{"id":25443,"date":"2020-02-03T14:26:56","date_gmt":"2020-02-03T08:56:56","guid":{"rendered":"https:\/\/www.armourinfosec.com\/?p=25443"},"modified":"2020-02-07T10:36:33","modified_gmt":"2020-02-07T05:06:33","slug":"mobile-forensic-and-its-procedure","status":"publish","type":"post","link":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/","title":{"rendered":"Mobile Forensic and Its Procedure"},"content":{"rendered":"

Introduction of Mobile Forensic<\/strong><\/h2>\n

Today’s smartphones are used less for calling and more for socializing. This has resulted in smartphones holding a lot of sensitive data about their users. Mobile devices keep the user’s contacts from a variety of sources (including the phone, social networks, instant messaging, and communication applications), information about phone calls<\/strong>, sent and received text messages<\/strong>, and e-mails<\/strong> and attachments. There are also browser logs and cached geolocation information<\/strong>; pictures<\/strong> and videos<\/strong> taken with the phone’s camera; passwords to cloud services<\/strong>, forums<\/strong>, social networks<\/strong>, online portals<\/strong>, and shopping websites<\/strong>; stored payment data<\/strong>; and a lot of other information that can be vital for an investigation.<\/p>\n

Within mobile phones, smart phones are very much becoming the norm. Improvements in the computing power and data storage of these devices enable us to perform a wide range of activities.We are increasingly becoming dependent on these mobile devices for most of our activities. Apart from performing routine tasks such as making calls, sending messages, and so on, these devices also support other activities such as sending e-mails, surfing the Internet, recording videos, creating and storing documents, identifying locations with Global Positioning System (GPS) services, managing business tasks, and much more. In other words, mobile devices are now a repository of sensitive personal information, containing a wealth of user data.<\/p>\n

Mobile Forensic<\/strong><\/h2>\n

Mobile device forensics<\/strong> is a branch of digital forensics which deals with extracting<\/strong>, recovering<\/strong> and analyzing<\/strong> digital evidence or data from a mobile device under forensically sound conditions. Simply put, it deals with accessing the data stored on devices which includes SMS, contacts, call records, photos, videos, documents, application files, browsing history and so on, and also recovering data deleted<\/strong> from devices using various forensic techniques. It is important that the process of recovering or accessing details from a device is forensically sound, if it has to be admitted in a court of law and to maintain the integrity of the evidence.<\/p>\n

Why we need Mobile Forensic ?<\/strong>\"\"<\/h2>\n

The importance of mobile forensics is hard to underestimate. Back in 2012, over 70% of web page requests originated from desktop and laptop computers (Windows 7 and Windows XP being the most popular systems). In May 2015, only 43% of requests come from desktop operating systems, while 54% of the traffic comes from Android, iOS, and Windows phone devices. If you look at the following graph, the trend is clear-the proportion of time the users spend with desktop computers is falling, while the use of mobile devices is rising.<\/p>\n

The Mobile Forensic approach<\/strong><\/h2>\n

Once the data is extracted from a device, different methods of analysis are used based on the underlying case. As each investigation is distinct, it is not possible to have a single definitive procedure for all cases. However, the overall process can be broken into five phases as shown in the following diagram.<\/p>\n

\"\"<\/p>\n

Investigation preparation:<\/span><\/strong><\/h4>\n

This phase begins when a request for examination is received. It involves preparing all of the paperwork and forms required to document the chain of custody, ownership information, the device model, its purpose, the information that the requester is seeking, and so on. The chain of custody refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. From the details submitted by the requester, it’s important to have a clear understanding of the objective for each examination.<\/p>\n

Seizure and Isolation:<\/span><\/strong><\/h4>\n

Handling the device during seizure is one of the important steps while performing forensic analysis. The evidence is usually transported using anti-static bags which are designed to protect electronic components against damages produced by static electricity. As soon as the device is seized, care should be taken to make sure that our actions don’t result in any data modification on the device. At the same time, any opportunity that can aid the investigation should also not be missed.Handling the device during seizure is one of the important steps while performing forensic analysis. The evidence is usually transported using anti-static bags which are designed to protect electronic components against damages produced by static electricity. As soon as the device is seized, care should be taken to make sure that our actions don’t result in any data modification on the device. At the same time, any opportunity that can aid the investigation should also not be missed.Unlike PCs that can be either online or offline (which includes energy-saving states of sleep and hibernation), smartphones and tablets use a different, always-connected mods.
\nTremendous amounts of activities are carried out in the background, even while the device is apparently sleeping. Activities can be scheduled or triggered by a large number of events, including push events from online services and events that are initiated remotely by the user.
\nAnother thing to consider when acquiring a mobile device is security. Mobile devices are carried around a lot, and they are designed to be inherently more secure than desktop PCs. Non-removable storage and soldered RAM chips, optional or enforced data encryption, remote kill switches, secure lock screens, and locked boot loaders are just a few security measures to be mentioned.<\/p>\n

The use of Faraday bags<\/strong><\/h4>\n

Faraday bags are commonly used to temporarily store seized devices without powering them down. A Faraday bag blocks wireless connectivity to cellular networks, Wi-Fi, Bluetooth, satellite navigation, and any other radios used in mobile devices<\/strong>. Faraday bags are normally designed to shield the range of radio frequencies used by local cellular carriers and satellite navigation (typically the 700-2,600 MHz), as well as the 2.4-5 GHz range used by Wi-Fi networks and Bluetooth<\/strong>. Many Faraday bags are made of specially-coated metallic shielding material that blocks a wide range of radio frequencies.
\nWith increasing user awareness on security and privacy, most of the devices now have screen lock enabled.<\/p>\n

\"\"<\/p>\n

 <\/p>\n

During the time of seizure, if there is a chance to do so, disable the pass code.Some devices do not ask the user to re-enter the pass code while disabling the lock screen option.<\/strong>If the device is unlocked, try to change the settings of the device to allow greater access to the device. Some of the settings that can be considered to achieve this are as follows:<\/p>\n

    \n
  • Enable USB debugging<\/strong>: Enabling this option gives greater access to the device through Android debug bridge (adb) connection.<\/li>\n
  • Enable stay awake setting<\/strong>: Enabling this option and charging the device will make the device stay awake which means that, it doesn’t get locked. In Android devices, this option is usually found under Settings | Developer<\/strong> options, as shown in the following screenshot<\/li>\n
  • Increase Screen timeout<\/strong>: This is the time for which the device will be active once it is unlocked. Depending on the device model, this time can be set up to 30 minutes. In most devices, it can be accessed under Settings | Display | Screen timeout.<\/strong><\/li>\n<\/ul>\n

    Acquisition:<\/span><\/strong><\/h4>\n

    The acquisition phase refers to the extraction of data from the device. Due to the inherent security features of mobile devices, extracting data is not always straight forward. Depending on the operating system, make, and model of the device, the extraction method is decided<\/strong>. The following types of acquisition methods can be used to extract data from a device:<\/p>\n

    1. Manual acquisition<\/strong>: This is the simplest of all acquisition methods. The examiner uses the user interface of the phone to browse and investigate. No special tools or techniques are required here<\/strong>, but the limitation is that only those files and data that are visible through a normal user interface can be extracted. Data extracted through other methods can also be verified using this.<\/p>\n

    2. Logical acquisition<\/strong>: This is also called logical extraction. This generally refers to extracting the files that are present on a logical store such as a file system partition.<\/strong> This involves obtaining data types, such as text messages, call history, pictures and so on, from a phone. The logical extraction technique works by using the original equipment manufacturer’s APIs for synchronizing the phone’s contents with a computer. This technique usually involves extracting
    \nthe following evidence:<\/p>\n

      \n
    • Call Logs<\/li>\n
    • SMS<\/li>\n
    • MMS<\/li>\n
    • Browser history<\/li>\n
    • Peoples (phone call)<\/li>\n
    • Contact methods<\/li>\n
    • Contacts extensions<\/li>\n
    • Contacts groups<\/li>\n
    • Contacts phones<\/li>\n
    • Contacts setting<\/li>\n
    • External image media (metadata)<\/li>\n
    • External image thumbnail media (metadata)<\/li>\n
    • External media, audio, and misc. (metadata)<\/li>\n
    • External videos (meta data)<\/li>\n
    • MMS Parts (includes full images sent via MMS)<\/li>\n
    • Location details (GPS data)<\/li>\n
    • Internet activity<\/li>\n
    • Organizations<\/li>\n
    • List of all applications installed, along with their version<\/li>\n
    • Social networking apps data such as Whats App, Skype, Facebook, and so on.<\/li>\n<\/ul>\n

      3. Physical acquisition<\/strong>: This involves making a bit-by-bit copy of the entire flash memory<\/strong>. The data extracted using this method is usually in the form of raw data (as a hexadecimal dump),which can then be further parsed to obtain file system information or human readable data. Since all investigations are performed on this image, this process also ensures that original evidence is not altered.<\/p>\n

      4. File system acquisition:<\/strong> This is a logical procedure and generally refers to the extraction of a full file system<\/strong> from a mobile device. File system acquisition can sometimes help in recovering deleted contents (stored in SQLite files<\/strong>) that are deleted from the device.<\/p>\n

      Examination and Analysis :<\/span><\/strong><\/h4>\n

      In this phase, different software tools are used to extract the data from the memory image. In addition to these tools, an investigator would also need the help of a hex editor,<\/strong> as tools do not always extract all the data. There is no single tool that can be used in all cases. Hence, examination and analysis requires a sound knowledge of various file systems, file headers, and so on.<\/p>\n

      Reporting:<\/span><\/strong><\/h4>\n

      Documentation of the examination should be done throughout the process, noting down what was done in each phase. The following points might be documented by an examiner:<\/p>\n

        \n
      • Date and time the examination started<\/li>\n
      • Physical condition of the phone<\/li>\n
      • The status of the phone when received (ON\/OFF)<\/li>\n
      • Maker, model, and operating system of the phone<\/li>\n
      • Pictures of the phone and individual components<\/li>\n
      • Tools used during the investigation<\/li>\n
      • Data documented during the examination<\/li>\n<\/ul>\n

        The data extracted from the mobile device should be clearly presented to the recipient so that it can be imported into other software for further analysis. In the case of civil or criminal cases, wherever possible, pictures of data, as it existed on the cellular phone, should be collected, as they can be visually compelling to a jury.<\/p>\n","protected":false},"excerpt":{"rendered":"

        Introduction of Mobile Forensic Today’s smartphones are used less for calling and more for socializing. This has resulted in smartphones…<\/p>\n","protected":false},"author":1,"featured_media":25460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[98],"tags":[100,99,101],"yoast_head":"\nMobile Forensic and Its Procedure - Armour Infosec<\/title>\n<meta name=\"description\" content=\"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Forensic and Its Procedure - Armour Infosec\" \/>\n<meta property=\"og:description\" content=\"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/\" \/>\n<meta property=\"og:site_name\" content=\"Armour Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ArmourInfosec\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-03T08:56:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-07T05:06:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.armourinfosec.com\/wp-content\/uploads\/2020\/02\/unnamed-e1580905562173.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"490\" \/>\n\t<meta property=\"og:image:height\" content=\"253\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Armour Infosec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ArmourInfosec\" \/>\n<meta name=\"twitter:site\" content=\"@ArmourInfosec\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Armour Infosec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/\",\"url\":\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/\",\"name\":\"Mobile Forensic and Its Procedure - Armour Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/www.armourinfosec.com\/#website\"},\"datePublished\":\"2020-02-03T08:56:56+00:00\",\"dateModified\":\"2020-02-07T05:06:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308\"},\"description\":\"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.armourinfosec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Forensic and Its Procedure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.armourinfosec.com\/#website\",\"url\":\"https:\/\/www.armourinfosec.com\/\",\"name\":\"Armour Infosec\",\"description\":\"Do Your Part - Be Security Smart\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.armourinfosec.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308\",\"name\":\"Armour Infosec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g\",\"caption\":\"Armour Infosec\"},\"sameAs\":[\"https:\/\/www.armourinfosec.com\/\"],\"url\":\"https:\/\/www.armourinfosec.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Forensic and Its Procedure - Armour Infosec","description":"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Forensic and Its Procedure - Armour Infosec","og_description":"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.","og_url":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/","og_site_name":"Armour Infosec","article_publisher":"https:\/\/www.facebook.com\/ArmourInfosec","article_published_time":"2020-02-03T08:56:56+00:00","article_modified_time":"2020-02-07T05:06:33+00:00","og_image":[{"width":490,"height":253,"url":"https:\/\/www.armourinfosec.com\/wp-content\/uploads\/2020\/02\/unnamed-e1580905562173.jpg","type":"image\/jpeg"}],"author":"Armour Infosec","twitter_card":"summary_large_image","twitter_creator":"@ArmourInfosec","twitter_site":"@ArmourInfosec","twitter_misc":{"Written by":"Armour Infosec","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/","url":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/","name":"Mobile Forensic and Its Procedure - Armour Infosec","isPartOf":{"@id":"https:\/\/www.armourinfosec.com\/#website"},"datePublished":"2020-02-03T08:56:56+00:00","dateModified":"2020-02-07T05:06:33+00:00","author":{"@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308"},"description":"Mobile forensic is a procedure deals with extracting, recovering and analyzing digital evidence from a mobile device under forensically sound conditions.","breadcrumb":{"@id":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.armourinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Mobile Forensic and Its Procedure"}]},{"@type":"WebSite","@id":"https:\/\/www.armourinfosec.com\/#website","url":"https:\/\/www.armourinfosec.com\/","name":"Armour Infosec","description":"Do Your Part - Be Security Smart","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.armourinfosec.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308","name":"Armour Infosec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g","caption":"Armour Infosec"},"sameAs":["https:\/\/www.armourinfosec.com\/"],"url":"https:\/\/www.armourinfosec.com\/author\/admin\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts\/25443"}],"collection":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/comments?post=25443"}],"version-history":[{"count":0,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts\/25443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/media\/25460"}],"wp:attachment":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/media?parent=25443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/categories?post=25443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/tags?post=25443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}