Mobile Forensics: Fundamentals and Process

WHAT IS Mobile FORENSICS?
  • Mobile forensics is about finding and revealing digital proof of crimes or other technical issues from mobile devices.

  • It specifically deals with data from phones, smartphones, tablets, and other portable gadgets.

  • This field is very important for police, company investigations, and fixing security problems. It helps uncover facts about online crimes, data hacks, and legal issues.

  • It uses a clear step-by-step process: finding what to look for (Collection), making sure the evidence isn't changed (Preservation), closely examining the data (Analysis), writing down everything (Documentation), and finally, explaining the findings clearly (Presentation).

  • Key idea: The process makes sure to identify digital evidence, keep it safe, check it carefully, record all details, and share the results in a way that can be used in court.

Mobile Forensic Process
  • Identification: First, clearly understand what the investigation is about and which devices are important.

    • Figure out what people, tools, and legal permissions are needed.

    • Knowing the case well guides all the next steps.

  • Preservation: This crucial step makes sure digital evidence is kept safe and unchanged. It prevents it from being altered, contaminated, or destroyed.

    • Often, devices are put into special "Faraday bags" to stop remote wiping and to make exact copies of the device's data.

  • Analysis: After saving the data, it's processed, looked at closely, and understood to find useful and important information.

    • This involves using special forensic tools and methods to get back deleted files, look at call logs, location data, app use, and other digital clues.

  • Documentation: Every action taken during the forensic process must be carefully written down. This includes details of the device, tools used, methods applied, and results.

    • Record all steps and results to ensure they can be recreated and used legally.

  • Presentation: The investigation's findings are summarized and explained clearly to people who need to know, like lawyers, managers, or court officials.

    • The goal is to provide facts for decisions or to give expert testimony in court.

  • Additional notes:

    • Choose the right tools and methods based on the device's operating system and model.

    • Pick suitable ways to get data, such as copying the whole device, copying logical files, or copying the file system.

    • Thoroughly record the crime scene with photos, drawings, and maps to understand the situation and prove who handled the evidence.

Mobile Forensics Goals
  • Find legal evidence on digital devices and keep it safe so it can be used in court.

  • Save and recover evidence using approved technical steps, following forensic standards.

  • Find out if data is leaking from a company by looking at mobile device communications and stored data.

  • See how much damage happened during a data breach, including its size, effect, and what data on mobile devices was involved.

Mobile storage and evidence location
  • Internal Memory: This is the built-in storage in the device, like RAM (temporary memory) or flash memory (permanent storage).

    • It holds the mobile operating system, installed apps, user data (contacts, calls, messages), and system settings.

    • Data in RAM is temporary and disappears when the device turns off.

  • SIM Card (Subscriber Identity Module Card): A tiny, removable card that saves service information.

    • It stores personal details like your unique mobile identity (IMSI), contacts, SMS messages, call details, and network settings.

  • External Memory: This means removable storage, usually Micro SD cards.

    • These store personal info and files like audio, video, pictures, documents, and app data. Users often choose them for more storage space.

What should you do before investigation
  • Build a Forensics Workstation: Set up a special, secure computer area with the right equipment.

  • Build the Investigation Team: Put together a skilled team with different areas of expertise.

  • Review Policies and Laws: Understand relevant laws and company rules.

  • Notify Decision Makers and Acquire Authorization: Get official permission and tell the right people.

    • This makes sure the investigation is legal and can get the resources it needs.

  • Risk Assessment: Check for possible risks to data, privacy, and legal rules during the investigation.

  • Build a Mobile Forensics Toolkit: Gather all necessary hardware and software tools.

Build a forensic workstation
  • Equipment to include:

    • A strong computer (laptop or desktop): Needs enough power, memory (RAM), and storage for forensic software and data. It's often kept separate from networks.

    • A USB connector: To link various mobile devices and accessories to the workstation.

    • Mobile forensics toolkit: Special software and hardware for getting and analyzing data from mobile devices.

    • Micro SD memory card reader: To get data directly from external memory cards.

    • Mobile hardware toolkit: Tools like spudgers, screwdrivers, and opening picks for taking devices apart if needed.

    • Cables (including FireWire, Bluetooth, and IR): A full set of original cables and adapters to connect to many types of mobile devices.

    • SIM card reader: To get data directly from SIM cards without putting them in a phone.

Build the investigation team
  • The team should have experts in collecting and reporting mobile device evidence, combining different skills.

  • Roles may include:

    • Expert Witness: Gives unbiased testimony and explains technical details in court.

    • Evidence Manager: Keeps track of evidence and who has handled it.

    • Evidence Documenter: Writes down all observed details, actions, and the state of evidence.

    • Evidence Examiner/Investigator: Does the actual analysis and data extraction.

    • Attorney: Gives legal advice and ensures laws are followed.

    • Photographer: Takes pictures of the crime scene and evidence.

    • Incident Responder: Manages the overall response to security events.

    • Decision Maker: Approves actions and makes key choices.

    • Incident Analyzer: Understands why an incident happened and what its effects are.

  • Each member should have:

    • Deep knowledge of many mobile devices, their hardware, operating systems (like Android, iOS), and apps.

    • Awareness of local and international laws about mobile crime and digital evidence.

    • Necessary security clearance and permission for their tasks, especially with sensitive information.

  • Keep the team small to maintain secrecy and communicate easily.

  • Assign clear jobs to team members; choose a technical lead to manage forensic activities.

Review policies and laws
  • Check local, national, and international laws that might affect the investigation, such as privacy laws or rules for electronic evidence.

  • Investigators must follow a legally accepted process and document everything to make sure evidence can be used in court and avoid legal problems.

  • Look at internal company policies (like "Bring Your Own Device" or BYOD) and security rules for company mobile devices to understand user agreements and who owns the data.

    • This also includes rules about how long data is kept and acceptable ways to use devices.

Mobile phone evidence — analysis
  • Things involved in analysis include:

    • Phone Memory: A detailed look at both temporary (RAM) and permanent (flash memory) data to find call logs, SMS, emails, web history, GPS data, and app data.

    • Service Provider Data: Information from network carriers, like billing records, cell tower locations, and subscriber details, which can support device data.

    • Reports: Creating full forensic reports explaining findings, methods, and conclusions for legal or internal use.

    • Forensics Workstation: The place where all analysis happens, keeping data safe and providing access to special tools.

Collecting the evidence
  • Protect physical and electronic evidence by securing the crime scene.

  • Stop unauthorized people from entering and touching evidence to avoid messing it up.

  • Collect all electronic devices at the crime scene, including phones, tablets, chargers, and external storage.

  • Check if the mobile device is plugged into a computer or other things; if so, write it down and keep the connection safe.

  • Confirm if devices are on or off (by checking lights, screen, or vibration) to decide how to save them.

  • Collect non-electronic evidence like written passwords, notes, and printouts that might give important clues.

Document the scene
  • Write down details of all electronic devices at the crime scene, their location, condition, and any accessories.

  • Take clear, many-angled photos of all evidence and write detailed notes about what's on the screen or device.

  • Document the device's condition when seized (on/off, locked/unlocked, charging, connected to network).

  • Note any activity on the electronic devices at the crime scene, like incoming calls, messages, or screen changes, before doing anything else.

Document the evidence
  • Phone Identification: Clearly identify the brand, model, operating system (e.g., Android version, iOS version), and network provider of the device.

    • This helps a lot in choosing the right forensic tool and method to get data.

  • Connection Identification: Identify how the mobile device is connected to the forensics workstation (e.g., USB cable, infrared, or Bluetooth).

    • The choice depends on the phone's abilities, the tool's compatibility, and how the data is being copied.

  • Tool Selection: Based on the device and connection, pick a forensic tool that is:

    • Usable: Easy to use for trained staff.

    • Comprehensive: Supports many devices, operating systems, and data types (like SMS, call logs, GPS, app data).

    • Accurate: Gets data reliably without errors or changing the original evidence.

    • Deterministic: Gives the same results if used multiple times on the same data under the same conditions.

    • Verifiable: Its output can be checked by other means or by looking at the raw data, showing it's trustworthy and transparent.

Evidence preservation
  • The goal of preservation is to take the suspect mobile phone and its accessories without changing or contaminating the digital data inside.

  • This is the first important step done before the actual investigation and analysis.

  • It involves finding, recognizing, documenting, and carefully collecting digital evidence at the crime scene to keep it intact for legal use.

Set of switching for on/off mobile phone
  • ON State:

    • If the device is ON, DO NOT turn it OFF. Powering it down could lock it, start remote wiping, encrypt data, or change temporary memory (RAM) content.

    • Write down everything on the display (like incoming messages, current apps), and photograph it if possible, for immediate record-keeping.

    • Only turn it off before moving it if absolutely necessary, and only after taking all needed steps, like unplugging it and cutting off network connections.

  • OFF State:

    • If the device is OFF, leave it OFF. Turning it ON could change evidence (like altering timestamps, enabling network, or writing over deleted data), similar to how it affects computers.

    • Secure the device while it's OFF using methods like a Faraday bag.

Faraday bag
  • A Faraday bag offers RF (Radio Frequency) protection. It creates an electromagnetic shield to stop remote changes or wiping of data on a mobile device.

  • It blocks all wireless signals (cellular, Wi-Fi, Bluetooth), separating the device from outside interference.

  • Disklabs is an example brand known for its forensic-grade Faraday bags.

Forensic imaging
  • A forensic investigator should not work directly on the original evidence because any action could accidentally change or destroy important data.

  • Instead, the normal practice is to create an exact copy (called a "forensic image" or "physical acquisition") of the mobile device's storage. This is done for the device found at the crime scene.

  • This image is an exact duplicate of the storage, capturing every bit of data, even deleted files and empty spaces.