Download presentation
Presentation is loading. Please wait.
Published byJanice Stokes Modified over 9 years ago
1
Introduction to Handheld Digital Forensics Created by DM Kaputa Ph.D.
2
New Certificate Fall 2009 Computer Security & Investigations/Digital Forensics Developed under the auspices of National Science Foundation/Advanced technological Education Grant # 802062 Faculty members: Kaputa, Kuroski, Kowalski, Palombo & Gill
3
Some high-profile forensics cases These cases probably would not have been solved, if not for the digital forensics investigations.
7
Police give J. Rodemeyer’s cell phone to RCFL
8
M. Jackson’s doc’s phone
9
What is Handheld forensics? Computer Forensics: storage device requiring file system, device is “static”, larger storage capacity ( although this is changing) Forensic:bit stream imaging Handheld Forensics: embedded systems, device is “active”, smaller on board capacity (16 G) Forensic: active memory imaging
10
Forensic Rules for PDA seizure disconnect wireless connectivity Keep power Cables…gather Unit is always changing, RAM main storage for files & apps acquire in lab Fundamentals of forensic grade software PDA OS: WinCE, RIM (Blackberry), Palm OS, embedded Linux, Symbian
11
Forensic rules for cell phone seizure 1. disconnect wireless communication 2. keep power or may need psswd 3.gather cables & accessories 4. acquire in lab 5. use forensic grade software
12
HYBRIDS ( combination of both) although most cell phones now are hybrids & beyond!!!!) ) Windows pocket PC I-phone Googlephone Linux Blackberry Most contain PDAs, GPS & camera, MP3 player
13
Quick Time Line 1960s Bell labs develops electronics for cell phone technology 1978 AMPS..advanced mobile phone system debuts 1 st commercial cellular network in Chicago 1988 Cellular Technology Industry Assoc. created 1991 TDMA also first GSM phone in Finland 2001 Bell South leaves payphone business
14
Major Access Technologies for cell phones AMPS…Advanced mobile phone service 1 G systems FDMA … analog standard Frequency division multiple access ****************************************** DIGITAL CELLULAR NETWORKS 1.TDMA time division multiple access ( digital link technology) Different time slot for each channel (6 slots) 2 G SYSTEMS 2. GSM Global Systems Mobile 1991 (replacing TDMA to 3 G)
15
GSM continued Used TDMA air interface…8 time slots Uses SIM card. removable thumb sized card, identifies user to network & stores information 82% of the world’s phones available in over 168 countries Next generation (UMTS) (universal mobile) enhancing GSM with CDMA air interface AT & T service (Cingular,T-mobile)
16
Other common cellular networks 3.Also IDEN network designed by Motorola 4.And a digital version of original analog called D-AMPS digital advanced mobile phone service
17
CDMA developed about 1989 by Qualcomm Code Division Multiple Access Spread spectrum technology Spreads digitized data over the entire bandwidth 3 G SYSTEM Always on data access High data speeds Live streaming video Verizon & Sprint
18
4 G SYSTEM 4 G systems 100 Mbits while moving 1 G while still High quality audio/video
19
Intro to Cell Phone Forensics Very popular devices today under GSM SIM & mobile equipment (ME) CDMA phones (Verizon & Sprint) historically no SIM although RUIMs are gaining in popularity ( removable user identity modules)
20
Introduction to SIM Card What is SIM Card? Subscriber Identity Module which authenticates device to network Stores names and phone numbers Sends and Receives text messages Stores network configuration info (IMSI)
21
SIM disadavantage Unless SIM card lock is enabled…can steal SIM and rack up charges against you !!!
22
SIM Card continued Useful for quick transfer of numbers and info from one phone to another
23
SIM advantages Portability is main advantage SIM can be swapped out to new phone Stores contact info
24
What exactly is on SIM card? Simple phone book Last 10 outgoing numbers SMS messages (short message system) aka text messages IMSI
25
Paraben’s SIM Card Seizure Last 10 outgoing phone numbers…….
26
Cell phone forensics…last 10 outgoing numbers
27
Components continued Outgoing SMS text messages
28
SMS outgoing text messages
29
Components continued IIncoming SMS text messages
30
Delivered (to you) text messages
31
Components continued IMSI….this is a network configuration number International Mobile Subscriber Identity OR IMEI number International Mobile Equipment Identity
32
Conclusions…forensically speaking Can track deleted SMS……by analysis of unallocated space Be cogniscent of what you send out in text messages…..!!!! They could come back to haunt you.
33
Some Hand Held Forensic Toolkits MOBILedit! Software Highly rated by NIST BitPim Software CDMA open source Device Manager, proprietary software by Paraben Cellebrite Hardware used by LE Next slide : Using Device Manager to attempt an acquisition of a cell phone
43
Mobile Malware or who said mobiles don’t have malware? PPhoenix FFacebook mobile DDroidDream PPlankton ZZitmo GGolddream A
44
1 st Case Mobile malware 22004 first mobile malware BBy 2010…250% increase 22011 Botnet enabled malware for Androids FFrom June 2010 to Jan 2011 Android malware increased by 400%
45
What does it do? Disables phone Remotely controls phone….can record phone conversations & store to phone’s SD card..can then upload to server controlled by hacker (drops a configuration file) Steals valuable data
46
2011 iPad users hacked Hackers pleads guilty to stealing data from 100,000 iPad users Fake version of “Angry Birds” apps sent sensitive info about user to hacker to gain access to phone
47
What can we do? Do NOT access banking sites over public Wi Fi connections Do NOT leave “Wi Fi ad-hoc mode” on Don’t download apps from 3 rd party app repository !!! Check permissions of every app you download Run it through secure app that will scan it from market to device…….
48
Scanning for apps NNorton LLookout BBitdefender NNetQin AAlso scan Facebook and Twitter!!!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.