Week 7 - Mobile Forensics
Week 7 - Mobile Forensics
WEEK 7
MOBILE FORENSICS
Digital forensics is a branch of forensic science that deals with the recovery,
investigation, and analysis of data from electronic devices, including computers,
mobile devices, and networks. It plays a critical role in modern investigations,
helping uncover evidence for criminal cases, corporate disputes, cybersecurity
incidents, and more. In today’s world, where nearly every interaction or
transaction is captured digitally, digital forensics has become essential in
providing accurate and reliable information to legal entities and organizations.
Accessibility: Because people carry mobile devices with them everywhere, they
generate continuous logs of activity, including location and communication
records, that are essential in both criminal and civil investigations.
Encryption and Security: Mobile devices often feature encryption and security
measures like passwords, biometrics (fingerprints, facial recognition), and
encrypted messaging apps. Mobile forensics experts need specialized tools and
techniques to access and decrypt this data legally.
Mobile devices vary in form and function, but they share key characteristics that
make them important in forensics. The most common types of devices
investigated in mobile forensics include:
Tablets: Similar to smartphones but with larger screens, tablets also store a
significant amount of personal and professional data. They are often used for
media consumption, communication, and even professional work, making them
targets for forensic analysis.
Feature Phones: While less common today, feature phones are basic mobile
phones that offer calling, texting, and limited multimedia functionality. These
devices are simpler than smartphones but can still contain important evidence
such as call logs and SMS messages.
Mobile forensics involves handling sensitive data, often with privacy and legal
concerns attached. Forensic investigators must be aware of both the legal and
ethical boundaries of data retrieval and analysis to ensure that evidence is
admissible in court and that the privacy rights of individuals are respected.
Data Privacy: Mobile devices contain highly sensitive personal information, and
mishandling that data can lead to privacy violations. Forensic investigators must
be cautious about accessing and sharing personal data, ensuring that only
relevant information is used in an investigation.
Jurisdictional Challenges: Mobile forensics can involve devices that are subject
to different local or international laws. Investigators must be aware of the legal
frameworks governing data access in different countries, especially in cases
involving international crimes or data stored on cloud services.
2.1. iOS
iOS is the operating system exclusive to Apple devices, such as the iPhone and
iPad. Built on a Unixlike architecture known as Darwin, iOS is designed with an
emphasis on simplicity, security, and performance. The operating system tightly
integrates with Apple’s hardware and software ecosystem, allowing for highly
optimized performance and seamless experiences across devices.
App Store Ecosystem: iOS apps are distributed via the Apple App Store, which
undergoes strict review processes for quality and security.
Closed System: Apple exercises strict control over the operating system,
limiting what thirdparty apps and developers can do within the system.
Uniform Updates: Apple manages updates centrally, ensuring that all devices
receive the latest security patches and software features as soon as they are
released.
2.2. Android
Android, on the other hand, is an opensource operating system built on the Linux
kernel. Developed by Google, it is used by a wide variety of manufacturers,
including Samsung, Google Pixel, Huawei, and many others. This open nature
makes Android highly customizable but also more fragmented, as different
manufacturers may modify the OS to suit their needs.
Google Play Store: Android’s primary app distribution platform allows a wide
range of apps, but with fewer restrictions compared to iOS.
Customizability: Users can modify their Android devices with custom ROMs,
launchers, and widgets, making it a favorite for tech enthusiasts.
2. Android 4.0 Ice Cream Sandwich (2011): This version introduced a more
polished and unified design for smartphones and tablets, incorporating the
"Holo" visual style. It brought swipe gestures, facial recognition unlock, and
improved multitasking.
7. Android 8.0 Oreo (2017): Oreo improved background app management for
battery life and introduced PictureinPicture mode, notification dots, and Project
Treble to streamline software updates.
9. Android 10 (2019): This version dropped the dessert naming tradition and
introduced a systemwide dark mode, enhanced privacy controls, improved
gesture navigation, and Live Caption for media.
12. Android 13 (2022): Android 13 refined many of the visual and functional
features from Android 12, offering improved appspecific language settings,
enhanced theming options, and further privacy enhancements like better media
file permissions.
The first step in mobile device seizure is securing the device to prevent any
alteration of the data. This involves physically controlling the device and
ensuring that no one can access or tamper with it. Investigators must:
1. Isolate the device from networks: Disconnecting the device from all wireless
connections is essential to prevent remote wiping or syncing, which can alter or
delete important evidence. The investigator should disable any active network
interfaces such as WiFi, Bluetooth, and cellular connections.
4. Secure the device physically: Once the mobile device is seized, it should be
stored in a secure container or location to prevent unauthorized access.
1. Faraday Bags: These are specialized pouches designed to block all wireless
signals to and from a mobile device. By placing a device in a Faraday bag,
investigators can prevent any external communication with the device, thus
safeguarding it from remote wiping or networkbased data changes.
Once a mobile device has been seized and preserved, the next step is to acquire
the data stored within it. The process of acquisition involves extracting
information from the device in a forensically sound manner. Several methods
exist depending on the type of device, the operating system, and the nature of the
investigation.
3. File System Acquisition: This method focuses on retrieving the file system
structure, including directories, files, and permissions. It provides an
intermediate level of data extraction between logical and physical acquisition
and is useful for recovering systemlevel data that may not be available through
logical acquisition.
1. JTAG (Joint Test Action Group): This method involves connecting to the
mobile device's circuit board to extract data directly from the device's memory
chips. JTAG is typically used when other methods are not viable, such as when a
device is damaged or inaccessible through software.
2. ChipOff: This technique involves physically removing the memory chip from
the device's motherboard and using specialized equipment to read the data
directly. ChipOff is often employed when a device is severely damaged, or
encryption prevents other acquisition methods.
Both JTAG and ChipOff methods are invasive and require specialized knowledge
and tools. They are often used as a last resort due to the risk of causing
irreparable damage to the device.
Several software tools are available to assist investigators in acquiring data from
mobile devices. These tools offer varying levels of functionality and support
different acquisition methods:
Law enforcement can also obtain subscriber information, call detail records
(CDRs), and PUK codes from carriers.
Subscriber records include personal details like name, address, and alternative
phone numbers.
Call Detail Records (CDRs) show details of calls made and received, such as
phone numbers, dates, times, and locations based on the cell sites used.
The PIN Unlock Key (PUK) is a code used to reset and unlock a phone’s SIM card
if it's locked.
The mobile station consists of the mobile device (handset) and, in the case of
GSM networks, the Subscriber Identity Module (SIM) card. Every handset has a
unique identifier called the International Mobile Equipment Identity (IMEI)
number. The first six or eight digits of the IMEI are called the Type Allocation
Code (TAC), which identifies the device model. Investigators can use websites
like nobbi.com/tacquery.php to look up details about a device using its TAC or
IMEI.
1. Mobile Country Code (MCC) – The first three digits that identify the
subscriber's country.
2. Mobile Network Code (MNC) – The next two or three digits that specify
the mobile network provider.
In mobile forensics, the SIM card plays a crucial role as it contains vital
information beyond just identifying the user. The SIM is a type of smart card,
consisting of a processor and memory, making it capable of storing various types
of data. Investigators can retrieve valuable evidence from a SIM card, such as:
Accessing the data stored on a SIM card can be challenging, especially if the card
is PINprotected. Typically, a SIM card PIN is a 4digit code, although it can be up
to 8 digits. For an investigator to gain access:
1. PIN Attempts: There are three attempts allowed to input the correct PIN.
After three incorrect attempts, the SIM card becomes locked.
2. Personal Unblocking Key (PUK): Once locked, the investigator or user must
enter a PUC (also called a Personal Unblocking Code, or PUK) to unlock the SIM.
This code is usually obtained from the mobile network provider, and it is
necessary to regain access to the SIM data.
3. PUC Functionality: Entering the correct PUC will disable the PIN protection,
allowing access to the stored data.
1. Data Integrity: Preserves the original SIM card in its exact state for later use
or verification.
There are several tools available in mobile forensics to clone SIM cards. These
tools ensure that the clone is an exact duplicate of the original SIM, preserving
the evidence. Some common tools used in SIM card cloning and analysis include:
Cellebrite UFED: A widely used mobile forensic tool that supports the
extraction and analysis of SIM data, as well as SIM cloning.
MOBILedit Forensic Express: A tool that provides the capability to clone SIM
cards and extract SMS, contacts, and other important data.
XRY by MSAB: Another forensic solution that allows SIM card cloning and
extraction of evidence from mobile devices and SIM cards.
1. Encryption: Some modern SIM cards may have encryption mechanisms that
make it difficult to retrieve data.
4. Data Retention: SIM cards have limited storage capacity, so certain logs and
messages may not be retained for long periods, especially in cases of heavy
usage.
Commercial tools provide the highest success rates for bypassing screen locks
with minimal risk of data loss. These tools are available for both Android and iOS
devices. Examples include dr. fone – Unlock, iSkysoft ToolBox, and Pangu FPR
Unlocker Tool. They are userfriendly, support a wide range of models, and offer
reliable bypass solutions.
Manual extraction is one of the simplest and least invasive techniques in forensic
examinations. It is straightforward, making it ideal for law enforcement or
professionals who are less familiar with advanced technical methods. With this
technique, investigators can manually select and extract only the data they need,
saving time and avoiding the complexity of full data imaging. A tool like AF
Logical OSE by NowSecure is effective for this process.
Location and GPS data forensics is a crucial area of mobile forensics that involves
identifying, extracting, and analyzing locationbased data from mobile devices.
This data is often used in investigations to track movements, establish patterns,
and provide evidence in criminal cases or civil disputes. The following notes
expand on the key subtopics in this area.
Understanding how GPS and cell tower data work is critical in forensic analysis.
ii. Forensic Relevance: GPS data can pinpoint exact locations and
movement paths, which is highly valuable in investigations.
i. Accuracy: Cell tower triangulation is less accurate than GPS but can
provide a general idea of a device's location within a larger radius.
ii. Forensic Use: Useful when GPS data is absent or deliberately disabled,
such as in cases where a mobile device was in a rural or dense urban
area with limited satellite connectivity.
iii. Apps: Apps like Google Maps or Facebook also record precise location
metadata in user activity logs.
b. Interpretation of Metadata:
iii. Correlations with Crime Scenes: Identifying whether the device was
near crime scenes or relevant locations during key timeframes.
Free, widely accessible tools like Google Earth and OpenStreetMap play a
significant role in forensic analysis by providing detailed, realworld geographical
data to visualize extracted location information.
a. Google Earth:
iii. Features like Street View provide groundlevel perspectives, which can
be used to validate certain forensic findings, such as the visibility of
landmarks or potential witnesses.
b. OpenStreetMap: