results. The test case protocol specifies detailed procedures for setting up the
106 test, executing the test, and measuring the test results.
107
108 Changes to version 3.1 include addressing SQLite databases and explicitly requiring tools to present
109 supported data to the user rather than the user having to search for a specific file or find the data
110 within a hex dump.
111

112 3 Scope
113 The scope of this specification is limited to software and hardware tools capable of extracting and
114 presenting the internal memory of feature phones, smart phones, tablets and Universal Integrated
115 Circuit Cards (UICC). The mobile device tool specification is general and capable of being adapted
116 to other types of mobile device forensic hardware and software.
117
118

6 of 22
119 4 Definitions
120 This glossary defines terms used within this document.
121
122 Acquisition – The process by which digital data from a mobile device is copied into an image file.
123 There are several types of acquisitions:
124 ▪ Logical acquisition: Extraction of a set of supported digital artifacts from the device
125 memory.
126 ▪ Selective acquisition: Extraction of a subset of supported digital artifacts from the device
127 memory.
128 ▪ File system acquisition: Extraction of the file system structure and content from the device
129 memory.
130 ▪ Physical acquisition: A copy of the device physical memory.
131 ▪ UICC acquisition: Extraction of the supported artifacts from a UICC.
132 Active SQLite data – Table information that comprises the current state of the database (and all
133 associated journal mode files) as of the latest successful commit.
134 Analysis – The examination of acquired data for its significance and probative value.
135 Associated data – Data (e.g., graphics, address, notes, etc.) that are attached with a specific data
136 object such as an address book entry/Contact, Multimedia Messaging Service (MMS) message,
137 etc.
138 Binary Large OBject (BLOB) – A Binary Large Object is a string of binary data stored as a single
139 entity within a database management system. BLOB’s can typically be images, audio, Plists or
140 other multimedia objects.
141 Bluetooth – A wireless protocol that allows two similarly equipped devices to communicate with
142 each other within a short distance (e.g., 9 m).
143 Boot loader – Software temporarily installed on a mobile device enabling access to perform a
144 physical data extraction including unallocated data areas.
145 Case file – A file containing case description data and possibly an image file containing data from
146 an acquisition.
147 Chip-off – Data extraction which involves physically removing flash memory chip(s) from a
148 mobile device.
149 Code Division Multiple Access (CDMA) – A spread spectrum technology for cellular networks
150 based on the Interim Standard-95 (IS-95) from the Telecommunications Industry Association
151 (TIA).
152 CDMA Subscriber Identity Module (CSIM) – CSIM is an application to support CDMA2000
153 phones that runs on a UICC, with a file structure derived from the Removable User Identity
154 Module (R-UIM) card.
155 Data Artifacts – Files or directories stored in the internal memory of a mobile device or UICC such
156 as address book entries, Personal Information Management (PIM) data, call logs, text messages,
157 standalone files (e.g., audio, documents, graphic, video).

7 of 22
158 Deleted File – A file that has been logically, but not necessarily physically, erased from the
159 operating system. Deleting files does not always eliminate the possibility of recovering all or
160 part of the original data.
161 Electronic Serial Number (ESN) – A unique 32-bit number programmed into CDMA phones
162 when they are manufactured.
163 Examination – A technical review that makes the evidence visible and suitable for analysis; as well
164 as tests performed on the evidence to determine the presence or absence of specific data.
165 Feature Phone – A mobile device that primarily provides users with simple voice and text
166 messaging services.
167 File System – A software mechanism that defines the way that files are named, stored, organized,
168 and accessed on logical volumes of partitioned memory.
169 Global Positioning System (GPS) – A system for determining position by comparing radio signals
170 from several satellites.
171 Global System for Mobile Communications (GSM) – A set of standards for second generation,
172 cellular networks currently maintained by the 3rd Generation Partnership Project (3GPP).
173 Internal Memory (IM) – Volatile and non-volatile storage space for user data.
174 Instant Messages – A facility for exchanging messages in real-time with other people over the
175 Internet and tracking the progress of a given conversation.
176 Integrated Circuit Card ID (ICCID) – The unique serial number assigned to, maintained within,
177 and usually imprinted on the UICC.
178 International Mobile Equipment Identity (IMEI) – A unique identification number programmed
179 into GSM and the Universal Mobile Telecommunications System (UMTS) mobile devices.
180 International Mobile Subscriber Identity (IMSI) – A unique number associated with every GSM
181 mobile phone subscriber, which is maintained on a UICC.
182 Joint Test Action Group (JTAG) – A method for performing a physical data extraction involving
183 connecting to Test Access Ports (TAPs) of supported devices and instructing the processor to
184 transfer the raw data stored on memory chips.
185 Journal mode – SQLite functionality that provides rollback abilities in accordance with Atomic,
186 Consistent, Isolated, and Durable (ACID) transactions. This refers to either a -journal or -wal
187 file.
188 Location Information (LOCI) – The Location Area Identifier (LAI) of the phone’s current
189 location, continuously maintained on the UICC when the phone is active and saved whenever
190 the phone is turned off.
191 Logical acquisition: A bit-by-bit copy of active storage objects (e.g., Address book, Personal
192 Information Management data, Call logs, text messages, stand-alone data files) that reside on a
193 logical store (e.g., a file system partition).
194 Image File – A file created from the data present on a mobile device. This may be a stand-alone
195 file, (e.g., a binary bit-stream image of a digital device memory from a JTAG or chip-off
196 acquisition), or may be embedded in another file, (e.g., embedded in a case file).

8 of 22
197 Mobile Device Tool (MDT) –A tool capable of presenting and possibly acquiring the contents of
198 the internal memory of a mobile device.
199 Mobile Devices – A hand-held device that has a display screen with touch input and/or a keyboard
200 and may provide users with telephony capabilities. Mobile devices are used for both, phones and
201 tablets, throughout this document.
202 Mobile Equipment Identity (MEID) – An ID number that is globally unique for CDMA mobile
203 phones that identifies the device to the network and can be used to flag lost or stolen devices.
204 Mobile Subscriber Integrated Services Digital Network (MSISDN) – The international
205 telephone number assigned to a cellular subscriber.
206 Multimedia Messaging Service (MMS) – An accepted standard for messaging that lets users send
207 and receive messages formatted with text, graphic, audio, and video clips.
208 Personal Information Management (PIM) Applications – A core set of applications that provide
209 the electronic equivalents of such items as an agenda, address book, notepad, and reminder list.
210 Personal Information Management (PIM) Data – The set of data types such as contacts,
211 calendar, notes, memos, and reminders maintained on a mobile device.
212 Physical acquisition: A bit-by-bit acquire of the mobile device internal memory. This allows
213 recovery of more deleted data than a logical or file system data acquisition.
214 Personal Identification Number (PIN) – A number that is 4 to 8 digits in length used to secure
215 mobile devices from unauthorized access.
216 Personal Unblocking Key (PUK) – A key used to regain access to a Universal Integrated Circuit
217 Card (UICC) whose PIN attempts have been exhausted.
218 Removable User Identity Module (R-UIM) – A card developed for cdmaOne/CDMA2000
219 handsets that extends the GSM Subscriber Identity Module (SIM) card to CDMA phones and
220 networks.
221 Rollback journal – This is a file associated with each SQLite database that holds information used
222 to restore the database file to its initial state during the course of a transaction while in journal
223 mode. This file is located in the same directory as the database with the string “-journal”
224 appended to its filename.
225 Short Message Service (SMS) – A cellular network facility that allows users to send and receive
226 text messages made up of alphanumeric characters on their handset.
227 Smart phone – A full-featured mobile phone that provides users with personal computer like
228 functionality by incorporating PIM applications, native, hybrid and web applications, enhanced
229 Internet connectivity and email.
230 Stand-alone data – Data (e.g., audio, documents, graphic, video) that is not associated with or has
231 not been transferred to the device via MMS message.
232 SQLite – SQLite is an embedded Structured Query Language (SQL) relational database engine that
233 implements a self-contained, serverless, zero-configuration, transactional SQL database engine.
234 SQLite Table – A data structure that organizes information into rows and columns. It can be used
235 to store and display data in a structured format.
236 Subscriber Identity Module (SIM) – A smart card chip specialized for use in GSM equipment.

9 of 22
237 Supported Data Artifacts – Data artifacts (e.g., subscriber, equipment information, PIM data, text
238 messages, stand-alone data, MMS messages and associated data) that the mobile device forensic
239 tool has the ability to acquire according to the tool documentation.
240 Timeline Analysis – Provides the ability to place system activities or events at a particular time tied
241 to a standard time such as UTC.
242 Universal Integrated Circuit Card (UICC) – An integrated circuit card that securely stores the
243 international mobile subscriber identity (IMSI) and the related cryptographic key used to
244 identify and authenticate subscribers on mobile devices. A UICC may be referred to as a: SIM,
245 USIM, R-UIM or CSIM, and is used interchangeably with those terms.
246 UMTS Subscriber Identity Module (USIM) – A module similar to the SIM in GSM/General
247 Packet Radio Service (GPRS) networks, but with additional capabilities suited to 3G networks.
248 User data – Data stored in the memory of a mobile device.
249 Volatile Memory – Memory that loses its content when power is turned off or lost.
250 Write-Ahead Log (WAL) – A file that records SQLite transactions that have been committed, but
251 not yet applied to the database. This file is in the same directory as the database with the string
252 “-wal“ appended to its filename. As of version 3.7.0 (dated 7/21/2010) this file type is the most
253 commonly used method when SQLite journaling mode is enabled.
254 WiFi data – Data such as Service Set Identifier (SSID), Media Access Control (MAC) addresses,
255 router passwords and access times collected from a mobile device that has accessed a wireless
256 network.

10 of 22
257 5 Background
258

259 5.1 Mobile Device Characteristics – Internal Memory


260 Mobile devices contain both volatile and non-volatile memory. Volatile memory (i.e., Random Acess
261 Memory (RAM)) is used for dynamic storage and its contents are lost when power is drained from
262 the mobile device. Non-volatile memory is persistent as its contents are not affected by loss of power
263 or overwriting data upon reboot (e.g., solid-state drives (SSD) that store persistent data on solid-state
264 flash memory).
265
266 Although data present on mobile devices may be stored in a proprietary format, forensic tools tailored
267 for mobile device acquisition should minimally be able to perform a logical acquisition for supported
268 devices and provide a report of the data present in the internal memory. Tools that possess a low-level
269 understanding of the proprietary data format for a specific device may provide examiners with the
270 ability to perform a physical acquisition and generate reports in a meaningful (i.e., human-readable)
271 format.
272

273 5.2 Identity Module (UICC) Characteristics


274 Identity modules (commonly known as SIM cards or UICC) are used with mobile devices that
275 interoperate with GSM cellular networks. Under the GSM framework, a mobile device is referred to
276 as a Mobile Station and is partitioned into two distinct components: the UICC and the Mobile
277 Equipment (ME). A UICC, commonly referred to as an identity module (e.g., Subscriber Identity
278 Module [SIM], Universal Subscriber Identity Module [USIM], CDMA Subscriber Identity Module
279 [CSIM]), is a removable component that contains essential information about the subscriber. The ME
280 and the radio handset portion cannot fully function without a UICC. The UICC’s main purpose is
281 authenticating the user of the mobile device to the network providing access to subscribed services.
282 The UICC also offers storage for personal information, such as phonebook entries, text messages, last
283 numbers dialed (LND) and service-related information.
284 A preset number of attempts (usually three) are allowed for providing the correct PIN code to the
285 UICC before further attempts are blocked completely, rendering communications inoperative. Only
286 by providing a correct PIN Unblocking Key (PUK) may the value of a PIN and its counter be reset
287 on the UICC. If the number of attempts to enter the correct PUK value exceeds a set limit, normally
288 ten, the card becomes blocked permanently. The PUK for a UICC may be obtained from the service
289 provider or network operator by providing the identifier of the UICC (i.e., Integrated Circuit Chip
290 Identifier or ICCID). The ICCID is normally imprinted on the front of the UICC, but may also be
291 read from an element of the file system.
292 Following the GSM 11.111 standard, mobile device forensic tools designed to extract data from a
293 UICC either internally or with an external Personal Computer/Smart Card (PC/SC) reader, should be
294 able to properly acquire, decode, and present data in a human-readable format. A limited amount of
295 information may be stored on UICCs such as Abbreviated Dialing Numbers (ADNs), Last Numbers
296 Dialed (LND), SMS messages, subscriber information (e.g., IMSI), and location information (i.e.,
297 Location Information [LOCI], General Packet Radio Service Location [GPRSLOCI]).

1
http://www.ttfn.net/techno/smartcards/gsm11-11.pdf

11 of 22
298 5.3 Extractable Digital Artifacts
299 The amount and richness of data contained on mobile devices varies based upon the manufacturer
300 and OS. Installed applications provide investigators with a rich repository of data that can be relevant
301 to an investigation. However, there is a core set of data that mobile device forensic tools can recover
302 that remains constant across most mobile devices. Tools should have the ability to recover the
303 following supported data artifacts stored in the device’s internal memory and UICC memory outlined
304 in sections 5.3.1 and 5.3.2.
305

306 5.3.1 Internal Memory Artifacts


307 ▪ Subscriber and equipment identifiers: IMEI, MEID/ESN
308 ▪ PIM data: address book/phonebook/contacts, calendar, memos, etc.
309 ▪ Call logs: incoming, outgoing, missed
310 ▪ Text messages: SMS, MMS (audio, graphic, video)
311 ▪ Instant messages
312 ▪ Stand-alone files: audio, documents, graphic, video
313 ▪ Electronic mail
314 ▪ Web activity: history, bookmarks
315 ▪ GPS / Geo-location related data: longitude and latitude coordinates
316 ▪ Social media related data
317 ▪ WiFi Data (SSID, MAC address, passwords, access date/time)
318 ▪ Financial Applications (Card type, Last 4 digits of card number, Expiration date, date/time of
319 transaction, participants, transfer amount, description)
320 ▪ Fitness Applications (date/time, distance traveled, energy burned, heart rate, steps, flights
321 climbed, travel speed, routes)
322

323 5.3.2 UICC Memory Artifacts


324 ▪ Service Provider Name (SPN)
325 ▪ Integrated Circuit Card Identifier (ICCID)
326 ▪ International Mobile Subscriber Identity (IMSI)
327 ▪ Mobile Subscriber International ISDN Number (MSISDN)
328 ▪ Abbreviated Dialing Numbers (ADNs)
329 ▪ Last Numbers Dialed (LND)
330 ▪ Text messages (SMS)
331 ▪ Location (LOCI, GPRSLOCI)
332

333 5.4 SQLite Databases


334 SQLite was developed nearly twenty years ago. It has become the most widely deployed and used
335 database engine in the world. It is used by every instance of Google Chrome and Firefox browser in
336 existence. Particularly important to mobile forensic analysts, it is also installed on every Android and
337 iOS device in existence today. It is the default database storage format for the millions of mobile
338 device applications for both of these operating systems.
339

12 of 22
340 As of January 2020, Statistia reports that there are over 1,840,000 applications in the Apple App Store
341 (iOS devices) and 2,570,000 applications in the Google Play Store (Android devices)2. That’s a
342 combined total of over 4.3 million different applications that an examiner may encounter for any
343 particular case. The focus of testing will be on popular apps that are most likely to be forensically
344 relevant, such as communications including social media apps.
345
346 The SQLite data covered within this mobile specification addresses active data as contained within
347 SQLite databases. Deleted SQLite data is quite complex in nature and therefore, not covered within
348 this document. This topic is covered in SQLite Deleted Data Recovery Specification, Test Assertions
349 and Test Cases.
350
351

2
Source: https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/

13 of 22
352 6 Requirements & Test Assertions
353 This section lists the mobile device forensic tool requirements that are tested. Each requirement is
354 followed by a set of one or more test assertions, statements that can be checked after a test case is
355 performed. There are requirements for core features that all tools must meet and also requirements
356 for optional features. The requirements for optional features only apply if the tool supports the
357 feature.
358

359 6.1 Requirements for Core Features


360 The following requirements define the essential elements of a mobile acquisition tool.
361
362 MDT-CR-01. A mobile device forensic tool extracts and presents all supported data artifacts from a
363 mobile device image file.
364 MDT-CA-01. The tool presents all subscriber and equipment information available from an
365 image file.
366 MDT-CA-02. The tool presents all PIM (address book, calendar & notes) data available
367 from an image file.
368 MDT-CA-03. The tool presents all call data (call type (incoming, outgoing, missed), date-
369 time stamps, duration) available from an image file.
370 MDT-CA-04. The tool presents all message (SMS, MMS & instant messages) data
371 available from an image file.
372 MDT-CA-05. The tool presents all stand-alone (audio, documents, graphic & video,) files
373 available from an image file.
374 MDT-CA-06. The tool presents all browsing (history & bookmarks) data available from an
375 image file.
376 MDT-CA-07. The tool presents all email data available from an image file.
377 MDT-CA-08. The tool presents all social media application data available from an image
378 file.
379 MDT-CA-09. The tool presents all geo-location application data available from an image
380 file.
381 MDT-CA-10. The tool presents all supported WiFi data (SSID, MAC Addresses,
382 Passwords, Access Times) from an image file.
383
384 MDT-CR-02. The tool renders text correctly.
385 MDT-CA-11. Presented text is rendered with the correct character glyphs.
386
387 MDT-CR-03. A mobile device forensic tool does not modify a mobile device image file being
388 examined.
389 MDT-CA-12. The tool does not modify an image file.
390
391 MDT-CR-04. A mobile device forensic tool notifies the tool user if a mobile device image file has
392 been modified.
393 MDT-CA-13. If an image file is modified, the tool notifies the user that a change has been
394 made to the image file.

14 of 22
395 6.2 Requirements for Optional Features
396 This section lists requirements for optional tool features. If a tool provides the defined feature, the
397 tool is tested for conformance to the requirements for the feature. If the tool does not support the
398 feature, the requirement does not apply.
399
400 The following optional features are identified:

401 6.2.1 Image File Creation


402 The following requirements and test assertions only apply if a mobile device forensic tool supports
403 acquisition of a supported mobile device.
404
405 MDT-RO-01. A mobile device forensic tool creates an image file from a physical memory
406 acquisition (e.g., boot loader).
407 MDT-AO-01. An image file is created of physical memory.
408
409 MDT-RO-02. A mobile device forensic tool creates an image file from a logical acquisition of all
410 supported memory artifacts.
411 MDT-AO-02. An image file is created containing supported memory artifacts.
412
413 MDT-RO-03. A mobile device forensic tool creates an image file from a logical acquisition of
414 selected memory artifacts.
415 MDT-AO-03. An image file is created containing selected artifacts.
416
417 MDT-RO-04. A mobile device forensic tool creates an image file from an acquisition of the mobile
418 device file system.
419 MDT-AO-04. An image file is created of the device file system.
420
421 MDT-RO-05. A mobile device forensic tool notifies the user if there is a failure to access a
422 connected mobile device.
423 MDT-AO-05. The user is notified if the tool fails to establish a connection or acquire data
424 from a connected mobile device.
425
426 MDT-RO-06. A mobile device forensic tool notifies the user if an acquisition is interrupted before
427 completion.
428 MDT-AO-06. The user is notified if an acquisition is disrupted.
429

430 6.2.2 UICC Access, Acquisition and Presentation


431 The following requirements and test assertions only apply if a mobile device forensic tool supports
432 acquisition and presentation of data from a UICC.
433
434 MDT-RO-07. A mobile device forensic tool allows access to a locked UICC via PIN code and
435 PUK code.
436 MDT-AO-07. A mobile device forensic tool provides a count of remaining authentication
437 attempts for a locked UICC acquisition if an incorrect PIN is entered.

15 of 22
438 MDT-AO-08. A mobile device forensic tool unlocks a locked UICC if the correct PIN code
439 is given to the tool.
440 MDT-AO-09. A mobile device forensic tool provides the examiner with a count of
441 remaining authentication attempts for a locked UICC acquisition if an incorrect PUK code is
442 entered.
443 MDT-AO-10. A mobile device forensic tool unlocks a locked UICC that has been given the
444 maximum number of incorrect PIN codes if the correct PUK code is given to the tool.
445
446 MDT-RO-08. A mobile device forensic tool creates an image file from an acquisition of an
447 unlocked UICC.
448 MDT-AO-11. An image file is created containing supported UICC artifacts.
449
450 MDT-RO-09. A mobile device forensic tool extracts and presents all supported data artifacts from a
451 UICC image file.
452 MDT-AO-12. A mobile device forensic tool presents Service Provider Name (SPN) from a
453 UICC image file.
454 MDT-AO-13. A mobile device forensic tool presents Integrated Circuit Card Identifier
455 (ICCID) from a UICC image file.
456 MDT-AO-14. A mobile device forensic tool presents International Mobile Subscriber
457 Identity (IMSI) from a UICC image file.
458 MDT-AO-15. A mobile device forensic tool presents Mobile Subscriber International ISDN
459 Number (MSISDN) from a UICC image file.
460 MDT-AO-16. A mobile device forensic tool presents Abbreviated Dialing Numbers (ADNs)
461 from a UICC image file.
462 MDT-AO-17. A mobile device forensic tool presents Last Numbers Dialed (LND) from a
463 UICC image file.
464 MDT-AO-18. A mobile device forensic tool presents Text messages (SMS) from a UICC
465 image file.
466 MDT-AO-19. A mobile device forensic tool presents Location (LOCI, GPRSLOCI) from a
467 UICC image file.

468 6.2.3 Deleted Data Artifacts Recovery


469 A forensic tool recovers deleted data artifacts dependent upon its capability.
470
471 MDT-RO-10. A mobile device forensic tool presents recoverable deleted artifacts.
472 MDT-AO-20. If an image file contains recoverable deleted data artifacts and the tool
473 supports data recovery, then the tool presents the recovered deleted items.

474 6.2.4 SQLite Data


475 A forensic tool provides SQLite functionality.
476
477 MDT-RO-11. A mobile device forensic tool shall report the data content of all rows for each active
478 table in the database.
479 MDT-AO-21. The tool shall display numeric values (e.g., integer and floating point values).

16 of 22
480 MDT-AO-22. The tool shall display integer time values as a conventional human readable
481 date and time.
482 MDT-AO-23. The tool shall render text for Text fields, table names, and column names
483 encoded in Unicode Transformation Format (UTF) 8, UTF 16BE, and UTF 16LE.
484 MDT-AO-24. The tool shall decode and display base64 encoded text.
485 MDT-AO-25. The tool shall display graphic image data recorded as a BLOB in the
486 database.
487 MDT-AO-26. The tool shall decode data recorded as a BLOB in the database.
488 MDT-AO-27. The tool shall have the ability to display SQLite BLOB data (e.g., graphic
489 files and plist).
490 MDT-AO-28. The tool shall report all currently active data when WAL mode is in use.
491 MDT-AO-29. The tool shall report all currently active data when journal mode is in use.
492
493 MDT-RO-12. A mobile device forensic tool provides embedded SQLite functionality.
494 MDT-AO-30. The tool shall execute SQLite commands and report the results.
495 MDT-AO-31. The tool shall have the ability to save SQLite commands for later recall.
496

497 6.2.5 Health and Fitness Data


498 The following requirements and test assertions only apply if a mobile device forensic tool supports
499 acquisition of supported health and fitness data from a mobile device.
500
501 MDT-RO-13. A mobile device forensic tool shall report the data content of supported health and
502 fitness applications.
503 MDT-AO-32. The tool presents all supported health and fitness data (datetime, energy
504 burned, distance traveled, heart rate, flights climbed, speed) associated with an installed
505 application.

506 6.2.6 Financial Data


507 The following requirements and test assertions only apply if a mobile device forensic tool supports
508 acquisition of supported financial/banking applications data from a mobile device.
509
510 MDT-RO-14. A mobile device forensic tool shall report the data content of supported
511 financial/banking applications.
512 MDT-AO-33. The tool presents all supported financial/banking data (card type, last 4 digits
513 of credit or debit card, expiration date, datetime of transaction, participants, transfer amount,
514 status, description) associated with an installed application.
515

516 6.2.7 Timeline Analysis


517 The following requirements and test assertions only apply if a mobile device forensic tool supports
518 timeline analysis of reported data across extracted data elements.
519
520 MDT-RO-15. A mobile device forensic tool shall place events or time-stamped artifacts in a
521 temporal sequence using some standard time reference (e.g., local time, UTC, etc.).

17 of 22
522 MDT-AO-34. The tool presents all date and times of supported time-stamped artifacts or
523 activities.
524

525 7 Mobile Device Test Cases


526 The actual test cases selected depends on the tool features supported for a particular mobile device.
527 For example, a tablet would not usually have call logs, but a phone would. A given phone might or
528 might not have a UICC. A given tool may not support particular image file acquisition types and
529 possibly no acquisitions at all but provide analysis capabilities of mobile device images.
530
531 Tools tested are expected to report supported data elements to the user within the GUI. This does
532 not mean having to physically search for data artifacts within a hex view.
533
534 If a mobile device forensic tool supports selective logical acquisition then the three variations of
535 ONE, SUBSET and SELECTED should be done. A challenge of selected acquisition is the large
536 number of possible combinations that could be tested. The compromise between the time required
537 to run a large number of different combinations and expending a reasonable amount of time is to
538 use three selection set variations (ONE, SUBSET and SELECTED) for each device tested, but use a
539 different selection set for each device. The selection sets for each variation are as follows:
540 ▪ Variation SELECTED: Select all supported data items. Do this for each device tested.
541 ▪ Variation ONE: Select just one supported data item. Select a different data item for each
542 device tested. If there are more devices than data items, then repeat selected data items.
543 ▪ Variation SUBSET: Select a subset of supported data items. Use a different one of the
544 following patterns for each device, the expectation is to select about a third to a half of the
545 data items for each tested device. If you have more devices than there are patterns you will
546 need to repeat patterns already used, just use all the patterns approximately an equal number
547 of times:
548 o Mentally number the supported data items: 1, 2, 3, … select the odd numbered items.
549 o Mentally number the supported data items: 1, 2, 3, … select the even numbered
550 items.
551 o Mentally number the supported data items: 1, 2, 3, … select every third item starting
552 with item 2.
553 o Select the first half of the supported items.
554 o Select the last half of the supported items.
555
556 MDT-01. Disruption notification.
557 This test case only applies for acquisition types supported by the tool. Begin an acquisition, wait
558 a suitable time interval and then disrupt the connection to the mobile device. There can be case
559 variations for each acquisition type:
560 ▪ MDT-01-LOG for logical acquisition
561 ▪ MDT-01-ONE for selective acquisition of one data item
562 ▪ MDT-01-SUBSET for selected acquisition of subset of data items
563 ▪ MDT-01-SELECTED for selected acquisition of all supported data items
564 ▪ MDT-01-FILE for file system acquisition
565 ▪ MDT-01-PHY for physical acquisition
566

18 of 22
567 Test Assertions:
568 MDT-AO-06 The user is notified if an acquisition is disrupted.
569
570 MDT-02. Create an image file.
571 Acquire data from a mobile device. This test case only applies for acquisition types supported
572 by the tool. If the tool supports selective logical acquisition then all of the three selective
573 acquisition variations should be run (ONE, SUBSET and SELECTED). There can be case
574 variations for the different acquisition types:
575
576 ▪ MDT-02-LOG for logical acquisition
577 ▪ MDT-02-ONE for selective acquisition of one data item
578 ▪ MDT-02-SUBSET for selected acquisition of subset of data items
579 ▪ MDT-02-SELECTED for selected acquisition of all supported data items
580 ▪ MDT-02-FILE for file system acquisition
581 ▪ MDT-02-PHY for physical acquisition
582
583 Test Assertions (only one of the first 4 applies depending of the variation):
584 MDT-AO-01 An image file is created of physical memory. (PHY)
585 MDT-AO-02 An image file is created containing supported memory artifacts. (LOG)
586 MDT-AO-03 An image file is created containing selected artifacts. (ONE, SUBSET and
587 SELECTED)
588 MDT-AO-04 An image file is created of the device file system. (FILE)
589 MDT-AO-05 The user is notified if the tool fails to establish a connection or acquire data from a
590 connected mobile device.
591
592 MDT-03. View artifacts from an image file.
593 View data acquired from a mobile device to an image file. Open an image file and try to view
594 the expected data items present. There can be case variations for the different acquisition
595 methods used to create the image file:
596 ▪ MDT-03-LOG for logical acquisition
597 ▪ MDT-03-ONE for selective acquisition of one data item
598 ▪ MDT-03-SUBSET for selected acquisition of subset of data items
599 ▪ MDT-03-SELECTED for selected acquisition of all supported data items
600 ▪ MDT-03-FILE for file system acquisition
601 ▪ MDT-03-PHY for physical boot loader acquisition
602 ▪ MDT-03-JTAG for JTAG acquisition (acquired via separate hardware device)
603 ▪ MDT-03-CHIP for Chip-off acquisition (acquired via separate hardware device)
604
605 Test assertions:
606 MDT-CA-01 The tool presents all subscriber and equipment information available from an image
607 file.
608 MDT-CA-02 The tool presents all PIM (address book, calendar & notes) data available from an
609 image file.
610 MDT-CA-03 The tool presents all call data (call type (incoming, outgoing, missed), date-time
611 stamps, duration) available from an image file.

19 of 22
612 MDT-CA-04 The tool presents all message (SMS, MMS & instant messages) data available from an
613 image file.
614 MDT-CA-05 The tool presents all stand-alone (audio, documents, graphic & video,) files available
615 from an image file.
616 MDT-CA-06 The tool presents all browsing (history & bookmarks) data available from an image
617 file.
618 MDT-CA-07 The tool presents all email data available from an image file.
619 MDT-CA-08 The tool presents all social media application data available from an image file.
620 MDT-CA-09 The tool presents all geo-location application data from an image file.
621 MDT-CA-10 The tool presents all WiFi data (SSID, MAC Addresses, Passwords, Access Times)
622 from an image file.
623 MDT-CA-11 Presented text is rendered with the correct character glyphs.
624 MDT-AO-20 If an image file contains recoverable deleted data artifacts and the tool supports data
625 recovery, then the tool presents the recovered deleted items.
626 MDT-CA-12 The tool does not modify an image file.
627 MDT-AO-32. The tool presents all supported health and fitness data (datetime, energy burned,
628 distance traveled, heart rate, flights climbed, speed) associated with an installed application.
629 MDT-AO-33. The tool presents all supported financial/banking data (card type, last 4 digits of
630 credit or debit card, expiration date, datetime of transaction, participants, transfer amount, status,
631 description) associated with an installed application.
632 MDT-AO-34. The tool presents all date and times of activities conducted across installed
633 applications.
634
635
636 MDT-04. Detect change to an image file.
637 Make a change to an image file, then open the image file. There can be case variations for the
638 different acquisition types:
639 ▪ MDT-04-LOG for logical acquisition
640 ▪ MDT-04-ONE for selective acquisition of one data item
641 ▪ MDT-04-SUBSET for selected acquisition of subset of data items
642 ▪ MDT-04-SELECTED for selected acquisition of all supported data items
643 ▪ MDT-04-FILE for file system acquisition
644
645 Test assertions:
646 MDT-CA-13 If an image file is modified, the tool notifies the user that a change has been made to
647 the image file.
648
649 MDT-05. Unlock a UICC
650 Connect to a locked UICC and attempt to unlock the UICC. There are two variations:
651 ▪ MDT-05-PIN Unlock with a PIN code a locked UICC.
652 ▪ MDT-05-PUK Unlock with a PUK code a UICC that has had the maximum number of
653 failed PIN attempts.
654
655 Test Assertions for MDT-05-PIN:
656 MDT-AO-07 A mobile device forensic tool provides a count of remaining authentication attempts
657 for a locked UICC acquisition if an incorrect PIN is entered.

20 of 22
658 MDT-AO-08 A mobile device forensic tool unlocks a locked UICC if the correct PIN code is given
659 to the tool.
660
661 Test Assertions for MDT-05-PUK:
662 MDT-AO-09 A mobile device forensic tool provides the examiner with a count of remaining
663 authentication attempts for a locked UICC acquisition if an incorrect PUK code is entered.
664 MDT-AO-10 A mobile device forensic tool unlocks a locked UICC that has been given the
665 maximum number of incorrect PIN codes if the correct PUK code is given to the tool.
666
667 MDT-06. Create UICC image file
668 Create a image file of an unlocked UICC.
669
670 Test assertion:
671 MDT-AO-11 An image file is created containing supported UICC artifacts.
672
673 MDT-07. View artifacts from UICC image file
674 View acquired artifacts from a UICC.
675
676 Test Assertions:
677 MDT-AO-12 A mobile device forensic tool presents Service Provider Name (SPN) from a UICC
678 image file.
679 MDT-AO-13 A mobile device forensic tool presents Integrated Circuit Card Identifier (ICCID)
680 from a UICC image file.
681 MDT-AO-14 A mobile device forensic tool presents International Mobile Subscriber Identity
682 (IMSI) from a UICC image file.
683 MDT-AO-15 A mobile device forensic tool presents Mobile Subscriber International ISDN Number
684 (MSISDN) from a UICC image file.
685 MDT-AO-16 A mobile device forensic tool presents Abbreviated Dialing Numbers (ADNs) from a
686 UICC image file.
687 MDT-AO-17 A mobile device forensic tool presents Last Numbers Dialed (LND) from a UICC
688 image file.
689 MDT-AO-18 A mobile device forensic tool presents Text messages (SMS) from a UICC image file.
690 MDT-AO-19 A mobile device forensic tool presents Location (LOCI, GPRSLOCI) from a UICC
691 image file.
692 MDT-AO-20 If an image file contains recoverable deleted data artifacts and the tool supports data
693 recovery, then the tool presents the recovered deleted items.
694 MDT-CA-12 The tool does not modify an image file.
695
696 MDT-08. View active table data within an SQLite database.
697 View acquired artifacts within the embedded SQLite viewer.
698
699 Test Assertions:
700 MDT-AO-21 The tool shall display numeric values (e.g., integer and floating point values).
701 MDT-AO-22 The tool shall display integer time valules as a conventional human-readable date
702 and time.

21 of 22
703 MDT-AO-23 The tool shall render text for Text fields, table names, and column names encoded in
704 UTF 8, UTF 16BE, and UTF 16LE.
705 MDT-AO-24 The tool shall decode and display base64 encoded text.
706 MDT-AO-25 The tool shall display graphic image data recorded as a BLOB in the database.
707 MDT-AO-26 The tool shall decode data recorded as a BLOB in the database.
708 MDT-AO-27 The tool shall have the ability to display SQLite BLOB data.
709 MDT-AO-28 The tool shall report all currently active data when WAL mode is in use.
710 MDT-AO-29 The tool shall report all currently active data when journal mode is in use.
711
712 MDT-09. Execute SQLite commands stored within the image file.
713 Run and save SQLite commands.
714
715 Test Assertions:
716 MDT-AO-30 If an image file contains recoverable deleted data artifacts and the tool supports data
717 recovery, then the tool presents the recovered deleted items.
718 MDT-AO-31 The tool shall have the capability to save SQLite commands for later recall.
719

22 of 22

You might also like