EHDFchapter 5
EHDFchapter 5
Mobile Phone Forensics or Mobile Forensics deals with recovering and analysing digital evidences
from a mobile phone, such as, call logs, text messages, multimedia, browsing history, etc., under
forensically sound conditions.
Evidences present in mobile phones
Data present in mobile devices mainly originate from three sources, namely, SIM card, external
memory and phone memory or internal memory. The following are the most common evidences
found in a mobile device:
Contacts: Contains the names and phone numbers, e-mail addresses; stored on device as
well as the SIM card.
Call Logs: Contains the dialled, received and missed calls, date and time of the call, call
duration; stored on device as well as the SIM card.
Messages: Containes the incoming and outgoing text messages; stored on the device as well
as the SIM card.
Images/Audio/Video: Contains audio, images or video, captured using the phone camera or
transferred from other devices or downloaded from the internet; stored on internal/external
memory.
Documents: Contains documents created using the phone’s applications or transferred from
other devices or downloaded from the internet; stored on phone memory/external memory.
Calendar/ Notes: Contains calendar entries, reminders, notes, to-do lists, etc.; stored on
phone memory.
Third party installed apps: Contains alternate messaging and communication applications,
chat logs; stored on internal/external memory.
Internet-related evidence: web browsing history, social media accounts, e-mails, etc.; stored
on phone memory.
International Mobile Equipment Identity (IMEI): 15-digit number; stored as well as printed
on the device.
International Mobile Subscriber Identity (IMSI): 15-digit number; stored on SIM card.
Integrated Circuit Card Identifier (ICCID): 20-digit number; stored on SIM card.
Service Provider: Printed on SIM card.
Mobile Device Tool Classification System
The acquisition of data from mobile devices involves the use of automated tools. Therefore,
understanding the various types of acquisition tools and the data they are capable of recovering is
important for a mobile forensic examiner. Based on the various extraction methods, the tools
available may be classified under one of the following levels:
Manual Extraction
Manual extraction method involves viewing the data content stored on a mobile device through the
manual manipulation of the buttons, keyboard or touchscreen. Data of evidentiary value should be
recorded using an external digital camera. One of the biggest disadvantages at this level is that it is
impossible to recover deleted information. Moreover, it may become impossible to gather evidence
when dealing with a broken or missing LCD screen or a damaged keyboard interface.
Project-A-Phone
Fernico ZRT
EDEC Eclipse
Logical Extraction
Logical extraction involves connecting the mobile device to a forensic workstation either using a
wired (e.g., USB) or wireless (e.g.,WiFi, or Bluetooth) connection. Once the connection is
established, the tools send a series of commands over the established interface from the computer to
the mobile device. The mobile device then, responds with the requested data and is sent back to the
workstation and presented to the forensics examiner for reporting purposes.
XRY Logical
Oxygen Forensic Suite
Lantern
XACT
Cellebrite UFED Physical Analyzer
Pandora’s Box
JTAG (Joint Test Action Group) method involves connecting to Test Access Ports (TAPs) on a
device, which is a common test interface for processor, memory, and other semiconductor chips.
Special programmer devices are used to instruct the processor to transfer the data stored on the
memory. JTAG method comes in handy while dealing with locked devices or devices that have
minor logical damages, which are inaccessible through other methods.
Chip-Off
Chip-Off methods refer to the acquisition of data directly from a mobile device’s flash memory.
This extraction requires the physical removal of flash memory and connecting it to a chip reader to
create a binary image of the removed chip. This method requires extensive training as they can be
extremely challenging and has the risk of causing physical damage to the chip during the process.
The popular tools and equipment used for chip-off include:
Micro Read
A Micro read involves analysing the physical gates on a NAND or NOR chip with the use of an
electron microscope. This process is not only time consuming and costly, but also involves extreme
technicalities. Therefore, this method is carries out only for high profile cases equivalent to a
national security crisis, when all the other extraction methods have been exhausted.
Mobile Device Forensic Process
Identification: It is the process of identifying the mobile device and other relevant details such as
the goals of the examination; the make, model or IMEI of the device; any removable external
memory; or other potential evidence such as fingerprints.
Isolation: Isolation of the mobile device from the network is extremely important to avoid
modification of the evidence on the phone after seizure. This can be done by placing the device in
faraday bags and placing the phone in airplane mode.
Acquisition: Once the phone is isolated, data from the device can be acquired using the appropriate
extraction methods. Physical acquisition is preferred as it extracts the raw data directly from the
memory of the device and recovers deleted data as well as data from unallocated space.
Examination and Analysis: After the data has been acquired, the examination process uncovers
digital evidence, including that which may be hidden or deleted. The process begins with a copy of
the evidence acquired from the mobile device and the results are gained by applying scientifically
based methods. Data reduction, that is, separating relevant from irrelevant information, occurs once
the data is exposed.
Documentation: The forensic examiner should document the entire procedure and steps taken by
him during the acquisition and examination. It should include the date and time of the examination,
condition and status (on/off) of the phone, tools used and data found.
Presentation: A report of the data extracted from the device should be created, including the opinion
of the examiner. The findings of the case should then be presented in a clear and easy to understand
manner in the court of law.
Challenges
Hardware Differences: The examiner may come across different types of models, which
differ in operating systems, size, features or hardware.
Encryption: Modern phones come with security features such as encryption, which has to be
decrypted in order for the examiner to proceed with the examination.
Lack of a single compound tool: Due to the varied nature of mobile devices, a single tool
may not support all the devices or perform all the necessary functions.
Anti-forensic Techniques: Anti forensic techniques such as data hiding, data obfuscation or
wiping makes the investigation process more difficult.
https://forensicsdigest.com/introduction-to-mobile-device-forensics/
In case of no search warrant issued, then the seizing of a mobile phone depends on the
consent of the owner but it may vary from case to case.
If the warrant issued, then search whether the mobile device included in the warrant or
not?
In the case of a corporate company or office, first, inquire that which individuals and
employees have access to the questionable digital device.
Interpreting each of these issues is key to an effective seizure of the evidence at the scene. The
inability to answer these essential queries could prompt the exile of evidence recovered at the crime
scene.
Physical place
The address, and
What searching for?
The source of all these data is from prior investigation and probable place where it can be found.
This procedure ensures the person and place to be searched and saves time from unnecessary
searches and seizures.
After gathering information from the occupants or the people at the scene, the agent should search
the area systematically.
Searching can occur in a pattern, by working from the outside to the center of the location, by using
a back-and-forth search, or by dividing the location into several smaller portions.
Photographs and Sketching: Prior to the search, photographs of the area from all angles should
be taken for documentation. In addition, a sketch should be constructed at the crime scene,
highlighting the dimensions and locations of various evidence.
Removable USB drives and SD Cards. Any USB devices at the crime scene should collect
for mobile forensic examination. As mobile phones have limited storage onboard and using
removable media such as a USB drive can be used to expand storage space and useful
information can be saved on USB and SD cards.
Chargers and USB Cables: Sometimes the obtaining the power cable and USB cables of
the device can help in lowering the cost associated with purchasing power cables.
SIM Cards: SIM cards are small chips that function to connect to the respective network
operator. The portability of SIM cards increases the difficulty of searching. SIM cards
portability was one of the features that GSM (Global Systems for Mobile Communications)
devices apart from CDMA (Code Division Multiple Access) phones. Old SIM cards
belonging to different mobile devices can also be located and collected during the search.
Older Mobile Devices: Often, during a search for a particular device, older devices
neglected. But older mobile devices can contain critical data that might be relevant to the
current case being investigated.
Personal Computers: Sometimes, computers can have backups and information on a
mobile device. Additionally, conducting a forensic analysis of the system can also yield
passcodes for the device, synched data like media, documents, settings, spreadsheets, etc.
Exterior switches: Some mobile devices have exterior toggle switches that turn the sound
on and off or up or down. Cover these switches with evidence tape to maintain the position
at the time of seizure.
The device can have fingerprints on it. Then, the device first treated for latent fingerprints,
document and photograph the position of these switches.
USB port: Exterior ports should be covered using evidence tape.
Headphone port: Headphone jacks should be covered using evidence tape.
Camera lens: By taping the camera lens with evidence tape, the device unable to capture
any photos or video after device seizure.
Battery compartment: Nowadays many devices have inbuilt or non-removable battery b
there are also some devices that give access to the battery and also the SIM card and
memory card slots. So, in all cases, all the slots and battery should be taped.
Avoid placing evidence in a region that had recently transported materials that contained
caustic fluids or other wet materials.
Mobile device evidence can be susceptible to shock and vibration, so make certain that the
proof is secured prior to transport.
Mobile device evidence can be harmed by electrostatic discharges and magnetic fields
produced by speakers, radios, and large electronics mounted using magnets.
Electronic evidence ought not to be transported or stored in close proximity to these devices.
Temperature such as extreme hot and cold can damage mobile device evidence. And
prolonged exposure to extreme temperatures must be avoided.
The electronic evidence must not be placed in a patrol vehicle where the radio transmission
system is installed because it serves to be disastrous for electronic evidence. The police
radio transmitter and receiver in a patrol car have an ability to create an electromagnetic
field that might destroy the useful information of mobile devices.
https://forensicreader.com/mobile-forensic-collection/
These are some of the tools available for mobile forensics. Some are free while the rest are
paid.
LIME
LiMe is a Loadable Kernel Module (LKM) Linux memory extractor which allows for volatile
memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME
unique as it is the first tool that allows for full memory captures on Android devices. It also
minimizes its interaction between user and kernel space processes during acquisition, which allows
it to produce memory captures that are more forensically sound than those of other tools designed
for Linux memory acquisition.
It supports Full Android memory acquisition and Acquisition over network interface also.
WhatsApp Xtract
WhatsApp Xtract allows WhatsApp conversations to be viewed on the computer in a simple and
user-friendly way.
Note : The different databases that store information corresponding to messages should be obtained
beforehand.
Skype Xtractor
Skype xtractor for Linux and Windows is a python tool developed for the Forensics distro DEFT
Linux 8. Extracts data from the Skype’s main.db, including contacts, chats, calls, file transfers, and
deleted/modified messages from chatsync databases.
Paid Tools
Cellebrite Touch
Cellebrite Touch is one of the well known and complete evidence extraction device. Work can be
done across 6300 different terminals with the main operating system. It is also very simple and
intuitive.
Encase Forensics
EnCase is the shared technology within a suite of digital investigations products by Guidance
Software (now acquired by OpenText). The software comes in several products designed for
forensic, cyber security, security analytics, and e-discovery use. Encase is traditionally used in
forensics to recover evidence from seized hard drives. Encase allows the investigator to conduct in
depth analysis of user files to collect evidence such as documents, pictures, internet history and
Windows Registry information.
Oxygen Forensics
Oxygen Forensic is a powerful mobile forensic tool with built-in analytics and cloud extractor. It is
very easy to use, it has a user-friendly interface to search, browse, filter and analyze the extracted
data. It has Built-in Cloud data recovery using the Oxygen Forensic® Cloud Extractor. It is capable
of obtaining information from more than 10,000 different mobile device models.
MOBILedit
MOBILedit is a platform that works with a variety of phones and smartphones (a complete list of
supported handsets is available on the manufacturer’s website) and explores contents of the phone
through a MS Outlook-like folder structure. This allows backup of the information stored on the
phone, storing it on a PC or copy data to another phone via Phone Copier feature.
MOBILedit connects to cell phone devices via an Infrared (IR) port, a Bluetooth link, Wi-Fi, or a
cable interface. After connectivity has been established, the phone model is identified by its
manufacturer, model number, and serial number (IMEI) and with a corresponding picture of the
phone.
Data acquired from cell phone devices are stored in the .med file format. After a successful logical
acquisition, the following fields are populated with data: subscriber information, device specifics,
Phonebook, SIM Phonebook, Missed Calls, Last Numbers Dialed, Received Calls, Inbox, Sent
Items, Drafts, Files folder. Items present in the Files folder, ranging from Graphics files to Camera
Photos and Tones, depend on the phone’s capabilities. Additional features include the
myPhoneSafe.com service, which provides access to the IMEI database to register and check for
stolen phones.
Elcomsoft
Elcomsoft is a iOS Forensic Toolkit allows for physical acquisition on iOS devices such as iPhone,
iPad or iPod. It also includes other utility features such as that of deciphering the keychain that
stores user passwords in the terminal analyzed or registering each action that is performed during
the whole process to keep a record of them.
Note : To carry out the evidence-gathering process in an Android mobile device, many of the tools
require enabling of the “USB debugging” option, preferably the “Stay awake” option and disabling
of any time-out screen lock option. In the event that the terminal has any screen lock option
configured, it is necessary to circumvent it.
https://enosjeba.medium.com/tools-for-mobile-forensics-7517e755ff93