Overview Ios Mobile Forensic
IOS Overview
- Easy to use interface
- Security is a core part of the iOS design
- Developed to support specifically designed hardware for customers
- User can view flash messages or notifications without unlocking the phone
- Quick access to camera
- Warnings of the activity and ability to turn off certain features with ease are integrated
- SIM card
- Memory internal external SD card
- Mobile Phones (Classical phones, Features phones, Smart phones, Novelty phones)
- Other devices (GPS devices, Mobile modems, Media, Tablets)
- Interfaces (Cables :- fast, secure, Bluetooth :- handset ID may be visible to others)
- No law enforcement agencies or their agents should change data on a mobile phone, which is relied upon in court.
- Person accessing the mobile phone should be competent and qualified to give evidence and explain the relevance and implications of their actions.
- Records or audit trail of all procedures allied should be documented and preserved. An independent third party should come out with the same results, if the examination is repeated.
- The person in charge of the investigation show be aware of the law and principles.
- Some types of data may be found in more than one location:
- Contacts on Handset and SIM
- Pictures on handset and Memory card
- Examine every area independently to be use of capturing the maximum amount of information.
- When the handset is seized,
- Calls, SMS can arrive from mobile network, (occupying deleted items)
- Information might be wiped out from Internet apps.
- Downloads and Trojans from WIFI can affect the content of the handset.
- Bluetooth connection might leave a print on the flash memory, overwrite files.
- Turn off, sometimes needed to be on,
- Phone on in Faraday bag or operate in a Faraday tent, (Radio waves are weak and the phone increases it signal strength and thus consumes more power) – not very reliable though. Phone should be charged fully first. The content of the phone might change by the execution of a scheduled programs, on timer.
- Disable network services, possible with clone that don’t copy the encryption key (more about this later) SIM cards, or ask the network provider to disable its connections to the phone under investigation.
- “Airplane mode”, possible but not recommended. It involves the investigator to interact with the handset, and use keypads, which might be programmed to delete information.
- Physical evidence: DNA and fingerprints :- to associate the phone with the suspect, also useful for patterns identification.
- Switch off the phone before transporting it, see previous slice. If it is required to be left on for sometimes, keep it charged and then switch it off before moving away.
- The handset should be packed in a tight and rigid container to prevent accidental damage.
- The container should be placed in an evidence bag sealed and labelled to restrict access.
- All sources of evidence should also be collected and photographed at the scene – handset, charger, cables, CDs, memory card, user guides etc…
- Take a photograph of the screen – time difference noted, level of the battery, network provider. If the screen is in saving mode, re-activate and take a picture. Charge the battery if necessary at this initial stage.
- Suspect should not handle the phone after the seizure :- original factory reset, key codes to clear content, removal of SIM card, removal of battery can cause lost from memory.
- The security code and phone number should be requested, if not given
- Review seized materials for clues
- Trial and error, type simple sequences 1,2, 3, 4 or 0000, date of birth. After 3 trials the SIM card is blocked.
- Get the PUK from the service provider – court order might be required to unlock the phone.
- If the phone is immersed in a liquid, remove SIM card and battery and place in a container, send a sample of the liquid or investigation.
- If the phone has a visible physical damage, the cause of the damage should be investigated, even if the evidence can still be extracted.
Source: ACPO, Mobile Forensic Module at Portsmouth University


Comments
Post a Comment