0% found this document useful (0 votes)
230 views44 pages

01A-Introduction To Mobile Forensics

The document discusses an introduction to mobile forensics. It covers the definition of mobile forensics, its uses in law enforcement and businesses, and the need for mobile forensics due to the growing use of mobile devices that store personal data. It also describes some of the challenges of mobile forensics including differences in hardware, challenges in acquiring data without altering it, and difficulties posed by encryption and changing technologies.

Uploaded by

Alexius Samson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
230 views44 pages

01A-Introduction To Mobile Forensics

The document discusses an introduction to mobile forensics. It covers the definition of mobile forensics, its uses in law enforcement and businesses, and the need for mobile forensics due to the growing use of mobile devices that store personal data. It also describes some of the challenges of mobile forensics including differences in hardware, challenges in acquiring data without altering it, and difficulties posed by encryption and changing technologies.

Uploaded by

Alexius Samson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 44

IA 316: Computer and Mobile Forensic

Analysis

Introduction to Mobile Forensics

02/02/23 09:58 IA316 1


Lecture Outline
 The Lecture covers:
 Mobile Forensics: definition and uses
 The need for Mobile Forensics
 Understanding Mobile Forensics
 Challenges in Mobile Forensics

02/02/23 09:58 IA316 2


Mobile Forensics
 Mobile Forensics: definition
 Subset of Digital Forensics
 Deals with recovery of evidence from mobile devices
such as Smartphones and Tablets

02/02/23 09:58 IA316 3


Mobile Forensics
 Mobile Forensics: uses
 Law enforcement: Police, PCCB, DPP, Immigration
 Solve a lot of crime: fraud, homicide
 Military: espionage, counterterrorism
 Businesses: intellectual property theft, authorized and
unauthorized use of resources.

02/02/23 09:58 IA316 4


The Need for Mobile Forensics
 Growing demand for Mobile Devices
 By 2021, it was estimated that there are around 15
Billion Mobile Devices.
 Technology and users migrating from Desktop to
Mobile Phones
 Demand for Smartphones is quite high.

02/02/23 09:58 IA316 5


The Need for Mobile Forensics
 Smartphones are becoming compact forms of
computers.
 High performance, huge storage, and enhanced
functionality.

02/02/23 09:58 IA316 6


The Need for Mobile Forensics
 Mobile phones are the most personal electronic device
that a user accesses.
 Perform simple communication tasks, such as calling
and texting.
 Internet browsing, email, taking photos and videos,
creating and storing documents
 Identifying locations with GPS services, and
managing business tasks.

02/02/23 09:58 IA316 7


The Need for Mobile Forensics
 Mobile phones have become portable data carriers,
keeping track of all our movements.
 Increasing prevalence of mobile phones makes then in
invaluable source of evidence.
 Evidence acquired from mobile phones is used in both
criminal and civil cases.
 It is now rare to conduct a digital forensic
investigation that does not include a phone.

02/02/23 09:58 IA316 8


The Need for Mobile Forensics
 Mobile device call logs and GPS data were used to
help solve the attempted bombing in Times Square,
New York, in 2010
 Read more about the investigation at:
https://www.forensicon.com/forensics-blotter/cell-pho
ne-email-forensics-investigation-cracks-nyc-times-squ
are-car-bombing-case/

02/02/23 09:58 IA316 9


Understanding Mobile Forensics
 Digital forensics is a branch of forensic science
focusing on the recovery and investigation of raw
data residing in electronic or digital devices.
 Intends to extract and recover any information from a
digital device without altering the data present on the
device.

02/02/23 09:58 IA316 10


Understanding Mobile Forensics
 Over the years, digital forensics has grown along with
the rapid growth of computers and various other
digital devices.
 There are various branches of digital forensics based
on the type of digital device involved, such as:
 Computer forensics
 Network forensics
 Mobile forensics.

02/02/23 09:58 IA316 11


Understanding Mobile Forensics
 Forensically sound
 It is a term used in the digital forensics community to
qualify and justify the use of a particular forensic
technology or methodology.
 Core principle for Forensic Sound technology or
methodology:
 The original evidence must not be altered in any
form.
 This is extremely difficult with mobile devices.

02/02/23 09:58 IA316 12


Understanding Mobile Forensics
 Some forensic tools require a communication vector
with the mobile device.
 Thus standard write protection will not work during
forensic acquisition.

02/02/23 09:58 IA316 13


Understanding Mobile Forensics
 Prior to extracting data for forensic examination,
some of the forensic acquisition methods may
involve:
 Detaching a chip
 Installing a custom bootloader on the mobile device.

 In such cases, the procedure and the changes must be


carefully tested and documented for later reference.
 This is where examination or data acquisition is not
possible without changing the configuration of the
device.
02/02/23 09:58 IA316 14
Understanding Mobile Forensics
 Following proper methodology and guidelines is
crucial in examining mobile devices.
 Yields the most valuable data.
 Not following the proper procedure during the
examination can result in loss or damage of evidence
or render it inadmissible in court.

02/02/23 09:58 IA316 15


Understanding Mobile Forensics
 Main categories of mobile forensic process:
 Seizure
 Acquisition
 Examination/Analysis

02/02/23 09:58 IA316 16


Understanding Mobile Forensics
 Challenges when seizing devices-If the mobile device
is found switched off,
 Place the device in a Faraday bag to prevent changes
should the device automatically power on.
 Faraday bags are specifically designed to isolate a phone
from a network.

02/02/23 09:58 IA316 17


Understanding Mobile Forensics
 Challenges when seizing devices-If the mobile device
is found switched on,
 Switching it off has a lot of concerns attached to it.
 If the phone is locked by a PIN or password, or encrypted,
you will be required to bypass the lock or determine the
PIN to access the device.

02/02/23 09:58 IA316 18


Understanding Mobile Forensics
 Challenges when seizing devices-if the mobile
device is found switched on
 Mobile phones are networked devices and can send
and receive data through different sources, such as:
 Telecommunication systems.
 Wi-Fi access points
 Bluetooth.

02/02/23 09:58 IA316 19


Understanding Mobile Forensics
 Challenges when seizing devices-if the mobile
device is found switched on
 So, if the phone is in a running state, a criminal could
securely erase the data stored on the phone by
executing a remote wipe command.
 When a phone is switched on, it should be placed in
a Faraday bag.

02/02/23 09:58 IA316 20


Understanding Mobile Forensics
 Challenges when seizing devices-if the mobile
device is found switched on
 If possible, prior to placing a mobile device in a
Faraday bag, you should disconnect it from the
network to protect the evidence by:
 Enabling flight mode/Airplane mode
 Disabling all network connections (Wi-Fi, GPS,
hotspots, and so on).

02/02/23 09:58 IA316 21


Understanding Mobile Forensics
 Challenges when seizing devices-if the mobile
device is found switched on
 Disconnecting from the network also helps to:
 Preserve the battery, which will drain while in a
Faraday bag.
 Protect against leaks in the Faraday bag.

02/02/23 09:58 IA316 22


Understanding Mobile Forensics
 Mobile device forensic acquisition can be performed
using multiple methods.
 Each of these methods affects the amount of analysis
required.
 Should one method fail, another must be attempted.
 Multiple attempts and tools may be necessary in order
to acquire the maximum amount of data from the
mobile device.

02/02/23 09:58 IA316 23


Understanding Mobile Forensics
 Mobile phones are dynamic systems
 Present a lot of challenges in extracting and analyzing
digital evidence.
 There is a rapid increase in the number of different
kinds of mobile phones from different manufacturers.
 Makes it difficult to develop a single process or tool
to examine all types of devices.

02/02/23 09:58 IA316 24


Understanding Mobile Forensics
 Mobile phones are continuously evolving:
 Existing technologies progress and new technologies
are introduced.
 Furthermore, each mobile is designed with a variety
of embedded operating systems.
 Hence, special knowledge and skills are required from
forensic experts to acquire and analyze the devices.

02/02/23 09:58 IA316 25


Challenges in Mobile Forensics
 Hardware differences
 The market is flooded with different models of
mobile phones from different manufacturers.
 Forensic examiners may come across different types of
mobile models that differ in:
 Size
 Hardware
 Features
 Operating system.

02/02/23 09:58 IA316 26


Challenges in Mobile Forensics
 Hardware differences
 Short product development cycle -new models emerge
very frequently.
 It is critical for forensic investigators to adapt to all
challenges and remain updated on mobile device
forensic techniques across various devices.

02/02/23 09:58 IA316 27


Challenges in Mobile Forensics
 Mobile operating systems
 In Personal computers, MS Windows has dominated
the market for years.
 With mobile devices, several Operating Systems are
used frequently.
 Apple's iOS
 Google's Android,
 RIM's BlackBerry OS
 Microsoft's Windows Phone OS,
 HP's webOS,

..
02/02/23 09:58 IA316 28
Challenges in Mobile Forensics
 Mobile operating systems
 Even within these operating systems, there are
several versions, which makes your task even
more difficult.

02/02/23 09:58 IA316 29


Challenges in Mobile Forensics
 Mobile platform security features:
 Modern mobile platforms contain built-in security
features to protect user data and privacy.
 The features act as a hurdle during forensic
acquisition and examination.
 E.g. encryption mechanisms from the hardware
layer to the software layer.

02/02/23 09:58 IA316 30


Challenges in Mobile Forensics
 Mobile platform security features:
 Need to break through these encryption
mechanisms to extract data from the devices.
 Refer: FBI versus Apple encryption dispute.

02/02/23 09:58 IA316 31


Challenges in Mobile Forensics
 Preventing data modification
 Fundamental rule in forensics is to make sure that
data on the device is not modified.
 Any attempt to extract data from the device should
not alter the data present on that device.
 This is not practically possible with mobiles.
 Just switching on a device can change the data on
that device.

02/02/23 09:58 IA316 32


Challenges in Mobile Forensics
 Preventing data modification
 Even if a device appears to be in an off state,
background processes may still run.
 E.g, in most mobiles, the alarm clock still works
even when the phone is switched off.
 A sudden transition from one state to another may
result in the loss or modification of data.

02/02/23 09:58 IA316 33


Challenges in Mobile Forensics
 Anti-forensic techniques makes investigations on
digital media more difficult. Techniques used include:
 Data hiding
 Data obfuscation
 Data forgery
 Secure wiping

02/02/23 09:58 IA316 34


Challenges in Mobile Forensics
 Passcode recovery:
 A forensic examiner needs to gain access to
passcode protected device.
 Has to be done without damaging data on the
device.
 While there are techniques to bypass the screen
lock, they may not always work on all versions
of the OS.

02/02/23 09:58 IA316 35


Challenges in Mobile Forensics
 Lack of resources
 The growing number of mobile phones means the
amount of tools required by a forensic examiner
also increases.
 Forensic acquisition accessories, such as USB
cables, batteries, and chargers for different
mobile phones, have to be maintained.

02/02/23 09:58 IA316 36


Challenges in Mobile Forensics
 Dynamic nature of evidence
 Digital evidence may be easily altered either
intentionally or unintentionally.
 E.g: browsing an application on a phone might
alter the data stored by that application on the
device.

02/02/23 09:58 IA316 37


Challenges in Mobile Forensics
 Accidental reset
 Mobile phones provide features to reset
everything.
 Resetting a device accidentally while examining it
may result in the loss of data.

02/02/23 09:58 IA316 38


Challenges in Mobile Forensics
 Device alteration
 The possible ways to alter devices include:
 Moving application data
 Renaming files
 Modifying the manufacturer's operating system.
 The expertise of the suspect should be taken into
account.

02/02/23 09:58 IA316 39


Challenges in Mobile Forensics
 Communication shielding
 Mobile devices communicate over:
 Cellular networks
 Wi-Fi networks
 Bluetooth
 Infrared.
 Since communication might alter the device data, the
possibility of further communication should be
eliminated after seizing the device.

02/02/23 09:58 IA316 40


Challenges in Mobile Forensics
 Lack of availability of tools
 There is a wide range of mobile devices.
 A combination of tools needs to be used.
 A single tool may not support all the devices or
perform all the necessary functions.
 So, choosing the right tool for a particular phone might
be difficult.

02/02/23 09:58 IA316 41


Challenges in Mobile Forensics
 Malicious programs
 The device might contain malware or malicious
software, such as a virus or a Trojan.
 These programs may try to spread over other devices
over either a wired interface or a wireless one.

02/02/23 09:58 IA316 42


Challenges in Mobile Forensics
 Legal issues
 Mobile devices might be involved in crimes that cross
geographical boundaries.
 The forensic examiner should be familiar with the
nature of the crime and the regional laws.

02/02/23 09:58 IA316 43


IA 316: Computer and Mobile
Forensic Analysis

02/02/23 09:58 IA316 44

You might also like