Mobile Device Forensics
Mobile Device Forensics
Mobile Device
Forensics
Part 1
Topics
Cellular Networks
Cell Phone Operating Systems
Evidence on Cell Phones
Cellular Networks
Challenge: Diversity
o Many makes, models, and operating systems
o No standard hardware interface
o More of them now have mini USB or micro USV
Handof
Each cell phone is regularly communicating with
nearest cell tower
Even if its not in use
It sends identification data to the tower
o Cell phone number and service provider
Handof
Handled differently in GSM & CDMA networks
o GSM (Global System for Mobile Communication)
Hard handoff: Phone can only attach to one tower at
a time
o CDMA (Code Division Multiple Access)
Soft handoff
Phone can connect to multiple towers at once
Messaging Services
SMS (Short Message Service)
o Text messages
o Maximum of 160 characters
Used internationally
Uses Time Division Multiple Access (TDMA)
Uses SIM (Subscriber Identity Module) cards
Carriers include AT&T, Verizon, T-Mobile and
Cellular One
Handsets identified by International Mobile
Equipment Identity (IMEI) numbers (15 or 16
digits)
IMEI Blacklist
IMEI uniquely identifies phone, and is not
changed by replacing the SIM card
IMEI can be used to blacklist stolen phones
o Links Ch 10c & 10d
Symbian
Apple iOS
Windows CE and Windows Mobile
Googles Android
Blackberry OS
Link Ch 10f
Symbian
Blackberry
Introduced in 1999 by Research In Motion (RIM)
from Canada
Common at workplaces
Synchronize with Novells GroupWise and
Microsofts Exchange
Different OS versions for each carrier
Link Ch 10h
Android
The most popular OS by far
Open Source
Used on Motorola, Sony Ericsson, and
HTC phones
Also on tablets
Apples iOS
Used on iPhone, iPad, and iPod Touch
Based on OS X
Second most popular phone OS
Windows Mobile
(now Windows Phone)
Windows OS versions for
smartphones and pocket PCs
Windows Phone 8 was
released in Oct. 2012
o Link Ch 10i
Call history
Text messages (active & deleted)
Email
Photos & video
Browser history
Contacts
GPS location information
Chat sessions
Calendar
Voice memos
Documents
PIN
(Personal Identification Number)
Can be used to secure
the handset
Three failed attempts will
lock the SIM
A Personal Unlock Key
(PUK) is needed to
unlock the SIM
o PUK comes from the
provider of the SIM card
Predictive Text
Intended to make it
easier to type on 10digit keypads
Fills in text when the
user types part of a word
o System learns frequently
used words
o Database may contain
words, slang,
abbreviations, E-mail
addresses or URLs
Retention Policies
Link Ch 10l
Directional antenna
o Enables location determination with only two towers
from delay measurements
GPS
o Locates cell phone with satellites