Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mobile Phone Forensic Analysis

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S.

(2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub

Mobile Phone Forensic Analysis


Kevin Curran*, Andrew Robinson, Stephen Peacocke, Sean Cassidy Intelligent Systems Research Centre Faculty of Computing and Engineering, University of Ulster, Northern Ireland, UK Email: kj.curran@ulster.ac.uk

Abstract
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone forensic analysis. This paper discusses mobile phone forensic analysis, what it means, who avails of it and the software tools used.

Keywords: mobile phone forensics, digital forensic analysis, forensic examination, security

Introduction

Forensic Science is the use of forensic techniques and values to provide evidence to legal or related investigations (Jansen, 2008). Issues such as deoxyribonucleic acid (DNA) typing or the identification of drugs are obvious topics within this field. These involve the use of specialised scientific apparatus. Mobile phone forensic analysis is the science of recovering digital evidence from a mobile phone under forensically sound conditions using accepted methods. Digital forensics has grown rapidly due in part to the increase in mobile devices (Harrill, 2007). The phone no longer simply connects us vocally with another, instead it stores our activities, dates, private numbers, experiences written, visual or audio-visual; and it allows access to the internet where we send private and public messages. We no longer laugh, cry and love face to face; instead, all is recorded on our Smartphone. As we transfer our experiences from the active, interpersonal world, to the digital; nothing remains private. Whispered conversations, clandestine notes, and mental images are transferred and recorded by phone instead. Although it may defy the ICT novice, deletion has never really meant deletion. Forensic investigators commonly start with phone numbers dialled, answered, received or missed; stored phone numbers of people whom the mobile phone user may know and text messages sent, received or deleted (Punja, 2008). Mobile phone capabilities increase in performance, storage capacity and multimedia functionality turning phones into data reservoirs that can hold a broad range of personal information. From an investigative perspective, digital evidence recovered from a cell phone can provide a wealth of information about the user, and each technical advance in capabilities offers greater opportunity for recovery of additional information (Jansen, 2008). Mobile phone forensics is a challenge as there is yet no de facto mobile phone operating system. There are two important points to remember when about to analyse a mobile phone. If the device is found switched on, DO NOT switch it off and if the device is found switched off, DO NOT switch it on. Pay as you go mobile phones are seen as disposable in the criminal world. They are a means of communication that is not traceable, because there is no signed contract with the network provider for the authorities to trace. However if the phone is seized from the criminal then a number of forensic tests can be carried out and will reveal the entire call history and messaging history of the criminals in question. Another place where mobile phone forensic analysis plays a very large role is in domestic disputes. For example in the case of an abusive person who has been ordered by the court to stay away from their spouse but returns to the family home to harass the other. Here the police can have a cell site analysis carried out and determine where the abusive partners mobile phone was at the time of the alleged incident. Mobile phone forensics can also play a vital role in road traffic collisions. The mobile phone can be taken and call records and logs checked to see if the accused was using the phone when the accident occurred.

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub

Access to recovered information from mobile devices must be kept stable and unchanged, if it is to stand up in court. The integrity of the recovered data must therefore be kept intact. This is a vulnerable process, but as the years pass, advancements have been made to literally copy the information as fixed images, and thus unchanged, and unchangeable. Data saved on phones is stored as flash electronically erasable programmable (EEPROM) read-only memory (ROM)). Mobile phone forensic analysis involves either manual or automatic extraction of data to be carried out by the mobile phone forensic examiners. Automatic extraction is used when the device is compatible with one or more pieces of forensic software and manual extraction is necessary when no compatible software is present. Automatic reading of a SIM Card is used when the mobile phone is supported by one or more pieces of forensic software. A manual verification is then required to confirm the extracted data is complete and correct. Manual reading of SIM card is used when the mobile phone is not supported by any forensic software, or the support offered is limited to such a degree that very little data is capable of being extracted. This method of analysis requires a forensics examiner to manually traverse a handset and digitally record each of the screens. This will include the recording of audio and videos in a format playable by the OIC. All images taken will be produced as a paper based report. Forensic analysis of a mobile device using either manual or automatic techniques can produce some or all of the following data: Make and model of the mobile handset; Mobile Station International Subscriber Directory Number (MSISDN); Integrated circuit card ID (ICCID) - The SIM cards serial number service provider name (SPN); Abbreviated dialling numbers; Last numbers received; Last numbers dialled; Missed calls; Short messages (SMS); Calendar entries; Photographs stored in handset; Video stored in handset; Smart media/compact flash; MMS Messages; Sim card link integrated circuit card ID (ICCID); International mobile subscriber identity (IMSI); Mobile country code (MCC); Mobile network code (MNC); Mobile subscriber identification number (MSIN); Mobile subscriber international ISDN number (MSISDN) and SMS messages. It is also possible to use AT on devices which have modem support to extract information from the operating system without affecting other aspects of the system state. This paper is structured as follows: section 2 provides an overview of forensic guidelines drafted by the association of chief police officers, section looks at the extraction of data from the Subscriber Identity Module (SIM) and phone, section 4 highlights some popular mobile forensics applications and section 5 provides a conclusion.

Forensic Guidelines

The UK Association of Chief Police Officers (ACPO) has developed a guide for computer based electronic evidence which contains rules for handling such evidence. The guidelines recommend that the mobile phone must be isolated from the network by either turning the device off or placing it in a shielded secure container so that undesirable changes do not occur, which may jeopardise important information. Delays may be encountered if personnel try to regain access to such a device when a Personal Identification Number (PIN) is required. A shielded room should be used for examining a mobile phone. There are portable solutions to this problem in the form of a Faraday Tent but this option is less secure and cables going to and from the tent may act as aerials for the device. Devices also need to be fully charged before any form of examination, so as to preserve any vital information found. For instance, it is worth noting that there will be a strain on the battery, reducing power as it tries to re-connect to a local network. The examination process needs to be well planned in order to prevent important data being lost, which may be relevant and crucial to a court case. For example, the removal of the SIM card often requires the removal of the battery beforehand. Therefore the date and time on the device may be lost. This would also be the case if the battery was allowed to fully discharge its power. The insertion of a different SIM card into the device must be avoided as such a process may result in a loss of information such as the call registers (received calls, dialled numbers, rejected calls, missed calls). It will often be the case that manual examination will have to be carried out on such a device as it may not be supported by analysis tools and therefore this would be the only option available for examination. This procedure should be carried out even if the device is supported by analysis tools so as to validate results gathered previously and ensure that the information download has completed successfully. Personnel carrying out such an examination should familiarise themselves with that particular type of device/phone model in order that mistakes are

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub not made. User manuals can be downloaded from the manufacturers website on the internet. If familiarisation is not carried out mistakes such as, the deletion of data through pressing the wrong button could occur. For instance, an access card must be inserted into the device to imitate the original SIM card and therefore blocking further network access and destruction of important information. This allows personnel to examine safely, such a device as a mobile phone, at different locations. Furthermore, intervention from the service provider can be requested so as to disconnect or block the device/phone from the network. However, this is not recommended as the effects of such intervention are unknown, for example the voicemail recorded on the mobile phone account may be lost. It is recommended that specially designed software be used for examining such a device as a mobile phone. If non forensic tools are used, there should be a dummy-run carried out with the same model type as the device to be tested in order to rule out damage to important information. Such non forensic tools should be used as a last resort during the examination process. The connection with the device must be secure so as to reduce the possibility of a loss of information. Cable is the recommended interface, followed by infra-red, Bluetooth and WiFi. Any of the interfaces after cable are considered to be very insecure and come with risks such as viruses.

Discovery of Mobile Phone to be seized Secure the scene and move people away from the Mobile Phone Yes Is expert advice available? No No Is the Mobile Phone switched on? Yes Photograph or make note of what is on the screen Consider consequences of switching off Mobile Phone. Record decision in notes including time and detail of action taken including keystrokes Follow advice given

Carefully package, seal and label the Mobile Phone so that accidental or deliberate operation of the keys/buttons is prevented. Seize, seal and label all accessories associated Phone items such as: data & leads, cradles, expansion cards, cases (which may contain aerials/leads) Submit Mobile Phone for forensic examination at earliest opportunity in accordance with service policy, to prevent data loss due to discharged batteries. Figure 1: Recommended actions for phone analysis (ACPO, 2009)

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub

Figure 1 details the actions taken by personnel involved in the forensic analysis of a mobile device. This is precise work which needs to be carried out professionally so as to preserve the information collected. Other forensic evidence such as DNA, fingerprints, firearms and narcotics should also be considered so as to protect evidence. The order in which forensic examinations take place is crucial, for example the examining of a mobile phone for fingerprints may result in that particular handset being inoperative. Careful consideration must be taken so as not to destroy important fingerprint or DNA evidence found on the device. The personnel involved with the seizure of the device must ensure that they acquire everything involved with the device. This includes cables, chargers, memory cards, boxes and network account bills. These items may help the inquiry considerably as the original packaging may contain helpful pieces of data such as the PIN/PUK details. PC equipment must also be seized as the device in question may have been connected with such a system at some stage. The PC may contain relevant software that was used to transfer files, music, calendar dates, etc to and from the mobile phone. It must be taken into account that some devices may have a clearance or housekeeping feature which carries out data wiping at a set time. For example, call logs may be deleted after a default period of thirty days (ACPO, 2009). Care needs to be taken when encountering access codes such as PINs/passwords in order to avoid permanent damage and loss of information from a device/mobile phone. The number of remaining password or Personal Unblocking Key (PUK) attempts allowed on a SIM card should be verified. Subsequently, if the information on the device/mobile phone is needed urgently, it would be appropriate to try the default PIN as set by the devices service provider so that delays may be avoided. It should be noted that only three attempts can be made to enter the correct PIN. Nevertheless, one attempt should always be reserved in case the device owner provides the required PIN or it is found elsewhere. Guessing the PUK should never be attempted as the data found on the SIM card is lost forever once ten PUK attempts are made (ACPO, 2009). Personnel who seize such devices should be trained extensively on how to take possession of a device appropriately and they should have relevant packaging materials to keep such a device safe and secure, as it could be used as a vital piece of evidence in a court case. Personnel should also be aware that some devices may remove/delete data automatically if any manual examination is carried out. It is often the case that computers/PCs may have tools installed so as to keep their information private, although this kind of behaviour is on the increase in mobile phones due to their development over the past number of years. Personnel should be fully trained in the tools and techniques used in mobile phone forensic analysis/examination. Before attempting a real case, experience in such fields of expertise should be previously obtained. This is mainly related to the use of non-forensic tools which may connect or join the device and PC either through cables or wirelessly and would result in a loss of vital information/evidence (ACPO, 2009). It is recommended that personnel involved with the examining of a device or mobile phone, make suitable use of photography and video equipment so as to record or document the state of the device during various stages within the examining processes. The scene from which the device was acquired should also be given the same level of detail in recording or documenting the status of that area. The status of the device at the point of seizure needs to be recorded and photographed carefully, especially any on-screen data. A log of actions must be maintained and accompanied with the device when the device is seized and during the processes involved with examination. During such an examination, the log of actions must be updated, for example if messages are received, this must be documented. Such information as this must be documented in a way that is fitting to be incorporated into the final report. Photographs and video may be used as forms of documentation. This is particularly important when it comes to the recording of important information such as contacts and messages. Yet again the analysis tools or software used have to be detailed extensively, for example version number and add-ons used (ACPO, 2009).

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub The officer in charge must ensure that personnel involved with the seizure of such devices/mobile phones are suitably trained. An effective communication line should be created between the officer in charge (investigating) and the examiner of the device in question. It is only the officer in charge who can fully realise the important aspects of the data held on the device. In rare cases the process used to examine the device may result in a loss of certain information. The person carrying out the examination must be guided by the officer in charge so as to grasp the importance of such information. The officer in charge and the examiner need to relate to one another so as to preserve vital information found on the device. It is the examiners responsibility to recommend the examination approach used relating it to the type of case being investigated and give an explanation for the use of such an approach to the officer in charge. As a standard process, forensic analysis tools should recover mobile phone data such as SIM card details and whatever can be viewed by the user of such a device via the handset. Other relevant information can also be recovered from the SIM card which includes previously deleted messages. At an intermediate level an analysis technique such as flash dump may be used to retrieve previously deleted material but this type of work is extremely specialised and requires certain skills and hardware. At the most advanced level, very specialist skills and hardware is often used to remove memory chips, if possible. This is an important part of forensic analysis as this particular level of expertise may result in data being retrieved which is necessary as evidence (ACPO, 2009).

Subscriber Identity Module Analysis

The Subscriber Identity Module (SIM) card is a smart card that is used in all mobile phones. It stores both user and network data, the latter is used to authenticate and identify subscribers on the Network. A mobile phone cannot be used without accessing the SIM. To access the SIM a personal identification number (PIN) is required. This is a four digit code that must be entered when the phone is turned on. If a user fails to enter the correct PIN after three attempts, the SIM card is blocked and the only way to undo this is to enter the eight digit PUK (Personal Unblocking Key) code. The SIM allows ten attempts to be made if all entries are incorrect then the SIM card becomes permanently blocked. The types of information that can be retrieved from a SIM card include the date, time and phone numbers of calls made from the mobile; date time and phone numbers of calls received from the mobile; SMS messages sent and received from the mobile and other data such as address / phone book details, pictures and videos that have been saved to the SIM card. There are a number of different types of SIM cards available: USIM Universal Subscriber Identity Module. This type of SIM card has an application running on it to allow Universal Mobile Telecommunications System (UMTS) mobile telephone, which is the technology behind 3G. This type of card holds the subscribers information, authentication information, and has 128KB of dedicated storage for contacts. ISIM IP Multimedia Services Identity Module. This application is for use with a 3G mobile phone which is operating on the IMS type network. It contains information for authenticating the user as well as identifying them. W-SIM Willcom SIM. This type of SIM has all the basic functions of any normal SIM card, however it also has the core components which make up a mobile phone transmitter and receiver already built into the card. RUIM Re-Usable Identification Module. This type of SIM is a removable smart card which is designed to run in phones that work on the Code Division Multiple Access (CDMA) networks. HCSIM High Capacity SIM. This type of SIM has all the same functions and features as that of a standard SIM, but with a greater storage capacity. MSIM MegaSIM. The MegaSIM type of SIM comes equipped with Flash storage of between 64MB to 1GB. It also comes with its own dedicated processing power and a high speed interface.

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub These SIMs can be protected from access by a Personal Identification Number (PIN) (also known as Chip Holder Verification (CHV) and in many cases the SIMs have two PINs and these can be enabled or disabled by the user and changed to suit their needs. The PINs are normally referred to as PIN1 and PIN2. Whenever a SIM card is to be analysed it is important to prevent it from connecting to the mobile phone network as this could allow it to overwrite important data contained on the SIM which may be very valuable to a case. To prevent this from happening an image or a copy of the SIM card is made. Firstly the suspect SIM card is placed into a special holder to allow it to fit into the copying machine, next the SIM card is copied onto a new blank SIM card. The machine prevents the SIM card from connecting to the network as well as copying the contents of the SIM. The analysis will then be carried out on the new copied SIM so that no contamination of data can occur on the original SIM. Logical analysis is carried out via a PC and involves the handset communicating with the forensic tool. What actually happens is that the forensic tool being used requests data from the phone, to which the phone responds and returns the requested data when it is available. The data that this approach can extract varies with make and individual handset, but will usually include, SMS, MMS, call registers, videos, pictures, audio files and calendar entries and tasks. Physical analysis is generally a little more difficult requiring specialist hardware and the forensics examiner must be trained in the correct techniques. A physical analysis involves making an image of the complete memory of the phone, which does not include any expandable memory, for example memory cards. Physical acquisition implies a bit-by-bit copy of an entire physical store while logical acquisition implies a bit-by-bit copy of logical storage objects that reside on a logical store. The difference lies in the distinction between memory as seen by a process through the operating system facilities (i.e. a logical view), versus memory as seen in raw form by the processor and other related hardware components (i.e., a physical view). Physical acquisition allows deleted files and unallocated memory or file system space to be examined this is not the case with a logical acquisition (National institute of standards and technology, 2007). There are a number of methods available to the analyst to recover data from the phone. The primary method is to physically access the phone circuit board and remove the memory chip and retrieve the data directly. The secondary method is to use JTAG test points which are found on the printed circuit board. However these are not always available on every circuit board and so on occasion this method is unavailable to the analyst. The third method is to use unlock and reprogramming boxes. Whichever technique is used, a binary file will always be obtained or as it is known a PM file or Permanent Memory file. This file must then be translated into a format that is easier recognised and is readable and true. This process not only recovers the viewable data but also any deleted data that may be on the phone. The different types of analysis that is carried out on the SIM card are as follows: Integrated Circuit Card ID (ICCID) Each SIM card is internationally identified via its ICCID. This 18 or 19 digit number is stored on the SIM. This number tells the analyst where internationally the SIM card is from. International Mobile Subscriber Identity (IMSI) This number identifies the individual operator network, which is the network the SIM card works on, for example 3. The network provider communicates with the SIM card via this number and it is used for connect mobile phone calls to the SIM from the network. Mobile Country Code (MCC) This three digit number is used to identify which country the SIM card originated from. These codes are also required to be dialled when making an international phone call from a mobile phone. The MCC for the UK is 234. Mobile Network Code (MNC) This code is used in conjunction with the above MCC to identify the Network provider to which the SIM card belongs e.g. in the UK the 3 network has a MNC of 20. Mobile Station International Subscriber Directory Number (MSISDN) This is a 15 digit number which uniquely identifies the subscription in either a UTMS or GSM network. Abbreviated Dialling Numbers (ADN) This is a list of numbers that the user of the SIM card has stored to allow easy access to the numbers to dial. This is simply the users contacts. From looking at these numbers the analyst is able to see who the user has contact details for as well as the incoming and outgoing calls to these numbers. The time and date of any calls made or received by the SIM can also be recovered.

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub Short Message Services (SMS) More commonly known as text messages these are short messages which the user can send to another user. From looking at these the analyst is able to not only see who the user was communicating with but also read the messages that were sent and received by them. The time and date on which the message was sent is also stored on the SIM along with any deleted messages.

The SIM card is read using a smart card reader and because files can be read directly from the smart card operating system, it is possible to retrieve deleted information. When a message is deleted from the SIM only the status byte is set to 0. Deleted text-messages can be recovered except for the status byte as long as the slot has not been overwritten by a new message. Recovery is done by interpreting bytes 2-176 of the stored message (Willassebb, 2003). Removable storage devices are not dependent on a continuous power so they can be removed from the phone and are capable of holding their data. They use the same formatting as found on a hard drive, typically File Allocation Table 32 (FAT32) and so can be treated the same way for analysis.

Mobile Forensic Tools

Data can be retrieved from a mobile device by using forensic software and being able to connect to the mobile device either by a cable, Bluetooth or an infrared connection. Examples of such software are Oxygen Forensic Suite, SIMIS and data doctor phone inspector. One type of software may produce a more detailed and precise report in a specific area but may lack detail in another. Another method a forensic analyst could use is to access information directly from the mobile by the use of the keypad if possible but this is a risky method and should be used as a last resort as there is a high chance of data being modified if a wrong button is pressed. The number one objective is to extract as much data as possible without altering any data in the process. The analyst must also be careful not to lose any information e.g. some phones store data on missed and received calls on the SIM card. Another factor that must be addressed when carrying out a forensic analysis on a mobile phone is to keep it out of electromagnetic contact as even in an idle state a mobile is constantly trying to communicate with a network. What may happen is new data is sent to the mobile that may overwrite existing data for example this new contact with the network could have destroyed potential evidence such as a SMS message or a missed call. It is very important that no data is manipulated during the process of removing data if the data is to be used as evidence. So during a procedure to extract data from a mobile phone to a computer a log file is created which records all communication between the computer and the phone so that it can be satisfactorily demonstrated that no data has been written to the phone during the extraction process (Forensic Science Service, 2003). Some of the important pieces of evidence for forensics are the address book which can contain various types of data from numbers to pictures and the call history of the phone as well as the message history and other forms of media that is stored on the phone. Much of these items can be retrieved with little need for sophisticated tools however when it comes to the other identifying items such as deleted contacts and erased history then dedicated software ifs needed. Many of the leading forensics tools are usually licensed from specialists that have developed their own bespoke version of forensic software. Forensic software will retrieve the information from the phone either by targeting a physical aspect of the phone or a logical aspect. A physical aspect of a mobile would be the SIM as this is an independent storage device and can be separated from the phone, as well as possibly a memory card such as a MicroSD card. A logical aspect is the directories or files residing on the phone. Both physical and logical aspects are key areas for forensic investigation. When deciding what type of software to use, it is also important to take into consideration the type of network the phone is on as well as the actual software OS. There are different types of software some specializing for instance on smart phones and others on Symbian devices. The software applications for mobile forensics available today are not 100% forensically sound. The reason is that they use command and response protocols that provide indirect access to memory (McCarthy, 2005; McCarthy & Slay, 2006). This means that the forensic software does not have direct access or low level access to data within the phones memory as it depends on the mobile phones operating system based command to retrieve data in the

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub memory. Therefore in querying the operating system, the device could be creating changes to the memory of the device. Some command based mobile forensics software were not originally developed for forensic purposes and therefore they could unexpectedly write to the mobile phone devices memory (Horenbeeck, 2007). Sometimes forensic software such as MOBLedit Forensic1 requires the user to install additional software on the mobile phone being examined. This is in direct violation of the principles of electronic evidence as published by the UKs Association of Chief Police Officers (ACPO) Good Practice Guide for Computer based Electronic Evidence (ACPO, 2009) which states that No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. There are alternative methods to gain direct access to data held on mobile phones which do not breach best practice guidelines. Flasher boxes for instance can provide this direct access to data held on mobile phones without the need of resorting to operating system software or hardware command and response protocols. Flashers are a combination of software, hardware and drivers. Flasher boxes do not require any software to be installed on the mobile being examined. In theory, this should ensure that they do not manipulate any data that may be used as evidence. However, because they are not usually documented, there are no easy methods of determining if they do actually preserve evidence in the phones memory and there is no guarantee that the flashers will work in a consistent manner (Gratzer et al., 2006). It must be noted that mobile phone companies have not approved or tested flasher boxes on their products nor have they been tested or approved for forensic use. The Cellebrite UFED System2 (Universal Forensic Extraction Device) is a mobile hardware device which accepts SIM cards. It will also allow access to the phonebook, text messages, call history (received, dialed, missed), deleted text messages from SIM/USIM, audio recordings, video, pictures and images and more. PDA Seizure3 facilitates accessing information on a PALM or Blackberry PDA. It also allows the retrieval of information on the physical and logical parts of the PDA device. This software is windows based. Device Seizure4 is similar to PDA seizure but more comprehensive in provided features. It allows deleted data recovery, full data dumps of certain cell phone models, logical and physical acquisitions of PDAs, data cable access, and advanced reporting. It provides access to phones via IrDA and Bluetooth. Some approaches rely on the AT command system developed in the late 1970s to initialize modems to ask the phone specific questions about the information it may be storing. However, not all mobiles respond to modem-style commands with for instance Nokia phones being particularly hard to crack. It must be remembered that in the U.S. alone there are over 2,000 models of phones and even within one model range there may be a dozen phones using different codes for each function (Hylton, 2007). The initial preservation stage should secure the evidence and to record and document in its current state so as to prevent tampering with the evidence. Documents for the scene including photographs of the phone undisturbed should be included. When handling and moving the device one point is to keep it away from harmful elements such as high temperatures and any large magnetic sources that may affect the device. There also needs to be great care taken to preserve the DNA evidence that could be on the phone including finger prints or saliva. All accessories for the phone should be acquired if possible and taken as part of the evidence for testing. Another aspect of preservation is to note whether or not the phone was on when found, for this reason the phone should be turned off so as to stop any further interaction with radio waves that may cause some data on the phone to overwritten. The acquisition stage is where a copy of the data from the phone is made. This should be a mirror image of the SIM data and relevant memory cards. This process will usually happen in a lab however there can be problems due to battery damage or excess damage to the phone. This stage is when forensic tools are used most. Currently there is no one tool that can be used on all phones so there would be a range of software used in order to acquire the data. Here it may be common to encounter problems when trying to acquire the data through items such as pin protection. Fortunately, contacting the network providers can solve many of these problems as many networks will have a backdoor way to

1 2

http://www.mobiledit.com/forensic http://www.cellebrite.com 3 http://www.softpedia.com/get/System/Back-Up-and-Recovery/PDA-Seizure.shtml 4 http://www.digitalintelligence.com/software/parabenforensictools/deviceseizure/

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub access the data on the device. The analysis stage is where the data is examined. This part of the process needs to be done carefully so as not to miss anything that may be relevant to the case. The examiner ideally should be familiar with the work that has gone on prior to the examination. Finally, the reporting stage is where the evidence is summarized so as to be presented in court as evidence (Jansen and Ayers, 2007).

Figure 2: Information on each exhibit in ART A number of companies provide the service of mobile phone forensic analysis. These include Inta Forensics5, Mobile Phone Forensics6, Integrity Forensics7, Sector Forensics8 and CY4OR9. Whilst all these companies offer a similar services and follow similar analysis techniques different report application software is used to present the retrieved data. As with many of the other mobile phone forensic analysis providers, Inta Forensics uses their own in house software application called ART (Automatic Report Tool) (see Figure 2). This application allows mobile phone forensic examiners to capture images (via a camera) of mobile devices and subsequently produce a Microsoft Word document. ART is supplied by www.IntaForensics.com for free to registered users conducting Mobile Phone Forensic Analysis.

5 6

http://www.intaforensics.com http://www.mobilephoneforensics.com 7 http:// www.integrityforensics.co.uk 8 http:// www.sectorforensics.co.uk 9 http://www.cy40r.co.uk

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub

Figure 3: Folder structure of captured data in ART

The main benefits of using ART is that it allows its users to capture images from USB camera and then store these images under appropriately named folders and then publish a customizable report containing the captured images of the mobile device (see Figure 3). ARTs only requirements include a USB or external Camera with Microsoft Windows Driver installed along with Microsoft Word installed for the generation of a device report. ART allows for the management of multiple cases containing large amounts of visual evidence. These cases can be accessed at any time so to allow the capture of additional images or to generate further reports. All images that are captured are saved to folders reflecting the location of the photographed object for easy reference by the user and easy report generation. ART design also allows for basic formatting of the report prior to printing in both the document and header sections.

Conclusion

Mobile phone forensics analysis involves the technical examination of mobile phones and the retrieval of data from these devices. Data for analysis can be obtained from SIM cards, memory cards and from the phone handset itself. Forensic analysis of mobile phones can be carried out on various forms of data, including textual (SMS Messages), Graphic (Images), Audio Visual (Videos) and Audio (Sound recordings) (Inta Forensics, 2009). Rapid advancements in mobile phone technology and the introduction of smart phones to the market by companies such as Apple and Blackberry providing large storage capacities has meant that increasingly, larger amounts of personal information is now being stored on these devices. Individuals are now becoming increasing reliant on their mobile phones as part of their daily lives. The variety of applications and facilities these devices provide including Internet, Wi-Fi, email, document viewing and editing software along with the more common mobile phone features of phonebook, call history, text messaging, voice mail, built in camera and audio facilities have seen it overlap with computer technology. The existing generation of mobile phones are sophisticated and increasingly difficult to examine however they can ultimately provide valuable evidence in prosecuting individuals. Quite often the information obtained from a phone, after intensive analysis techniques proves to be adequate for a conviction of a criminal by detectives involved with the case. Internal memory and external memory as well as the call and text records can all be analysed to gain an insight into the activities of the mobiles owner as well as who they have been speaking or exchanging messages with. The area is ever expanding and allows for cutting edge technology to be used to keep up with the ever

Please reference as : Curran, K., Robinson, A., Peacocke, S., Cassidy, S. (2010) Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, Vol. 2, No. 2, pp:, April-May 2010, ISSN: 1941-6210, IGI Pub growing array of mobile phones on the market today and the ever increasing feature list of these phones. Mobile forensic analysis will continue to be a specialised field while technology progresses rapidly with the sheer number of phones to be examined posing a challenge for the police.

References
ACPO (2009) Practice Guide for Computer-Based Electronic Evidence, (2009), www.acpo.police.uk/asp/policies/Data/ACPO%20Guidelines%20v18.pdf Hylton, H, (2007) What Your Cell Knows About You, Time Magazine, http://www.time.com/time/health/article/0,8599,1653267,00.html?xid=rss-health August 15th 2007,

Gratzer,V., Naccache, D., Znaty, D (2006) Law Enforcement, Forensics and Mobile Communications. PerCom Workshop, Pisa - Italy, 13-17 March 2006, pp: 256-260 Jansen, W., Ayers, R. (2007) Guidelines on Cell Phone Forensics, National Institute of Standards and Technology special publication 800-101, May 2007, http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf Jansen, W, Delaitre, A, Moenner, L. (2008) Overcoming Impediments to Cell Phone Forensics, Proceedings of the 41st Annual Hawaii International Conference on System Sciences,, pp: 483-483, ISBN: 978-0-7695-3075-8 Harrill, D. C, Mislan, R. P. (2007) A Small Scale Digital Device Forensics ontology, Small Scale Digital Device Forensics journal, Vol. 1, No. 1, , June 2007 Inta Forensics, (2009) Mobile Phone Forensics, www.intaforensics.com/pdf/mobile-phone-forensics.pdf McCarthy, P. (2005) Forensic Analysis of Mobile Phones http://esm.cis.unisa.edu.au/new_esml/resources/publications/forensic%20analysis%20of%20mobile%20phones.pdf, McCarthy, P. and Slay, J. (2006) Mobile phones: admissibility of current forensic procedures for acquiring data. In Proceedings of the Second IFIP WG 11.9 International Conference on Digital Forensics, 2006. National Institute of Standards and Technology (2007) http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf Guidelines on cell phone forensics,

Punja, S., Mislan, R. (2008) Mobile Device Analysis, Small scale digital device forensics journal, Vol. 2., No. 1, pp: 1-16, June 2008, ISSN#1941-6164 Willassen, S.Y. (2003) Forensics and the GSM mobile telephone system, International Journal of Digital Evidence, Spring 2003, Vol. 2, No. 1., pp:12-24

You might also like