Investigations pose risks to evidence/investigation; these must be managed.
How to Identifying phone manufacturer/model- can be challenging due to fakes.
How to identify the operating system used on the
phone- Symbian phones may erase call logs if the date is not set.
Can have or get Damage to screen,
Phones are small & fiddly- accidental button presses can occur.
Prevent live signal to avoid data changes and legal issues./ prevent evidence contamination/ biohazards
Use Faraday box to prevent live signal.
Clone SIM card to prevent connection to live signal but Will allow the phone to switch on; modern phones may have eSIM -Expert hardware forensics techniques required to access integrated modules
Four key stages:
1.Preparation
2.Acquisition & Preservation
3.Examination & Analysis
4.Reporting & Presentation
Manual Extraction: Direct interaction with the phone, documentation through photos.
Digital Extraction: Using write blockers (e.g., Cellebrite UFED) to create a digital copy.
1.Logical: Extracts data via the phone's OS, limited access, no deleted data.
The forensic tool typically uses an API (Application Programming Interface) to connect and communicate with the OS of the mobile device and request the required data from the system.
• The OS chooses which data it allows the forensic investigator
to access.
• Logical extractions will not recover deleted files, and the process cannot be performed on locked or password- protected devices.
2.File System: Connects using third-party software, accesses more data but has protected areas.
Involves extracting data from an mobile device by accessing its
file system.
• File system extraction is often used to extract specific types of
data, such as documents, email messages, or photos, rather
than the entire contents of the device's storage. So, there will
be ‘protected areas’.
• Retrieves more data than a logical extraction, e.g. , hidden
system files, databases and other files which were not visible
within a logical extraction.
3. Physical: Connect to the device and take a copy of the entire contents of
the device.
• Physical Extraction bypasses the device’s OS.
• It produces a low-level, bit-by-bit, copy of the phone’s storage device.
• It can bypass system locks and passcodes to extract deleted passwords, files, photos, videos, text messages, call logs, GPS tags, and other artifacts.
• Can access deleted data
Data Extraction Considerations
Has the data changed ?
Connecting device may be recognized, potentially altering data.
Photographs serve as evidence of changes (ACPO Principle 3).
Confirm correct cable usage.
Once extracted, it must be interpreted
Interpreting extracted data using tools like Cellebrite UFED Physical Analyser.
But also act as an investigation tool
Allows viewing data in different formats and bookmarking important data & View and search through the raw data.
Generic evidence sources commonly found on mobile phones:
call logs, phone book, calendar, messages, location, web URLs, images/video etc
Identifiers: Subscriber/Device Identifier.
• Give expert testimony in court, if requiredReport Requirements
Itemized methodology, identity/credentials, reproducible steps, factual results, expert opinion.
Generate report
• Give expert testimony in court, if required
Generate report
• Give expert testimony in court, if required
5 steps
1. Itemized forensic investigations listing methodology. Where they
are sequential indicate this.
2. Your identity and credentials. Provides authentication and
assigns responsibility.
3. For each complete investigation over a device/clone, record steps
so that they are reproducible.
4. Results to be presented factually without speculation.
5. Based on expert opinion, what do these facts indicate in the
context of the investigation?
Digital forensics reports are subject to discovery in UK and US courts
– The opposing legal team may request your reports for analysis by their own experts
– Inconsistencies or departures from protocol may damage or remove your report as evidence
• Reports may provide specific opinions but must be based on common, unbiased scientific principles
– Reproducibility is key.
– Any individual regardless of personal bias should get the same results following the same methodology.
As a forensic technician or investigator, reports are:
Reflect the quality of work,
The primary deliverable expected from your work
influence decision-making IN COURT
and are crucial for career advancement.
Much of the investigator’s work for a mobile phone examination is done before even looking at the mobile phone data
– Risk Management
– Identifying the phone
– Cloning the SIM
– Extracting the data
– A brief overview of good practices in reporting (and experimental methods in general)