Introduction to Handheld Digital Forensics Created by DM Kaputa Ph.D.

Slides:



Advertisements
Similar presentations
CS4032 Presentation SMS, SIM, MMS and Barcodes Richard Drysdale.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Guide to Computer Forensics and Investigations Fourth Edition
Mobile Computing A new era of mobility Overview Past: History of mobile computing Present: What we have now Future: Whats to come.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
Mobile Computing Advantages and limitations of mobile computing
Intro to Android and iOS CS-328 Dick Steflik. The Players Android – Open source mobile OS developed ny the Open Handset Alliance led by Google. Based.
Mobil game : A mobile game is a video game played on a mobile phone, smartphone, PDA, handheld computer or portable media player Type of language writing.
Cellular Phone and Data Standards Past, Present, and Future.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Extended Learning Module E NETWORK BASICS (on your CD)
COS 413 Day 21. Agenda Assignment 6 is Due Lab 6 Corrected –1 A, 4 B’s, 1 C, 2 D’s and 1 non submit LAB 7 write-up not corrected –Missing two Assignment.
DAKNET Presented By: rreema.
Wireless Wide Area Networks
SAMEER NETAM RAHUL GUPTA PAWAN KUMAR SINGH ONKAR BAGHEL OM PANKAJ EKKA Submitted By:
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
Presentation By Deepak Katta
Guide to Computer Forensics and Investigations Fifth Edition
INTRODUCTION TO MOBILE COMPUTING. MOBILE COMPUTING  Mobile computing is the act of interacting with a computer through the use of a mobile device. 
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Grover Kearns, PhD, CPA, CFE Class Videos 2 How works Spoofing
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Women’s Learning Partnership Mobile Phone Technologies: To Infinity and Beyond? Usha Venkatachallam Nov 12, 2008.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Cell Phone Technology. Cell Phone Frequencies Cell phones use full-duplex radios, rather than half-duplex radios like those used in walkie-talkies, so.
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
A brief history, Smart Phones, Tablets, and Wearable Technology.
BY N.SUDHEER KUMAR E.C.E BY N.SUDHEER KUMAR E.C.E.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
How Mobile Apps Help Businesses Dr. Gita Phelps Minority Youth in Business (June 2014)
Multiple Access Techniques for Wireless Communications (MAT)
What is Android……? Android is an Operating System (OS) created by Google to run on any small electronic devices such as cell phones, e- books, Media Internet.
 No mobility  Security problem  High call failure rate (line disconnection)  Delay in getting new connections  Limited value added services.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Cellular Communication SNSCE - CS2402 Mobile Pervasive Computing.
Computer Hardware Introduction to Computer Components and Terminology.
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Denise Oliver, Education and Outreach Director Alabama Supercomputer Authority.
Computing Fundamentals Module Lesson 1 — Introducing Computers Computer Literacy BASICS.
PDA Forensics Presented by: Yusra Shams. Agenda Purpose Challenges Generic structure of PDA Common Operating Systems Where to look for data Tools available.
Presented by: Gurpreet Singh Assistant Professor Department of School of Computing and Engineering Galgotias University Cellular Communication.
Guide to Computer Forensics and Investigations Fifth Edition
The Whole new Experience - By Mahesh Chauhan. Its sounds strange but the fact is that :-  More than 90% of the CPUs in the world are not in desktops.
Network Management of Wireless Network Gerald Methé Bell Mobility.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
COMPUTER NETWORKING 2 LECTURE : CELLULAR NETWORKS.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Wireless & Mobile Networks By Dr. Ali Maqousi Feb, 2012.
Digital Forensics and Hand Held Devices Robert Trimble COSC
A PRESENTATION ON VOCATIONAL TRAINING IN BSNL. 2 3-Jul-16 GSM (Global System For Mobile Communication) The Global System for Mobile communications (GSM:
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Computing Fundamentals Module Lesson 1 — Introducing Computers
Guide to Computer Forensics and Investigations Fourth Edition
MOBILE COMPUTING Jitendra Patel ROLL NO :- 38 TY MSC(CA & IT)
Mobile Phone Techniques
Unit 9 Network Fundamentals
Wireless Wide Area Networks 3G/4G - mobile phones.
Wireless Wide Area Networks
Cellular Telephone Networks
Computing Fundamentals Module Lesson 1 — Introducing Computers
Dept. of Business Administration
Guide to Computer Forensics and Investigations Fourth Edition
Security in Wide Area Networks
Presentation transcript:

Introduction to Handheld Digital Forensics Created by DM Kaputa Ph.D.

New Certificate Fall 2009  Computer Security & Investigations/Digital Forensics  Developed under the auspices of National Science Foundation/Advanced technological Education Grant #  Faculty members: Kaputa, Kuroski, Kowalski, Palombo & Gill

Some high-profile forensics cases  These cases probably would not have been solved, if not for the digital forensics investigations.

Police give J. Rodemeyer’s cell phone to RCFL

M. Jackson’s doc’s phone

What is Handheld forensics?  Computer Forensics:  storage device requiring file system, device is “static”,  larger storage capacity ( although this is changing)  Forensic:bit stream imaging  Handheld Forensics:  embedded systems, device is “active”,  smaller on board capacity (16 G)  Forensic: active memory imaging

Forensic Rules for PDA seizure  disconnect wireless connectivity  Keep power  Cables…gather  Unit is always changing, RAM main storage for files & apps acquire in lab  Fundamentals of forensic grade software  PDA OS: WinCE, RIM (Blackberry), Palm OS, embedded Linux, Symbian

Forensic rules for cell phone seizure  1. disconnect wireless communication  2. keep power or may need psswd  3.gather cables & accessories  4. acquire in lab  5. use forensic grade software

HYBRIDS ( combination of both) although most cell phones now are hybrids & beyond!!!!) )  Windows pocket PC  I-phone  Googlephone  Linux  Blackberry  Most contain PDAs, GPS & camera, MP3 player

Quick Time Line  1960s Bell labs develops electronics for cell phone technology  1978 AMPS..advanced mobile phone system debuts 1 st commercial cellular network in Chicago  1988 Cellular Technology Industry Assoc. created  1991 TDMA also first GSM phone in Finland  2001 Bell South leaves payphone business

Major Access Technologies for cell phones  AMPS…Advanced mobile phone service 1 G systems FDMA … analog standard  Frequency division multiple access  ******************************************  DIGITAL CELLULAR NETWORKS  1.TDMA time division multiple access ( digital link technology)  Different time slot for each channel (6 slots)  2 G SYSTEMS  2. GSM Global Systems Mobile 1991 (replacing TDMA to 3 G)

GSM continued  Used TDMA air interface…8 time slots  Uses SIM card. removable thumb sized card, identifies user to network & stores information  82% of the world’s phones available in over 168 countries  Next generation (UMTS) (universal mobile) enhancing GSM with CDMA air interface  AT & T service (Cingular,T-mobile)

Other common cellular networks  3.Also IDEN network designed by Motorola  4.And a digital version of original analog called D-AMPS digital advanced mobile phone service

CDMA developed about 1989 by Qualcomm  Code Division Multiple Access  Spread spectrum technology  Spreads digitized data over the entire bandwidth  3 G SYSTEM  Always on data access  High data speeds  Live streaming video  Verizon & Sprint

4 G SYSTEM  4 G systems  100 Mbits while moving  1 G while still  High quality audio/video

Intro to Cell Phone Forensics  Very popular devices today under GSM SIM & mobile equipment (ME)  CDMA phones (Verizon & Sprint) historically no SIM although RUIMs are gaining in popularity ( removable user identity modules)

Introduction to SIM Card  What is SIM Card?  Subscriber Identity Module which  authenticates device to network  Stores names and phone numbers  Sends and Receives text messages  Stores network configuration info (IMSI)

SIM disadavantage  Unless SIM card lock is enabled…can steal SIM and rack up charges against you !!!

SIM Card continued  Useful for quick transfer of numbers and info from one phone to another

SIM advantages  Portability is main advantage  SIM can be swapped out to new phone  Stores contact info

What exactly is on SIM card?  Simple phone book  Last 10 outgoing numbers  SMS messages (short message system) aka text messages  IMSI

Paraben’s SIM Card Seizure  Last 10 outgoing phone numbers…….

Cell phone forensics…last 10 outgoing numbers

Components continued  Outgoing SMS text messages

SMS outgoing text messages

Components continued IIncoming SMS text messages

Delivered (to you) text messages

Components continued  IMSI….this is a network configuration number  International Mobile Subscriber Identity  OR  IMEI number  International Mobile Equipment Identity

Conclusions…forensically speaking  Can track deleted SMS……by analysis of unallocated space  Be cogniscent of what you send out in text messages…..!!!!  They could come back to haunt you.

Some Hand Held Forensic Toolkits  MOBILedit! Software Highly rated by NIST  BitPim Software CDMA open source  Device Manager, proprietary software by Paraben  Cellebrite Hardware used by LE  Next slide : Using Device Manager to attempt an acquisition of a cell phone

Mobile Malware or who said mobiles don’t have malware? PPhoenix FFacebook mobile DDroidDream PPlankton ZZitmo GGolddream A

1 st Case Mobile malware 22004 first mobile malware BBy 2010…250% increase 22011 Botnet enabled malware for Androids FFrom June 2010 to Jan 2011 Android malware increased by 400%

What does it do?  Disables phone  Remotely controls phone….can record phone conversations & store to phone’s SD card..can then upload to server controlled by hacker (drops a configuration file)  Steals valuable data

2011 iPad users hacked  Hackers pleads guilty to stealing data from 100,000 iPad users  Fake version of “Angry Birds” apps sent sensitive info about user to hacker to gain access to phone

What can we do?  Do NOT access banking sites over public Wi Fi connections  Do NOT leave “Wi Fi ad-hoc mode” on  Don’t download apps from 3 rd party app repository !!!  Check permissions of every app you download  Run it through secure app that will scan it from market to device…….

Scanning for apps NNorton LLookout BBitdefender NNetQin AAlso scan Facebook and Twitter!!!!