Week 2 - Mobile Forensics Flashcards

1
Q

Wiping Process

A

Overwrites the data on the external device with a known character (e.g.: “0”, “#” etc.).

The investigator can choose or allow the default symbol from the program performing the wiping process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Overwriting Data

A

During the wiping process, the investigator can also choose how many times to overwrite the (e.g.: 1, 3, 7 etc.)

Most forensic software suites do NOT have the ability to recover information that has been overwritten one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sterilisation - Documentation

A

The forensic sterilization process assists the investigator when testifying in a courtroom and shows that the necessary steps were taken to eliminate any residual data and to prevent cross contamination of data.

The wiping and verification processes should be documented thoroughly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat of Remote Wiping

A

Most smartphones have this capability that allows them to contact the service provider or use a third-party application to overwrite the information on the phone once it gets a WiFi or cellular signal.

Information can also be added to the device, or information within unallocated space can be overwritten if new SMS messages or calls come into the device after the time of seizure.

If powered on without proper shielding, the device may go into a cleansing or wiping process that can destroy the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shielding Methods

A

Faraday Bags,
Faraday Boxes,
Faraday Tents,
Faraday Paint,
Aluminium Foil,
Arson Can,
Airplane Mode;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Off State

A

If you discover that the device is off, leave the device off to protect information.

If you turn the device on, you risk allowing automatic (remote) wipes, expose the phone to incoming text messages (which may delete old ones), and you will modify the phone’s location.

The phone will be altered, perhaps in such a manner that may lose critical evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On State

A

If the device is on, you must consider the risks versus benefits of handling the device. Determine whether it is connected to a radio or WiFl network. Ask yourself the following:

  • Does the device have a handset password on it?
  • Is it a GSM phone?
  • Does the SIM have a PIN code on it?
  • 3 attempts for SIM pin number then use Personal Unlocking Key (PUK) code. * 10 attempts with PUK, then SIM is fried.
  • Does the device have removable media such as an SD card or microSD card?
  • The key difference for a device in the on state is that the investigator should also document information, applications, and settings of the device at the crime scene.
  • Keep an external power source connected to the device while in storage to maintain the “on status” until an investigator is able to process the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standby

A

If the device is in standby mode, you must consider the risks versus benefits of handling it. Your decision on how to handle the device will depend on the make, model and whether the device’s security features are enabled. If the device is PIN coded or password protected, you would not attempt to unlock it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Acquisition

A

Data acquisition using a physical technique acquires all the non-volatile memory that can be read.

The data is dumped bit by bit into a binary file which contains all the data and unallocated areas on the device and may contain deleted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Acquisition via Chip-Off Extraction

A

The most low-level and potentially complex acquisition method for mobile devices. Involves reading the memory structures. This also requires special equipment and will destroy the mobile device when the memory chips are extracted from the electronic circuit board (ECB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Acquisition via Device Interface

A

Physical acquisition through software or hardware usually acquires all of the data on the device to include deleted information. This can be done using forensic tools or flasher boxes, producing a binary file that needs to be decoded for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Acquisition via JTAG

A

A physical acquisition using the interface on the device’s electronic circuit board (ECB) to acquire a binary file that needs to be decoded for analysis. Special equipment is necessary for this technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manual Scroll Analysis

A

Examiner physically accesses the data on the device through the device interface. Only information seen through the interface is available. There is no automation and the examiner could accidentally change data on the device. The process is usually documented through photographs or videotape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logical Acquisition

A

Data acquisition using a logical technique that only acquires active files stored on the device, in the file system of the non-volatile memory.

Some examples of a logical acquisition include conducting a manual analysis of the mobile device, using forensic tools like XRY or the Cellebrite UFED touch, dumping the file system, or creating backup files using iTunes on an Apple iDevice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Cable and Bluetooth

A

The most common automated method of accessing devices. Once you have access to the device, the acquisition tool must communicate with the handset.

Some mobile devices support standard AT command access, but this usually only provides access to a limited selection of data.

Many mobile devices have proprietary protocols and require manufacturer tools to execute code on the handset to acquire data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File System Acquisition

A

A logical acquisition of the entire file system on the device. Depending upon the data structures the file system uses to store information. the examiner may recover deleted data (SQLite databases) and hidden files on the device.

11
Q

Software

A

Some forensic tools transfer and run a particular agent on the mobile device in order to acquire data from the device.

Using this agent has advantages from a forensic perspective because it provides control over the process but does not make any changes to the device.

12
Q

Proprietary Bootloader

A

In a physical acquisition, a custom ______ can be injected into the handsets RAM and interact with the startup process to prevent the operating system from launching as normal, and can then be instructed to execute custom operations.

In this way, forensic tools can use this to gain access to the non-volatile memory on a mobile device and make no permanent changes to the handset.