KEMBAR78
Computer and Mobile Forensic Analysis | PPT
IA 316: Computer and Mobile Forensic
Analysis
Introduction to Mobile Forensics
05/16/25 04:47 IA316 1
Lecture Outline
05/16/25 04:47 IA316 2
 The Lecture covers:
 Mobile Forensics: definition and uses
 The need for Mobile Forensics
 Understanding Mobile Forensics
 Challenges in Mobile Forensics
Mobile Forensics
05/16/25 04:47 IA316 3
 Mobile Forensics: definition
 Subset of Digital Forensics
 Deals with recovery of evidence from mobile devices
such as Smartphones and Tablets
Mobile Forensics
05/16/25 04:47 IA316 4
 Mobile Forensics: uses
 Law enforcement: Police, PCCB, DPP, Immigration
 Solve a lot of crime: fraud, homicide
 Military: espionage, counterterrorism
 Businesses: intellectual property theft, authorized and
unauthorized use of resources.
The Need for Mobile Forensics
05/16/25 04:47 IA316 5
 Growing demand for Mobile Devices
 By 2021, it was estimated that there are around 15
Billion Mobile Devices.
 Technology and users migrating from Desktop to
Mobile Phones
 Demand for Smartphones is quite high.
The Need for Mobile Forensics
05/16/25 04:47 IA316 6
 Smartphones are becoming compact forms of
computers.
 High performance, huge storage, and enhanced
functionality.
The Need for Mobile Forensics
05/16/25 04:47 IA316 7
 Mobile phones are the most personal electronic device
that a user accesses.
 Perform simple communication tasks, such as calling
and texting.
 Internet browsing, email, taking photos and videos,
creating and storing documents
 Identifying locations with GPS services, and managing
business tasks.
The Need for Mobile Forensics
05/16/25 04:47 IA316 8
 Mobile phones have become portable data carriers,
keeping track of all our movements.
 Increasing prevalence of mobile phones makes then in
invaluable source of evidence.
 Evidence acquired from mobile phones is used in both
criminal and civil cases.
 It is now rare to conduct a digital forensic investigation
that does not include a phone.
The Need for Mobile Forensics
05/16/25 04:47 IA316 9
 Mobile device call logs and GPS data were used to
help solve the attempted bombing in Times Square,
New York, in 2010
 Read more about the investigation at:
https://www.forensicon.com/forensics-blotter/cell-pho
ne-email-forensics-investigation-cracks-nyc-times-square
-car-bombing-case/
Understanding Mobile Forensics
05/16/25 04:47 IA316 10
 Digital forensics is a branch of forensic science
focusing on the recovery and investigation of raw
data residing in electronic or digital devices.
 Intends to extract and recover any information from a
digital device without altering the data present on the
device.
Understanding Mobile Forensics
05/16/25 04:47 IA316 11
 Over the years, digital forensics has grown along with
the rapid growth of computers and various other digital
devices.
 There are various branches of digital forensics based on
the type of digital device involved, such as:
 Computer forensics
 Network forensics
 Mobile forensics.
Understanding Mobile Forensics
05/16/25 04:47 IA316 12
 Forensically sound
 It is a term used in the digital forensics community to
qualify and justify the use of a particular forensic
technology or methodology.
 Core principle for Forensic Sound technology or
methodology:
 The original evidence must not be altered in any form.
 This is extremely difficult with mobile devices.
Understanding Mobile Forensics
05/16/25 04:47 IA316 13
 Some forensic tools require a communication vector
with the mobile device.
 Thus standard write protection will not work during
forensic acquisition.
Understanding Mobile Forensics
05/16/25 04:47 IA316 14
 Prior to extracting data for forensic examination, some
of the forensic acquisition methods may involve:
 Detaching a chip
 Installing a custom bootloader on the mobile device.
 In such cases, the procedure and the changes must be
carefully tested and documented for later reference.
 This is where examination or data acquisition is not
possible without changing the configuration of the
device.
Understanding Mobile Forensics
05/16/25 04:47 IA316 15
 Following proper methodology and guidelines is
crucial in examining mobile devices.
 Yields the most valuable data.
 Not following the proper procedure during the
examination can result in loss or damage of evidence
or render it inadmissible in court.
Understanding Mobile Forensics
05/16/25 04:47 IA316 16
 Main categories of mobile forensic process:
 Seizure
 Acquisition
 Examination/Analysis
Understanding Mobile Forensics
05/16/25 04:47 IA316 17
 Challenges when seizing devices-If the mobile device is
found switched off,
 Place the device in a Faraday bag to prevent changes
should the device automatically power on.
 Faraday bags are specifically designed to isolate a phone
from a network.
Understanding Mobile Forensics
05/16/25 04:47 IA316 18
 Challenges when seizing devices-If the mobile device is
found switched on,
 Switching it off has a lot of concerns attached to it.
 If the phone is locked by a PIN or password, or encrypted,
you will be required to bypass the lock or determine the
PIN to access the device.
Understanding Mobile Forensics
05/16/25 04:47 IA316 19
 Challenges when seizing devices-if the mobile device is
found switched on
 Mobile phones are networked devices and can send and
receive data through different sources, such as:
 Telecommunication systems.
 Wi-Fi access points
 Bluetooth.
Understanding Mobile Forensics
05/16/25 04:47 IA316 20
 Challenges when seizing devices-if the mobile device is
found switched on
 So, if the phone is in a running state, a criminal could
securely erase the data stored on the phone by
executing a remote wipe command.
 When a phone is switched on, it should be placed in a
Faraday bag.
Understanding Mobile Forensics
05/16/25 04:47 IA316 21
 Challenges when seizing devices-if the mobile device is
found switched on
 If possible, prior to placing a mobile device in a Faraday
bag, you should disconnect it from the network to
protect the evidence by:
 Enabling flight mode/Airplane mode
 Disabling all network connections (Wi-Fi, GPS,
hotspots, and so on).
Understanding Mobile Forensics
05/16/25 04:47 IA316 22
 Challenges when seizing devices-if the mobile device is
found switched on
 Disconnecting from the network also helps to:
 Preserve the battery, which will drain while in a
Faraday bag.
 Protect against leaks in the Faraday bag.
Understanding Mobile Forensics
05/16/25 04:47 IA316 23
 Mobile device forensic acquisition can be performed
using multiple methods.
 Each of these methods affects the amount of analysis
required.
 Should one method fail, another must be attempted.
 Multiple attempts and tools may be necessary in order to
acquire the maximum amount of data from the mobile
device.
Understanding Mobile Forensics
05/16/25 04:47 IA316 24
 Mobile phones are dynamic systems
 Present a lot of challenges in extracting and analyzing
digital evidence.
 There is a rapid increase in the number of different
kinds of mobile phones from different manufacturers.
 Makes it difficult to develop a single process or tool to
examine all types of devices.
Understanding Mobile Forensics
05/16/25 04:47 IA316 25
 Mobile phones are continuously evolving:
 Existing technologies progress and new technologies are
introduced.
 Furthermore, each mobile is designed with a variety of
embedded operating systems.
 Hence, special knowledge and skills are required from
forensic experts to acquire and analyze the devices.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 26
 Hardware differences
 The market is flooded with different models of mobile
phones from different manufacturers.
 Forensic examiners may come across different types of
mobile models that differ in:
 Size
 Hardware
 Features
 Operating system.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 27
 Hardware differences
 Short product development cycle -new models emerge
very frequently.
 It is critical for forensic investigators to adapt to all
challenges and remain updated on mobile device
forensic techniques across various devices.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 28
 Mobile operating systems
 In Personal computers, MS Windows has dominated the
market for years.
 With mobile devices, several Operating Systems are used
frequently.
 Apple's iOS
 Google's Android,
 RIM's BlackBerry OS
 Microsoft's Windows Phone OS,
 HP's webOS,
..
Challenges in Mobile Forensics
05/16/25 04:47 IA316 29
 Mobile operating systems
 Even within these operating systems, there are
several versions, which makes your task even more
difficult.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 30
 Mobile platform security features:
 Modern mobile platforms contain built-in security
features to protect user data and privacy.
 The features act as a hurdle during forensic
acquisition and examination.
 E.g. encryption mechanisms from the hardware
layer to the software layer.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 31
 Mobile platform security features:
 Need to break through these encryption
mechanisms to extract data from the devices.
 Refer: FBI versus Apple encryption dispute.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 32
 Preventing data modification
 Fundamental rule in forensics is to make sure that
data on the device is not modified.
 Any attempt to extract data from the device should
not alter the data present on that device.
 This is not practically possible with mobiles.
 Just switching on a device can change the data on
that device.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 33
 Preventing data modification
 Even if a device appears to be in an off state,
background processes may still run.
 E.g, in most mobiles, the alarm clock still works
even when the phone is switched off.
 A sudden transition from one state to another may
result in the loss or modification of data.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 34
 Anti-forensic techniques makes investigations on
digital media more difficult. Techniques used include:
 Data hiding
 Data obfuscation
 Data forgery
 Secure wiping
Challenges in Mobile Forensics
05/16/25 04:47 IA316 35
 Passcode recovery:
 A forensic examiner needs to gain access to
passcode protected device.
 Has to be done without damaging data on the
device.
 While there are techniques to bypass the screen lock,
they may not always work on all versions of the
OS.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 36
 Lack of resources
 The growing number of mobile phones means the
amount of tools required by a forensic examiner also
increases.
 Forensic acquisition accessories, such as USB
cables, batteries, and chargers for different mobile
phones, have to be maintained.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 37
 Dynamic nature of evidence
 Digital evidence may be easily altered either
intentionally or unintentionally.
 E.g: browsing an application on a phone might
alter the data stored by that application on the device.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 38
 Accidental reset
 Mobile phones provide features to reset everything.
 Resetting a device accidentally while examining it
may result in the loss of data.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 39
 Device alteration
 The possible ways to alter devices include:
 Moving application data
 Renaming files
 Modifying the manufacturer's operating system.
 The expertise of the suspect should be taken into
account.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 40
 Communication shielding
 Mobile devices communicate over:
 Cellular networks
 Wi-Fi networks
 Bluetooth
 Infrared.
 Since communication might alter the device data, the
possibility of further communication should be
eliminated after seizing the device.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 41
 Lack of availability of tools
 There is a wide range of mobile devices.
 A combination of tools needs to be used.
 A single tool may not support all the devices or
perform all the necessary functions.
 So, choosing the right tool for a particular phone might
be difficult.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 42
 Malicious programs
 The device might contain malware or malicious
software, such as a virus or a Trojan.
 These programs may try to spread over other devices
over either a wired interface or a wireless one.
Challenges in Mobile Forensics
05/16/25 04:47 IA316 43
 Legal issues
 Mobile devices might be involved in crimes that cross
geographical boundaries.
 The forensic examiner should be familiar with the
nature of the crime and the regional laws.
IA 316: Computer and Mobile
Forensic Analysis
05/16/25 04:47 IA316 44

Computer and Mobile Forensic Analysis

  • 1.
    IA 316: Computerand Mobile Forensic Analysis Introduction to Mobile Forensics 05/16/25 04:47 IA316 1
  • 2.
    Lecture Outline 05/16/25 04:47IA316 2  The Lecture covers:  Mobile Forensics: definition and uses  The need for Mobile Forensics  Understanding Mobile Forensics  Challenges in Mobile Forensics
  • 3.
    Mobile Forensics 05/16/25 04:47IA316 3  Mobile Forensics: definition  Subset of Digital Forensics  Deals with recovery of evidence from mobile devices such as Smartphones and Tablets
  • 4.
    Mobile Forensics 05/16/25 04:47IA316 4  Mobile Forensics: uses  Law enforcement: Police, PCCB, DPP, Immigration  Solve a lot of crime: fraud, homicide  Military: espionage, counterterrorism  Businesses: intellectual property theft, authorized and unauthorized use of resources.
  • 5.
    The Need forMobile Forensics 05/16/25 04:47 IA316 5  Growing demand for Mobile Devices  By 2021, it was estimated that there are around 15 Billion Mobile Devices.  Technology and users migrating from Desktop to Mobile Phones  Demand for Smartphones is quite high.
  • 6.
    The Need forMobile Forensics 05/16/25 04:47 IA316 6  Smartphones are becoming compact forms of computers.  High performance, huge storage, and enhanced functionality.
  • 7.
    The Need forMobile Forensics 05/16/25 04:47 IA316 7  Mobile phones are the most personal electronic device that a user accesses.  Perform simple communication tasks, such as calling and texting.  Internet browsing, email, taking photos and videos, creating and storing documents  Identifying locations with GPS services, and managing business tasks.
  • 8.
    The Need forMobile Forensics 05/16/25 04:47 IA316 8  Mobile phones have become portable data carriers, keeping track of all our movements.  Increasing prevalence of mobile phones makes then in invaluable source of evidence.  Evidence acquired from mobile phones is used in both criminal and civil cases.  It is now rare to conduct a digital forensic investigation that does not include a phone.
  • 9.
    The Need forMobile Forensics 05/16/25 04:47 IA316 9  Mobile device call logs and GPS data were used to help solve the attempted bombing in Times Square, New York, in 2010  Read more about the investigation at: https://www.forensicon.com/forensics-blotter/cell-pho ne-email-forensics-investigation-cracks-nyc-times-square -car-bombing-case/
  • 10.
    Understanding Mobile Forensics 05/16/2504:47 IA316 10  Digital forensics is a branch of forensic science focusing on the recovery and investigation of raw data residing in electronic or digital devices.  Intends to extract and recover any information from a digital device without altering the data present on the device.
  • 11.
    Understanding Mobile Forensics 05/16/2504:47 IA316 11  Over the years, digital forensics has grown along with the rapid growth of computers and various other digital devices.  There are various branches of digital forensics based on the type of digital device involved, such as:  Computer forensics  Network forensics  Mobile forensics.
  • 12.
    Understanding Mobile Forensics 05/16/2504:47 IA316 12  Forensically sound  It is a term used in the digital forensics community to qualify and justify the use of a particular forensic technology or methodology.  Core principle for Forensic Sound technology or methodology:  The original evidence must not be altered in any form.  This is extremely difficult with mobile devices.
  • 13.
    Understanding Mobile Forensics 05/16/2504:47 IA316 13  Some forensic tools require a communication vector with the mobile device.  Thus standard write protection will not work during forensic acquisition.
  • 14.
    Understanding Mobile Forensics 05/16/2504:47 IA316 14  Prior to extracting data for forensic examination, some of the forensic acquisition methods may involve:  Detaching a chip  Installing a custom bootloader on the mobile device.  In such cases, the procedure and the changes must be carefully tested and documented for later reference.  This is where examination or data acquisition is not possible without changing the configuration of the device.
  • 15.
    Understanding Mobile Forensics 05/16/2504:47 IA316 15  Following proper methodology and guidelines is crucial in examining mobile devices.  Yields the most valuable data.  Not following the proper procedure during the examination can result in loss or damage of evidence or render it inadmissible in court.
  • 16.
    Understanding Mobile Forensics 05/16/2504:47 IA316 16  Main categories of mobile forensic process:  Seizure  Acquisition  Examination/Analysis
  • 17.
    Understanding Mobile Forensics 05/16/2504:47 IA316 17  Challenges when seizing devices-If the mobile device is found switched off,  Place the device in a Faraday bag to prevent changes should the device automatically power on.  Faraday bags are specifically designed to isolate a phone from a network.
  • 18.
    Understanding Mobile Forensics 05/16/2504:47 IA316 18  Challenges when seizing devices-If the mobile device is found switched on,  Switching it off has a lot of concerns attached to it.  If the phone is locked by a PIN or password, or encrypted, you will be required to bypass the lock or determine the PIN to access the device.
  • 19.
    Understanding Mobile Forensics 05/16/2504:47 IA316 19  Challenges when seizing devices-if the mobile device is found switched on  Mobile phones are networked devices and can send and receive data through different sources, such as:  Telecommunication systems.  Wi-Fi access points  Bluetooth.
  • 20.
    Understanding Mobile Forensics 05/16/2504:47 IA316 20  Challenges when seizing devices-if the mobile device is found switched on  So, if the phone is in a running state, a criminal could securely erase the data stored on the phone by executing a remote wipe command.  When a phone is switched on, it should be placed in a Faraday bag.
  • 21.
    Understanding Mobile Forensics 05/16/2504:47 IA316 21  Challenges when seizing devices-if the mobile device is found switched on  If possible, prior to placing a mobile device in a Faraday bag, you should disconnect it from the network to protect the evidence by:  Enabling flight mode/Airplane mode  Disabling all network connections (Wi-Fi, GPS, hotspots, and so on).
  • 22.
    Understanding Mobile Forensics 05/16/2504:47 IA316 22  Challenges when seizing devices-if the mobile device is found switched on  Disconnecting from the network also helps to:  Preserve the battery, which will drain while in a Faraday bag.  Protect against leaks in the Faraday bag.
  • 23.
    Understanding Mobile Forensics 05/16/2504:47 IA316 23  Mobile device forensic acquisition can be performed using multiple methods.  Each of these methods affects the amount of analysis required.  Should one method fail, another must be attempted.  Multiple attempts and tools may be necessary in order to acquire the maximum amount of data from the mobile device.
  • 24.
    Understanding Mobile Forensics 05/16/2504:47 IA316 24  Mobile phones are dynamic systems  Present a lot of challenges in extracting and analyzing digital evidence.  There is a rapid increase in the number of different kinds of mobile phones from different manufacturers.  Makes it difficult to develop a single process or tool to examine all types of devices.
  • 25.
    Understanding Mobile Forensics 05/16/2504:47 IA316 25  Mobile phones are continuously evolving:  Existing technologies progress and new technologies are introduced.  Furthermore, each mobile is designed with a variety of embedded operating systems.  Hence, special knowledge and skills are required from forensic experts to acquire and analyze the devices.
  • 26.
    Challenges in MobileForensics 05/16/25 04:47 IA316 26  Hardware differences  The market is flooded with different models of mobile phones from different manufacturers.  Forensic examiners may come across different types of mobile models that differ in:  Size  Hardware  Features  Operating system.
  • 27.
    Challenges in MobileForensics 05/16/25 04:47 IA316 27  Hardware differences  Short product development cycle -new models emerge very frequently.  It is critical for forensic investigators to adapt to all challenges and remain updated on mobile device forensic techniques across various devices.
  • 28.
    Challenges in MobileForensics 05/16/25 04:47 IA316 28  Mobile operating systems  In Personal computers, MS Windows has dominated the market for years.  With mobile devices, several Operating Systems are used frequently.  Apple's iOS  Google's Android,  RIM's BlackBerry OS  Microsoft's Windows Phone OS,  HP's webOS, ..
  • 29.
    Challenges in MobileForensics 05/16/25 04:47 IA316 29  Mobile operating systems  Even within these operating systems, there are several versions, which makes your task even more difficult.
  • 30.
    Challenges in MobileForensics 05/16/25 04:47 IA316 30  Mobile platform security features:  Modern mobile platforms contain built-in security features to protect user data and privacy.  The features act as a hurdle during forensic acquisition and examination.  E.g. encryption mechanisms from the hardware layer to the software layer.
  • 31.
    Challenges in MobileForensics 05/16/25 04:47 IA316 31  Mobile platform security features:  Need to break through these encryption mechanisms to extract data from the devices.  Refer: FBI versus Apple encryption dispute.
  • 32.
    Challenges in MobileForensics 05/16/25 04:47 IA316 32  Preventing data modification  Fundamental rule in forensics is to make sure that data on the device is not modified.  Any attempt to extract data from the device should not alter the data present on that device.  This is not practically possible with mobiles.  Just switching on a device can change the data on that device.
  • 33.
    Challenges in MobileForensics 05/16/25 04:47 IA316 33  Preventing data modification  Even if a device appears to be in an off state, background processes may still run.  E.g, in most mobiles, the alarm clock still works even when the phone is switched off.  A sudden transition from one state to another may result in the loss or modification of data.
  • 34.
    Challenges in MobileForensics 05/16/25 04:47 IA316 34  Anti-forensic techniques makes investigations on digital media more difficult. Techniques used include:  Data hiding  Data obfuscation  Data forgery  Secure wiping
  • 35.
    Challenges in MobileForensics 05/16/25 04:47 IA316 35  Passcode recovery:  A forensic examiner needs to gain access to passcode protected device.  Has to be done without damaging data on the device.  While there are techniques to bypass the screen lock, they may not always work on all versions of the OS.
  • 36.
    Challenges in MobileForensics 05/16/25 04:47 IA316 36  Lack of resources  The growing number of mobile phones means the amount of tools required by a forensic examiner also increases.  Forensic acquisition accessories, such as USB cables, batteries, and chargers for different mobile phones, have to be maintained.
  • 37.
    Challenges in MobileForensics 05/16/25 04:47 IA316 37  Dynamic nature of evidence  Digital evidence may be easily altered either intentionally or unintentionally.  E.g: browsing an application on a phone might alter the data stored by that application on the device.
  • 38.
    Challenges in MobileForensics 05/16/25 04:47 IA316 38  Accidental reset  Mobile phones provide features to reset everything.  Resetting a device accidentally while examining it may result in the loss of data.
  • 39.
    Challenges in MobileForensics 05/16/25 04:47 IA316 39  Device alteration  The possible ways to alter devices include:  Moving application data  Renaming files  Modifying the manufacturer's operating system.  The expertise of the suspect should be taken into account.
  • 40.
    Challenges in MobileForensics 05/16/25 04:47 IA316 40  Communication shielding  Mobile devices communicate over:  Cellular networks  Wi-Fi networks  Bluetooth  Infrared.  Since communication might alter the device data, the possibility of further communication should be eliminated after seizing the device.
  • 41.
    Challenges in MobileForensics 05/16/25 04:47 IA316 41  Lack of availability of tools  There is a wide range of mobile devices.  A combination of tools needs to be used.  A single tool may not support all the devices or perform all the necessary functions.  So, choosing the right tool for a particular phone might be difficult.
  • 42.
    Challenges in MobileForensics 05/16/25 04:47 IA316 42  Malicious programs  The device might contain malware or malicious software, such as a virus or a Trojan.  These programs may try to spread over other devices over either a wired interface or a wireless one.
  • 43.
    Challenges in MobileForensics 05/16/25 04:47 IA316 43  Legal issues  Mobile devices might be involved in crimes that cross geographical boundaries.  The forensic examiner should be familiar with the nature of the crime and the regional laws.
  • 44.
    IA 316: Computerand Mobile Forensic Analysis 05/16/25 04:47 IA316 44