Mobile Forensics
Overview of Mobile Forensics
- Focus on the forensic analysis of mobile devices which includes extracting and analyzing data.
- Key areas include:
- Types of mobile devices
- Mobile operating systems
- Variability in mobile devices
- Methods for extracting data
- Mobile phone architecture
- Role of digital information in investigations
Mobile Forensics
- Mobile devices function similarly to computers, offering numerous applications and services.
- They provide extensive evidentiary data during investigations.
- Best practice for preserving data:
- Keep the mobile device running while blocking communication signals (e.g., using a Faraday bag).
- Challenges in mobile forensics stem from:
- Diverse data storage and management methods across different devices.
Types of Mobile Devices
- Cellular Network Basics:
- Cellular systems consist of short-distance transceivers enabling communication between phones and network.
- Mobile Network Generations:
- 2G: Digital cellular networks transition to handheld devices enabling basic data communication.
- 3G: Transition from circuit-switched to packet-switched networks, allowing broader data access.
- 4G and 5G: Native IP networks with direct Internet access enhancing speed; 5G offers advanced processing and supports various devices beyond smartphones, including automation tools.
Mobile Phone Operating Systems
- Prominent OS include:
- iOS (Apple)
- Android (Google)
- Windows Phone OS (Microsoft, less common)
- 3G, 4G, and 5G phones mirror PC architecture, enabling app installations akin to laptops/desktops.
Variability of Mobile Devices
- Geolocation capabilities through GPS track user activities, aiding in locating suspects relative to crime scenes.
- Each device’s unique features necessitate special connectors and drivers for forensic analysis.
- Device storage forms:
- Onboard nonvolatile memory (internal)
- External storage (mini-SD cards) for additional capacity.
Extracting Data from Mobile Devices
- Forensic analysis enhances understanding of timelines related to criminal activities.
- Storage Practices:
- Always store devices in a Faraday bag to avoid remote alterations.
- Types of Data Extraction:
- Physical forensic images: Complete, bit-by-bit duplicates of file systems, including deleted data.
- Logical data extraction: Snapshots representing visible data to standard users.
- Recommended practice:
- Run the forensic image operation twice— retain one as evidence, determining extraction types based on the device.
Mobile Phone Architecture
- Storage Options:
- SD Cards: Nonvolatile, expandable storage for photos, music, etc.
- SIM Cards: Contain international mobile subscriber identity (IMSI), and integrated circuit card identifier (ICCID) essential for network identification.
- Components of a mobile device:
- Digital signal processor
- Microprocessor
- RF transmitter/receiver
- Audio components
- Power supply and battery system.
Assessing the Impact of Digital Evidence on an Investigation
- Causal Chains of Evidence:
- Cause and effect relationships in crime analysis, detailing how evidence links contribute to overall understanding.
- Hybrid Crime Assessment Technique:
- Methodology for dealing with crimes encompassing physical and digital elements (e.g., crimes involving mobile devices).
- Objective: Integrate information from mobile devices into larger investigations to enhance evidence comprehension.