IA 316: Computerand Mobile Forensic
Analysis
Introduction to Mobile Forensics
05/16/25 04:47 IA316 1
2.
Lecture Outline
05/16/25 04:47IA316 2
The Lecture covers:
Mobile Forensics: definition and uses
The need for Mobile Forensics
Understanding Mobile Forensics
Challenges in Mobile Forensics
3.
Mobile Forensics
05/16/25 04:47IA316 3
Mobile Forensics: definition
Subset of Digital Forensics
Deals with recovery of evidence from mobile devices
such as Smartphones and Tablets
4.
Mobile Forensics
05/16/25 04:47IA316 4
Mobile Forensics: uses
Law enforcement: Police, PCCB, DPP, Immigration
Solve a lot of crime: fraud, homicide
Military: espionage, counterterrorism
Businesses: intellectual property theft, authorized and
unauthorized use of resources.
5.
The Need forMobile Forensics
05/16/25 04:47 IA316 5
Growing demand for Mobile Devices
By 2021, it was estimated that there are around 15
Billion Mobile Devices.
Technology and users migrating from Desktop to
Mobile Phones
Demand for Smartphones is quite high.
6.
The Need forMobile Forensics
05/16/25 04:47 IA316 6
Smartphones are becoming compact forms of
computers.
High performance, huge storage, and enhanced
functionality.
7.
The Need forMobile Forensics
05/16/25 04:47 IA316 7
Mobile phones are the most personal electronic device
that a user accesses.
Perform simple communication tasks, such as calling
and texting.
Internet browsing, email, taking photos and videos,
creating and storing documents
Identifying locations with GPS services, and managing
business tasks.
8.
The Need forMobile Forensics
05/16/25 04:47 IA316 8
Mobile phones have become portable data carriers,
keeping track of all our movements.
Increasing prevalence of mobile phones makes then in
invaluable source of evidence.
Evidence acquired from mobile phones is used in both
criminal and civil cases.
It is now rare to conduct a digital forensic investigation
that does not include a phone.
9.
The Need forMobile Forensics
05/16/25 04:47 IA316 9
Mobile device call logs and GPS data were used to
help solve the attempted bombing in Times Square,
New York, in 2010
Read more about the investigation at:
https://www.forensicon.com/forensics-blotter/cell-pho
ne-email-forensics-investigation-cracks-nyc-times-square
-car-bombing-case/
10.
Understanding Mobile Forensics
05/16/2504:47 IA316 10
Digital forensics is a branch of forensic science
focusing on the recovery and investigation of raw
data residing in electronic or digital devices.
Intends to extract and recover any information from a
digital device without altering the data present on the
device.
11.
Understanding Mobile Forensics
05/16/2504:47 IA316 11
Over the years, digital forensics has grown along with
the rapid growth of computers and various other digital
devices.
There are various branches of digital forensics based on
the type of digital device involved, such as:
Computer forensics
Network forensics
Mobile forensics.
12.
Understanding Mobile Forensics
05/16/2504:47 IA316 12
Forensically sound
It is a term used in the digital forensics community to
qualify and justify the use of a particular forensic
technology or methodology.
Core principle for Forensic Sound technology or
methodology:
The original evidence must not be altered in any form.
This is extremely difficult with mobile devices.
13.
Understanding Mobile Forensics
05/16/2504:47 IA316 13
Some forensic tools require a communication vector
with the mobile device.
Thus standard write protection will not work during
forensic acquisition.
14.
Understanding Mobile Forensics
05/16/2504:47 IA316 14
Prior to extracting data for forensic examination, some
of the forensic acquisition methods may involve:
Detaching a chip
Installing a custom bootloader on the mobile device.
In such cases, the procedure and the changes must be
carefully tested and documented for later reference.
This is where examination or data acquisition is not
possible without changing the configuration of the
device.
15.
Understanding Mobile Forensics
05/16/2504:47 IA316 15
Following proper methodology and guidelines is
crucial in examining mobile devices.
Yields the most valuable data.
Not following the proper procedure during the
examination can result in loss or damage of evidence
or render it inadmissible in court.
Understanding Mobile Forensics
05/16/2504:47 IA316 17
Challenges when seizing devices-If the mobile device is
found switched off,
Place the device in a Faraday bag to prevent changes
should the device automatically power on.
Faraday bags are specifically designed to isolate a phone
from a network.
18.
Understanding Mobile Forensics
05/16/2504:47 IA316 18
Challenges when seizing devices-If the mobile device is
found switched on,
Switching it off has a lot of concerns attached to it.
If the phone is locked by a PIN or password, or encrypted,
you will be required to bypass the lock or determine the
PIN to access the device.
19.
Understanding Mobile Forensics
05/16/2504:47 IA316 19
Challenges when seizing devices-if the mobile device is
found switched on
Mobile phones are networked devices and can send and
receive data through different sources, such as:
Telecommunication systems.
Wi-Fi access points
Bluetooth.
20.
Understanding Mobile Forensics
05/16/2504:47 IA316 20
Challenges when seizing devices-if the mobile device is
found switched on
So, if the phone is in a running state, a criminal could
securely erase the data stored on the phone by
executing a remote wipe command.
When a phone is switched on, it should be placed in a
Faraday bag.
21.
Understanding Mobile Forensics
05/16/2504:47 IA316 21
Challenges when seizing devices-if the mobile device is
found switched on
If possible, prior to placing a mobile device in a Faraday
bag, you should disconnect it from the network to
protect the evidence by:
Enabling flight mode/Airplane mode
Disabling all network connections (Wi-Fi, GPS,
hotspots, and so on).
22.
Understanding Mobile Forensics
05/16/2504:47 IA316 22
Challenges when seizing devices-if the mobile device is
found switched on
Disconnecting from the network also helps to:
Preserve the battery, which will drain while in a
Faraday bag.
Protect against leaks in the Faraday bag.
23.
Understanding Mobile Forensics
05/16/2504:47 IA316 23
Mobile device forensic acquisition can be performed
using multiple methods.
Each of these methods affects the amount of analysis
required.
Should one method fail, another must be attempted.
Multiple attempts and tools may be necessary in order to
acquire the maximum amount of data from the mobile
device.
24.
Understanding Mobile Forensics
05/16/2504:47 IA316 24
Mobile phones are dynamic systems
Present a lot of challenges in extracting and analyzing
digital evidence.
There is a rapid increase in the number of different
kinds of mobile phones from different manufacturers.
Makes it difficult to develop a single process or tool to
examine all types of devices.
25.
Understanding Mobile Forensics
05/16/2504:47 IA316 25
Mobile phones are continuously evolving:
Existing technologies progress and new technologies are
introduced.
Furthermore, each mobile is designed with a variety of
embedded operating systems.
Hence, special knowledge and skills are required from
forensic experts to acquire and analyze the devices.
26.
Challenges in MobileForensics
05/16/25 04:47 IA316 26
Hardware differences
The market is flooded with different models of mobile
phones from different manufacturers.
Forensic examiners may come across different types of
mobile models that differ in:
Size
Hardware
Features
Operating system.
27.
Challenges in MobileForensics
05/16/25 04:47 IA316 27
Hardware differences
Short product development cycle -new models emerge
very frequently.
It is critical for forensic investigators to adapt to all
challenges and remain updated on mobile device
forensic techniques across various devices.
28.
Challenges in MobileForensics
05/16/25 04:47 IA316 28
Mobile operating systems
In Personal computers, MS Windows has dominated the
market for years.
With mobile devices, several Operating Systems are used
frequently.
Apple's iOS
Google's Android,
RIM's BlackBerry OS
Microsoft's Windows Phone OS,
HP's webOS,
..
29.
Challenges in MobileForensics
05/16/25 04:47 IA316 29
Mobile operating systems
Even within these operating systems, there are
several versions, which makes your task even more
difficult.
30.
Challenges in MobileForensics
05/16/25 04:47 IA316 30
Mobile platform security features:
Modern mobile platforms contain built-in security
features to protect user data and privacy.
The features act as a hurdle during forensic
acquisition and examination.
E.g. encryption mechanisms from the hardware
layer to the software layer.
31.
Challenges in MobileForensics
05/16/25 04:47 IA316 31
Mobile platform security features:
Need to break through these encryption
mechanisms to extract data from the devices.
Refer: FBI versus Apple encryption dispute.
32.
Challenges in MobileForensics
05/16/25 04:47 IA316 32
Preventing data modification
Fundamental rule in forensics is to make sure that
data on the device is not modified.
Any attempt to extract data from the device should
not alter the data present on that device.
This is not practically possible with mobiles.
Just switching on a device can change the data on
that device.
33.
Challenges in MobileForensics
05/16/25 04:47 IA316 33
Preventing data modification
Even if a device appears to be in an off state,
background processes may still run.
E.g, in most mobiles, the alarm clock still works
even when the phone is switched off.
A sudden transition from one state to another may
result in the loss or modification of data.
34.
Challenges in MobileForensics
05/16/25 04:47 IA316 34
Anti-forensic techniques makes investigations on
digital media more difficult. Techniques used include:
Data hiding
Data obfuscation
Data forgery
Secure wiping
35.
Challenges in MobileForensics
05/16/25 04:47 IA316 35
Passcode recovery:
A forensic examiner needs to gain access to
passcode protected device.
Has to be done without damaging data on the
device.
While there are techniques to bypass the screen lock,
they may not always work on all versions of the
OS.
36.
Challenges in MobileForensics
05/16/25 04:47 IA316 36
Lack of resources
The growing number of mobile phones means the
amount of tools required by a forensic examiner also
increases.
Forensic acquisition accessories, such as USB
cables, batteries, and chargers for different mobile
phones, have to be maintained.
37.
Challenges in MobileForensics
05/16/25 04:47 IA316 37
Dynamic nature of evidence
Digital evidence may be easily altered either
intentionally or unintentionally.
E.g: browsing an application on a phone might
alter the data stored by that application on the device.
38.
Challenges in MobileForensics
05/16/25 04:47 IA316 38
Accidental reset
Mobile phones provide features to reset everything.
Resetting a device accidentally while examining it
may result in the loss of data.
39.
Challenges in MobileForensics
05/16/25 04:47 IA316 39
Device alteration
The possible ways to alter devices include:
Moving application data
Renaming files
Modifying the manufacturer's operating system.
The expertise of the suspect should be taken into
account.
40.
Challenges in MobileForensics
05/16/25 04:47 IA316 40
Communication shielding
Mobile devices communicate over:
Cellular networks
Wi-Fi networks
Bluetooth
Infrared.
Since communication might alter the device data, the
possibility of further communication should be
eliminated after seizing the device.
41.
Challenges in MobileForensics
05/16/25 04:47 IA316 41
Lack of availability of tools
There is a wide range of mobile devices.
A combination of tools needs to be used.
A single tool may not support all the devices or
perform all the necessary functions.
So, choosing the right tool for a particular phone might
be difficult.
42.
Challenges in MobileForensics
05/16/25 04:47 IA316 42
Malicious programs
The device might contain malware or malicious
software, such as a virus or a Trojan.
These programs may try to spread over other devices
over either a wired interface or a wireless one.
43.
Challenges in MobileForensics
05/16/25 04:47 IA316 43
Legal issues
Mobile devices might be involved in crimes that cross
geographical boundaries.
The forensic examiner should be familiar with the
nature of the crime and the regional laws.
44.
IA 316: Computerand Mobile
Forensic Analysis
05/16/25 04:47 IA316 44