Day 1: FMPF Boot Camp + Securing Evidence Flashcards

1
Q

Define ACPO Principle 1

A

Do Not Change Data!

No action taken by Law enforcement agencies, persons employed within those agencies, although agents should change data, which may subsequently be relied upon in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ACPO Principle 2

A

Do you know what you are doing?

If you need to handle original data, make sure you are competent and trained enough to do so and can justify your actions.

“In circumstances, where a person finds necessary to access original data, that person must be competent to do so, and be able to give evidence, explaining the relevance and implications of their actions.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ACPO Principle 3

A

Keep notes!

Build an audit trail! These notes should consist of photos/videos of your actions and observations, a log of actions, output from DF tools, logs from DF tools and a copy of the submission form!

An independent party should be able to use this to replicate your steps and produce the same (or reasonably comparable) results!

“An audit, trail, or other record of all process applied to digital evidence should be created and preserved. An independent third-party should be able to examine this process and achieve the same result.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definie ACPO Principle 4

A

The OIC is responsible for ensuring the law and ACPO principles are adhered to. This doesn’t relieve us of all responsibility for our actions. It means we need to keep the OIC updated and informed with the case, findings and any mistakes that occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When an evidence bag is received at the mobile forensics unit lab, what examinable material may be placed inside?

A
  • The handset.
  • The SIM card.
  • The memory card.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When an evidence bag is received at the mobile forensics unit lab, what examinable material may be found outside of the bag, but pertinent to the evidence inside.

A
  • Backups.
  • Cloud Storage.
  • Information provided by the phone’s registered network provider (I.e. Call logs, confirmation of ICCID, IMSI, IMEI, MSISDN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is Network Isolation?
  2. What four types of signal need to be blocked to achieve Network Isolation?
  3. What are the three main reasons for ensuring devices are network isolated when examined?
A
  1. Network isolation is blocking the radio communication of a device in all of its forms so it cannot transmit or receive data.
  2. GSM (Cellular/Mobile), Wi-Fi, Bluetooth and Location.
    • We need to protect ACPO principle 1 by preventing changes on the device. Incoming signal can change the original data on a device.
  • If we receive and deliberately read messages or communications after seizure, there is no chance of the recipient accessing them first, so we have committed interception which is illegal!
  • An incoming signal could trigger a remote wipe and change all of the data on the device, violating ACPO principle 1!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What steps can be taken to ensure a mobile device is network isolated?

A
  • Put it in a Faraday environment (Box, Bag, Room)
  • Enable airplane mode on the device. But bear in mind that this may or may not disable Bluetooth and WiFi and the behaviour may vary across devices. Always double check!
  • Turn the device off (Bear in mind that newer IOS and Android use Ultra Wideband emissions even whilst off for tag tracking or contact tracing so this may still mean your device is communicating)
  • Remove the original SIM so GSM is disabled (The ICCID and IMSI are needed to talk to the network) and keep it out of the device for the duration of the examination. If you need a SIM present to operate the device, clone it using a dummy SIM with the transmitting ability disabled and insert it into the device, keeping the original SIM safely stored, but outside of the device.
  • Use a jammer (You will need a license from OFCOM to legally do this).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does Flight Mode Disable Location Services?

A

No. If flight mode is on along with location services, the phone will still track your movements. The location will be cached and sent to the cloud once airplane mode is disabled again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can we view all “Significant Locations” stored on the device through manual examination?

A

No. Typically a small selection will be displayed, but the rest will be cached somewhere in the system. A tool will need to read the device and its memory to find them all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the potential impact from removing the SIM card from a mobile device.

A

The potential is for the phone to erase its call logs. The device will almost certainly always do this if a SIM with a different ICCID and IMSI is reinserted as the specs determine that call log erasure if what should happen whenever a SIM is removed, however this is the only practical way for many device to detect SIM removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What data change may occur if we remove the battery from a phone?

A

The time and date will be lost or reset?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are the potential side effects of removing the SIM card or battery bad for a forensic investigation and should be avoided?

A

They violate ACPO principle 1 by changing data on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is a logical read of a storage device?
  2. Does the device need to be switched on to perform a logical read?
A
  1. A logical read uses the API of operating system/firmware of a device to request files and directories that are “live” and which it can see. We cannot get deleted data from a logical read as the OS cannot see it. You’ll typically get Contacts, SMS, Media, Call Logs and app data. A logical read may typically use a backup file to dredge data the device has knowledge of.
  2. Yes. This form of read relies on some form of power being supplied to the device in order to access the firmware or operating system in order to request the files it can see.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is A Full File System Read of a device?

A

A Full File System read will elevate its permissions (typically to root) in order to gain full access to the underlying OS file system. Once here will have full access to the system files including databases, and even deleted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is a physical read of the device?
  2. Does a physical read require a powered on device to be used?
  3. Are there any problem with physical reads on modern smartphone devices?
A
  1. A physical read will extract all of the binary data stored on a storage medium as it is stored. It does not use the operating system.
  2. No. A powered device is not required. A physical read of an SD card can be performed away from the mobile handset itself.
  3. Yes. Many modern devices that use storage devices that can be physically read encrypt the contents. If you physically read it you further require a decryption key to make sense of the data.
17
Q

What forensic actions can be performed on a SD card?

A
  • Logical read.
  • Physical read.
  • Image creation.
18
Q

What forensic actions can be performed on a handset?

A
  • Logical Read.
  • Full File System Read.
  • Physical Read.
19
Q

What forensic actions can be performed on a SIM card?

A
  • Logical read only (We can only send requests to the microcontroller on the card!)
20
Q

What Should the Order of Examination Be? What considerations might affect the order of of this?

A
  • Remove SIM card from device, perform a logical read and clone if SIM required for access to phone in order to help achieve network isolation and protect ACPO 1.
  • Remove storage card from device. Create an image (preferably “DD” raw format) to protect ACPO principle one.
  • We can then perform a physical read of SD card and potentially a logical read of the handset.

We should always consider how much access the handset provides to these components. Battery removal may be required to access these which will result in loss of time date. We might have lost ACPO principle 1, but we can make up for this by demonstrating ACPO principles 2 and 3 by being competent enough to justify what we do, and writing sufficient logs to document what we do and why.

21
Q

What should we consider when seizing mobile devices to ensure our actions are legal and ethical? (Remember PLANE)

A

Proportionate - Take only what is relevant to the case.

Lawful - Ensure you have the right authorisation, warrant or meet the criteria in the relevant criteria in order to take the action you want to perform.

Accountable - Take responsibility for your actions.

Necessary - Consider if you really need to take the actions you do. Are there alternatives? Is it required?

Ethical - Ensure your actions respect the human rights (absolute right) and privacy (qualified right) of the people who may be linked to an investigation.

22
Q

What are the consequences of poor handling, storage or practice during the seizure of mobile equipment?

A
  • Loss of trust in police.
  • Failure to prosecute.
  • Data wipe due to lack of of network isolation.
  • Right questions (I.e. what if your password/pin) don’t get asked and we don’t get access.
  • Physical damage stops us from accessing evidence and costs the force money to replace.
  • Data gets changed, lost or overwritten.
  • An unlawful interception occurs due to no network isolation.
  • Poor case submission.