Class 3
Last updated
Last updated
Mobile devices are widespread and highly used in our day-to-day lives
Hardware differences
Mobile OS's
Anti-forensics
Outdated devices
Passcodes
Preservations
Acquisiion
Examination and analysis
Reporting
Base Transceiver Station (BTS)
Mobile Switching Center (MSC)
Law enforcement can request cell-site records from a carrier for a particular cell phone user that indicate where the user was based on data retrieved from the BTS
Carriers are forced to keep logs for each cellular connection a cell phone makes
A SIM Card is unique for every phone and can identify a carrier and customer
Android is open source. There are two types of memory: RAM and NAND. RAM is volatile and may contain user passwords and NAND is a nonvolatile flash memory. The most valuable data from an Android is the SQLite database which contains the entire cell phone file system
Evidence can be extracted in four ways:
Logical (hardware/software)
Physical (hardware/software)
Joint Test Action Group (JTAG)
Chip off **Very intrusion
In-System Programming (ISP)
"In the absence of a mobile forensic imaging tool, the investigator is forced to manually examine the cell phone"
Recording each action used on the phone can be done for documentation
Analyzing the app without analyzing
Executing the app and analyzing
We must get approval from the cloud provider before performing any digital forensic techniques. We can use the log management consoles already built into the cloud providers application/admin console.