Chapter 10

Mobile Device Forensics

Information in This Chapter:

ent Cellular Networks and How They Work

ent Overview of Cell Phone Operating Systems

ent Potential Evidence Found on Cell Phones

ent Collecting and Handling Cell Phones as Evidence

ent Cell Phone Forensic Tools

ent Global Positioning System Function and Potential Evidence

Many people question how we ever functioned without our cell phones. Almost everyone has a cell phone or a PDA of some sort; even young kids now have iPhones in their backpacks. Although many children can't even remember what it was like not to have a cell phone, we have to remember that it hasn't been that long since they didn't even exist (or we had to carry them around in a bag)! In the digital forensic world this offers many benefits, especially in that we now have many more locations to search for evidence, and the potential to validate data to more than one device is higher. Examiners will now have the extra challenge of investigating numerous devices and making sure that they protect the chain of custody and document the evidence in a thorough way.

In Chapter 10, we're going to take a closer look at cell phones and the technology that powers them. We'll look at the types of networks as well as the components that form them. Cell phones are not the only mobile device with potential evidentiary value. GPS or Global Positioning Systems are gaining more and more attention from investigators. As such, we'll look at what kind evidence we may be able to recover from a GPS unit. Finally, this chapter will examine the special handling techniques required to preserve fragile evidence on these wireless devices.

Cell site, Global Positioning System (GPS), Trackpoints, Track Log, TDMA, GSM, Integrated Digitally Enhanced Network (iDEN), Smartphone, Subscriber Identity Module (SIM), Base Station Controller (BSC), The Mobile Switching Center (MSC), Visitor Location Register (VLR), Home Location Register (HLR), Authentication Center (AuC), Short Message Service Center (SMSC), Public Switched Telephone Network (PSTN), Electronic Serial Number (ESN), Personal Identification Number (PIN), Personal Unlock Key (PUK), Call Detail Records, International Mobile Equipment Identifier (IMEI), ESN, MEID, International Mobile Subscriber Identity (IMSI), Integrated Circuit Card Identifier (ICC-ID), Predictive text, Interworking functions, Handoff, Short Message Service (SMS), Multimedia messaging services (MMS), Triangulation, Directional antenna, Waypoints

Introduction

The phones riding on our hips and sitting in our pockets are true marvels of technology. These “mini-computers” are capable of delivering much of the same functionality that was once the lone province of desktops and laptops. We can browse the Internet, send and receive e-mail, shoot pictures and videos, and plot our location on a map, just to name a few of the possibilities.

Cell phones and other mobile devices can make a case airtight. Just ask Boise, Idaho's Dan Kincaid. When the Boise police arrested Kincaid for burglary, they also seized and searched his Blackberry cell phone. It paid off. His e-mail contained several messages that would eventually help convince him to plead guilty. After being spotted, Kincaid e-mailed his girlfriend saying “Just trying to find a way out of this neighborhood without getting caught.” “Dogs bark if I'm between or behind houses …” He went on to write, “Cops know I have a blue shirt on. … I need to get out of here before they find me” (Shachtman, 2006).

At their core, today's smart phones are fundamentally computers with radios attached to them. There is an ever-evolving world of cell phone hardware with no slowdown in sight. Like their larger cousins, these small-scale devices can create artifacts that can be recovered and used as evidence.

Cellular phones and other mobile devices present yet another challenge for examiners. Walk into any cell phone store and you'll be confronted with a vast array of cell phone makes, models, and operating systems. The various devices in turn support many different services and applications. To further complicate things, there is not an established hardware interface. You've likely run across this issue one time or another when you upgraded your phone. Odds are when you got a new phone you had to get a new charger and data cables as well. Keeping pace with the cabling, operating systems, and so on is quite a challenge. The good news is that this seems to be getting better, with many phones now including a mini-USB in their handsets.

Cellular Networks

Evidence can be located not just in the phone or memory card, but on the network itself. As examiners we need to understand the basic operation of cellular networks and the location(s) of any potential evidence.

As the name implies, each cellular network comprises individual cells. Each cell uses a predetermined range of frequencies to provide service to a distinct geographic area. The size and shape of each cell vary. In fact, they can vary wildly. They can cover a few city blocks in an urban environment to over a couple of hundred square miles in the country. The type of terrain, particularly obstructions, is the limiting factor; see Figure 10.1.

image

Figure 10.1 The layout of a typical cellular network. (Illustration by Jonathan Sisson.)

The strength of the radio signal emitted from each cell is closely controlled. This is done purposefully to limit its range. By limiting the range, providers can reuse the relatively limited number of frequencies they have to work with.

Each cell has a base station that consists of an antenna (or mast) along with the related radio equipment. Together, they are known as a cell site. These cell sites deliver coverage to the individual cells. You've probably seen these large towers along the interstate for example or smaller ones on rooftops in more urban locations. Normally, each cell tower will have three panels per side. The middle panel is usually the transmitter, with the other two being receivers. The receiver panels constantly listen for incoming radio signals.

It may surprise you to know that the cell sites are not located in the center of each cell. They are actually located at the junction of multiple cells, facilitating service as subscribers move from cell to cell.

Cellular Network Components

It takes quite a bit of infrastructure to get your phone call from that remote location back to your office downtown. Forensically speaking, each of these components could potentially provide information relevant to an investigation.

A Base Station consists of the antennas and related equipment.

A Base Station Controller (BSC) regulates the signals between base stations. This function is critical as phones move from place to place.

The Mobile Switching Center (MSC) processes calls within the network. As a key piece of the wireless network, the MSC holds a tremendous amount of possible evidence. It also coordinates calls between different wireless networks as well as land lines. The MSC handles SMS messages as well. The call detail records and logs are found here.

The Visitor Location Register (VLR) is a database that is linked to a MSC. All mobile devices currently being controlled by that MSC are recorded in the VLR. Interworking Functions serve as doorways outside data networks such as the Internet.

Information about individual subscribers is collected in the Home Location Register (HLR). This information includes subscriber identification, billing, and the services they receive, along with the current location of the device. The HLR also stores encryption keys. The HLR supports the Authentication Center (AuC), which is used to control access to the network. The AuC screens connections, blocking unauthorized users (Jansen & Ayers, 2007).

Text or SMS messages are the responsibility of the Short Message Service Center (SMSC). Messages may be recovered from the SMSC, but there is no hard and fast rule dictating how long these messages must be kept by individual providers. It is up to the individual provider to determine how long that information is kept (Jansen & Ayers, 2007).

It's important to note that your cell phone is regularly communicating with the nearest cellular antennae, even if you're not talking on it. When you turn on your cell phone, it automatically begins searching for the nearest cell site. Once the antenna is found, the phone then transmits identification data so that the network can verify who you are and whether or not you have authorized access. This information would include things like the cell phone number along with the name of your service provider.

As you drive, your “connection” to the network must be transferred from cell tower to cell tower. This transfer is known as a “handoff.” The handoff is made as the signal strength begins to fade. Not all handoffs are handled the same way. For instance, GSM (Global System for Mobile Communication) and Code Division Multiple Access (CDMA) for networks handle them differently. A GSM network uses what is known as a hard handoff. Here, the phone can only attach to one tower at a time. The conversation is separated from the current tower and passed to the new one. The phone will then switch to the new tower's frequency. In contrast, CDMA handoffs are considered “soft” handoffs. Here a phone can connect to multiple towers at once, utilizing the tower with the strongest signal.

Records showing when a certain phone is connected to a specific tower can be used to put someone (or more precisely their phone) in the vicinity of a crime or to establish an alibi.

Once your call hits the cell tower it's then transferred to the Mobile Switching Center (MSC). If the call is destined for a phone that is out of the network, the MSC will pass the call to the Public Switched Telephone Network (PSTN). The PSTN will then direct the call to its intended recipient.

We've all experienced dropped calls or a loss of signal at one time or another. One of the potential causes is dead spots. Dead spots can be caused by a gap in the cell coverage or obstructions to the signal. Cell phones are heavily dependent on having a clear and unobstructed (or very close to it) path to the cell tower. Obstructions can be tall buildings, mountains, and large trees.

Cell phones support two kinds of messaging services, Short Message Service (SMS) and Multimedia Messaging Service (MMS). SMS are what we normally refer to as text messages. We get the name Short Message from the limitation of the maximum size of each message. SMS messages have a maximum length of 160 characters. MMS offers improved functionality over SMS. MMS messages aren't limited to 160 characters.

Types of Cellular Networks

Cellular networks can be differentiated or defined in how they transmit data. These transmission schemes include Code Division Multiple Access (CDMA), Global System for Mobile Communications (GSM), and Integrated Digitally Enhanced Network (iDEN).

Code Division Multiple Access (CDMA)

CDMA was originally a military technology that was eventually released for use by the public. CDMA uses spread spectrum technology to transmit data. This technology permits several phones to send and receive through a single channel. Each part of these separate conversations is labeled with a specific digital code. The carriers that use CDMA technology include Sprint, Verizon, Alltel, and NEXTEL. CDMA phones typically do not utilize SIM cards. CDMA networks use an Electronic Serial Number (ESN) to identify individual handsets (Barbara, 2010).

Global System for Mobile Communication (GSM)

As the name suggests, GSM phones can be used internationally. GSM uses Time Division Multiple Access (TDMA) technology. Worldwide, GSM is the most widely used transmission mode. Unlike CDMA, GSM phones use SIM cards. GSM carriers include AT&T, Verizon, T-Mobile, and Cellular One. The International Mobile Equipment Identity (IMEI) is used to identify handsets (Barbara, 2011).

Integrated Digitally Enhanced Network (IDEN)

iDEN, or Integrated Digitally Enhanced Network, provides two-way radio-like functionality, also known as “Push to Talk.” Like GSM phones, they also utilize SIM cards. iDEN carriers include NEXTEL, Sprint, and Boostmobile.

Prepaid Cell Phones

At their core, prepaid phones operate like other cell phones in that they use radios to transmit data and must connect to a network. The difference with prepaid phones is that they create some significant investigative hurdles, particularly when trying to identify the subscriber. For one, they can be paid for completely with cash, essentially leaving little to nothing in the way of a paper trail. This makes identifying the purchaser much harder.

Like other cell phones, however, we can identify the area where the phone is being used as well as the calls that are sent and received. With prepaid phones, the information we're looking for will be held by two entities. The phone provider will hold any subscriber information, and the network provider will maintain the call detail records.

Operating Systems

A phone's operating system (OS) has a significant impact on any forensic examination. The OS determines what artifacts are created and how they are stored. Modern cell phone operating systems include Symbian, Apple iOS, Windows CE and Windows Mobile, Google's Android, and Blackberry OS.

Originally, the Symbian OS was a product of a partnership between Nokia, Ericsson, Motorola, and Psion. Sony Ericsson rolled out the first Symbian-run phone in 2000. In 2008, Nokia bought the rights to the OS. Nokia recently made Symbian open source. It's used today in Nokia and Sony Ericsson handsets (Barbara, 2010b).

Blackberrys were first introduced in 1999 by the Canadian company Research In Motion (RIM). Businesses and governmental entities are heavy Blackberry users. Blackberry phones synchronize with Novel's GroupWise and Microsoft's Exchange. As such, they are quite proficient in handling e-mail, calendars, and the like. The Blackberry OS supports multitasking as well as a variety of applications. This operating system is proprietary, and versions are specific to each carrier. That means that the Verizon version of a specific phone would be different than the AT&T edition (Barbara, 2010b).

Android is an open-source OS that is currently developed by Open Handset Alliance. In 2005, Google acquired the Android OS from Android, Inc. In 2007, the Open Handset Alliance was formed and has been developing the OS ever since. The Open Handset Alliance “is a group of 84 technology and mobile companies who have come together to accelerate innovation in mobile and offer consumers a richer, less expensive, and better mobile experience” (Open Handset Alliance, 2007). Some of the members include Sprint, T-Mobile, LG Electronics, Inc., Kyocera, Motorola, Google, and eBay. Thousands of third-party apps are available to augment Android's core functionality. Android is found on handsets produced by Motorola, Sony Ericsson, and HTC (Barbara, 2010b).

Apple's popular iOS can be found not only on the iPhone but also on other mobile devices such as the iPad and the iPod touch. iOS is based on Apple's Mac OS X, which is used on their laptops and desktops. iPhones make heavy use of third-party apps that are purchased/downloaded from the Apple App Store.

Windows Mobile is Microsoft's OS developed for the smart phone and mobile device market. Like its competitors, Windows Mobile also supports a huge array of apps.

Cell Phone Evidence

Now that we've looked at how cell phones and networks function, we can look at some of the information they hold that may qualify as evidence. It's important not to focus on one source, as relevant evidence can be found in multiple locations within the handset and the network.

Table 10.1 lists some of the potential evidentiary items found in modern smartphones.

Table 10.1. Potential Smart Phone Evidence

Call History Text Messages E-mail
Pictures & Video Deleted Text Messages Browser History
Contacts Location Information GPS Chat Sessions
Calendar Voice Memo Documents

The Personal Identification Number (PIN) is used to secure the handset. Three consecutive, unsuccessful attempts to enter the correct PIN will result in the user being locked out. The Personal Unlock Key (PUK) will be needed to unlock the SIM after this lockout has occurred. Typically, a PUK can only be supplied by the provider of the SIM card (Barbara, 2010).

You have probably noticed when typing an e-mail or text on your phone that many times the phone will complete words for you. This is called predictive text. Predictive text was developed to make texting easier on phones that lacked a full QWERTY keyboard. Those phones use three letters per key, forcing the user to “scroll” through the multiple letter options before selecting one. With predictive texting technology, the device attempts to predict the word most likely intended by the user. These guesses are based on a database dictionary containing thousands of words, names, abbreviations, slang, and so on (Mobile-phone-directory.org, 2009).

What is most interesting, from a forensic perspective is that these systems are capable of learning. Words, abbreviations, slang, and the like entered by the user is assimilated into the database. E-mail addresses and URLs can also be stored. If this database is recovered, it can produce some interesting evidence. For example, pedophiles could have routinely entered common abbreviations for child pornography (CP). A drug trafficker could routinely enter slang or a code word for their product when texting a buyer.

Several companies produce this technology. Some examples are Tegic Communication's, T9 (www.T9.com), Motorola's iTap, and ZiCorp's eZiText (Kessler, 2011).

Call Detail Records

Call detail records (CDR) are normally used by the provider to troubleshoot and improve the networks performance. The CDR is also valuable to examiners. They can show us:

ent Date/time the call started and ended.

ent Who made the call and who was called.

ent How long the call lasted.

ent Whether the call was incoming or outgoing.

ent The originating and terminating towers.

Although the CDRs can tell you a lot, what they cannot tell you is who actually made the call.

You get what you ask for; therefore it is important to understand the difference between the CDR and the subscriber information. Subscriber information and the call detail records are not the same. Typical subscriber information would include things such as the name, address, and telephone. Other items included with subscriber information are account numbers, e-mail addresses, services, payment mechanisms, and so on.

Every service provider keeps all of these records for a predetermined period of time. The time period is spelled out in their data retention policies. The retention period is also not uniform across all of the data types. For example, some carriers may keep SMS data for only seven to fourteen days. By contrast, cell sector information could be kept a year or longer. The takeaway here is that you don't have an unlimited amount of time to file the necessary paperwork to ensure that the records you seek won't get purged.

Carriers generally maintain meticulous records of subscribers and their activities for billing and other purposes. This stockpile of information can be enormously helpful during an investigation. These carrier records can tell us the subscriber's name, address, additional phone numbers, Social Security number, and so on. The credit information on file can give investigators billing addresses, credit card numbers, and more.

The call detail records describe the specifics of each incoming and outgoing call. These should not be confused with toll records. Toll records refer to landline information rather than mobile phones. When asking for the call detail records, you must specify a date range. It's a wise practice to pad your request with a day or two on both ends.

The call detail records, when combined with the physical addresses of the towers, can show us the call's origination and termination locations. These records also show the cell sites that were used, the length of the call, the time the call began, the numbers dialed by the target phone, and so on (Jansens & Ayers, 2007).

The billing records do not represent a complete list of the inbound and outbound calls. The call logs will include data that have not yet made it into the billing system.

Information kept by the carriers will likely have a short, predetermined shelf life. Each carrier has some discretion on how these data are preserved and how long they're stored. This is usually described in the company's retention policies. In light of this practice, the legal paperwork should be generated and served sooner rather than later. This will help to ensure that your evidence won't get purged before it can be preserved and collected.

Cell phones can be located (with varying degrees of accuracy) by a few different means. Triangulation is one of the better-known methods. In triangulation, the phone's approximate location is determined using its distance from three different towers. The distance is calculated by determining the signal delay from the phone (or handset) to the three towers. A directional antenna can also be used for this purpose. Again, the signal delay is used to determine the distance, but this time only two towers are needed since they are able to also determine the direction. Finally, the location can be determined via GPS using latitude and longitude.

Collecting and Handling Cell Phone Evidence

Because cell phone data are not unlike other forms of digital evidence, the fundamental principles in handling digital evidence apply to cell phones as well. Job one when dealing with cell phones is isolating it from the network. Isolating the phone is imperative. Aside from the danger of being remotely wiped (by the suspect or carrier), any inbound calls, messages, or e-mails could overwrite any potential evidence. We can effectively isolate the phone using a Faraday or arson can. A Faraday bag, shown in Figure 10.2, is a special container constructed with conductive material that effectively blocks radio signals. An arson can is really nothing more than a clean, empty paint can. These containers can be found in hardware or home improvement stores.

image

Figure 10.2 A Faraday bag and cell phone.

If the phone is on when you recover it, leave it on. If there will be a significant delay in getting the phone to the lab, then you may want to consider turning it off. This is done to ensure that the battery doesn't completely drain. If it does, you run the risk of locking the phone. If the phone is protected with a PIN, turning the phone off will result in the phone being locked when it's turned back on.

Isolating the phone with the power on creates some concerns regarding the battery life. Remember, while the phone is on it will continually attempt to connect to the network, further draining the battery. A dead battery could also trigger the security function, locking up the phone.

If the phone is off, we can remove the battery as well as remove and initial the SIM card. We'll also want to photograph the phone, front and back. During this process, we'll want to pay particular attention to the identifying numbers underneath the battery (the IMEI, ESN/MEID). We'll also want to isolate the phone from the network, just like a powered on phone.

Before conducting a forensic exam, it's important to identify the make and model of the handset you're dealing with. This information can help you get a full understanding of the phone's functions, features, and capabilities. The make and model of the phone can be typically found under the phone's battery. This same information can also be found in the phone's file system.

Like computers, we only want to access or examine the original evidence as an absolute last resort. Ideally, a forensic tool should be used to first acquire the data, giving the examiner a copy to work with. In the end however, a manual examination may be the only alternative. Should this be necessary, you will have to articulate your reasoning behind taking this course of action. Detailed documentation will be very helpful in accounting for your interaction with the device and establishing the integrity of any evidence that was recovered. Documenting a manual examination typically relies heavily on photographs as opposed to the digital evidence itself. In this instance, the examiner painstakingly navigates through the phone, taking photographs of the screens as he or she goes.

Voicemail is another potential source of evidence that shouldn't be overlooked. Typically, in order to access the voicemail, you will need the password-reset code from the carrier. When collecting voicemail evidence, there are a couple of options. The carrier can simply provide you with an access code or they can deliver you a copy of the data itself. This detail should be worked out early on with the provider, especially if you prefer one method or format to another.

At the scene, you should be on the lookout for additional handsets, SIM cards, and the related power and data cables. The power cable will help the lab ensure that the volatile memory is left intact until it can be properly collected and examined. Don't forget, while the phone is on, it will continually seek to connect with the network, rapidly draining the battery.

Subscriber Identity Modules

Subscriber Identity Modules (SIMs) can be valuable evidence all by themselves. They store a vast amount of information and should be collected and analyzed.

The SIM contains a couple of numbers that will be of particular interest. The first is the International Mobile Subscriber Identity (IMSI). The second is the Integrated Circuit Card Identifier (ICC-ID). The IMSI is used to identify the subscriber's account information and services. The ICC-ID is the serial number of the SIM card itself. The SIM can contain:

ent Subscriber Identification (IMSI)

ent Service Provider

ent Card Identity (ICC-ID)

ent Language Preferences

ent Phone Location When Powered Off

ent User Stored Phone Numbers

ent Numbers Dialed by the User

ent SMS Text Messages (Potentially)

ent Deleted SMS Text Messages (Potentially)

The SIM cards contain several individual components including a processor (CPU), RAM, Flash-based non-volatile memory, and a crypto-chip. They are used in all phones but are present in GSM, iDEN, and Blackberry handsets.

A Personal Identification Number (PIN) may be in place to protect the SIM data. PINs are four to eight digits in length. As an added layer of security, only three attempts may be made to enter the correct PIN. After the third unsuccessful attempt, the data can only be accessed with an eight-digit Pin Unblocking Key (PUK) along with a new PIN. Attempts to enter the PUK are also limited. After 10 failed attempts, many SIM cards will permanently deny access with a PUK.

Cell Phone Acquisition: Physical and Logical

The data on a cell phone can be acquired in one of two ways: physically or logically. A physical acquisition captures all of the data on a physical piece of storage media. This is a bit-for-bit copy, like the clone of a hard drive. This acquisition method captures the deleted information as well. In contrast, a logical acquisition captures only the files and folders without any of the deleted data. Data can be collected using nonforensic tools such as those used to synchronize or back up the data on the cell phone (Jansen & Ayers, 2007). While this process is similar to the one used to acquire a hard drive, there is one important difference. In this instance no write blocking device is used. The phone must be able to interact with the phone's hardware and software.

A manual examination entails interacting with the device via the keypad or touch screen. Although examining or interacting with the original evidence is never our first choice, sometimes it may be the only option. For example, in cases where time is of the essence, it may be necessary to forgo proper forensic procedures. Those situations may include locating a missing child or preventing an imminent violent act of some sort. In other situations, it may not be possible to even mine the data or extract them in a way that would preserve their integrity. This could happen in cases where forensic tools and techniques hadn't caught up with the latest technology.

Cell Phone Forensic Tools

As you might suspect, there are many, many different tools available to forensically examine a phone. These tools can come in the form of hardware or software. One of the realties is that not all of these tools support all cell phones. To further complicate matters, two tools that actually support a given phone may not read and recover the same information.

What follows is a sampling of the available tools for cell phone forensics. A close examination of the function and features shows that no single tool does it all. One glaring difference is the number of phones that are supported. Budget permitting, most labs will have multiple tools available to increase their capabilities. Figure 10.3 shows a Cellebrite UFED device.

image

Figure 10.3 A Cellebrite UFED.

BitPim is a robust open-source application that was not built for forensic purposes. BitPim is designed to work with CDMA phones that are produced by several vendors, including LG and Samsung among others. BitPim can recover data such as the phonebook, calendar, wallpapers, ring tones, and file system (http://www.bitpim.org/).

Oxygen Forensic Suite is a forensic program specifically designed for cell phones. It's a tool that supports more than twenty-three hundred devices. It extracts data such as phonebook, SIM card data, contact lists, caller groups, call logs, standard and custom SMS/MMS/e-mail folders, deleted SMS messages, calendars, photos, videos, JAVA applications, and GPS locations (http://www.oxygen-forensic.com/en/).

Paraben Corporation offers several hardware and software products targeted to mobile device forensics. In addition to cell phones, their tools also support GPS devices such as those from Garmin (http://www.paraben.com/handheld-forensics.html).

AccessData's MPE+ supports over thirty-five hundred phones. It's an on-scene, mobile forensic recovery tool that can collect call history, messages, photos, voicemail, videos, calendars, and events. It can analyze and correlate multiple phones and computers using the same interface. (http://accessdata.com/products/computer-forensics/mobile-phone-examiner).

The Cellebrite UFED (Universal Forensic Extraction Device) is a stand-alone, self-contained hardware device used to extract Phonebook, images, videos, SMS, MMS, call history, and much more. It supports over twenty-five hundred phones and is designed to extract information on scene. It also has a SIM card reader and cloner. As an interesting aside, Cellebrite devices (the nonforensic version) can be found in many cell phones stores. They're used to transfer a customer's data from one device to another. (http://www.cellebrite.com/forensic-products/forensic-products.html?loc=seg).

EnCase Smartphone Examiner is an EnCase tool designed to review and collect data from smartphones and tablet devices. It collects data from Blackberries, iTune backups, and SD cards. Once the information is collected, it is easily imported into the EnCase Forensic suite for continued investigation (http://www.guidancesoftware.com/encase-smartphone-examiner.htm).

So, what do you do if none of these tools will retrieve the information you're looking for? If that's the case, it's time to consider going “old school” and simply using a still or video camera. Although this would not be the first choice, it's better than coming away empty-handed.

Global Positioning Systems (GPS)

Like cell phones, Global Positioning Systems (GPS) can be a tremendous source of evidence. They can be used to pinpoint the location of suspects as well as the criminal acts themselves (if the device was active and in their possession at the time the crime was committed). They can also be used to show where suspects intended to go. Some GPS units can provide a great deal more evidence, including mobile phone logs, SMS messages, and images. Given these capabilities along with large storage capacities, examining these devices is well worth the time.

The GPS was originally produced for military use but was eventually shared with everyone. There are twenty-seven GPS satellites in the GPS system. Only twenty-four are in use at a time. The remaining three are held in reserve in case one of the primary satellites goes down. A GPS receiver calculates its position through a mathematical process known as trilateration (Brian & Harris, 2011).

Not all GPS units are the same. Some are feature rich, whereas others are pretty basic. We can separate GPS devices into four categories: simple, smart, hybrid, and connected. Simple units are designed to get users from one point to another. Most simple units can store trackpoints, waypoints, and track logs. Other features may be present depending on the make and model (LeMere, 2011).

Smart units can be broken down into automotive and USB mass storage devices. These units typically have 2GB of storage at a minimum along with an SD card. They provide the same base functionality as the simple systems. In addition, they can play MP3s, view pictures, and save favorite places.

Hybrid GPS units are feature rich and can provide a great deal of evidence. Hybrid devices possess the same features as smart devices plus some. Most notably, these devices provide hands-free access to your mobile phones via Bluetooth. This ability to interact with the cell phone can provide a secondary source of much of the data found on the phone. This would include call logs, an address book, as well as the MAC address of up to ten of the last phones that have connected to the unit. Finally, SMS messages can also be recovered (LeMere, 2011).

A connected unit provides hybrid features and the ability to get real-time information including Google searches and traffic information. These units have GSM radios along with SIM cards. This functionality is subscription based and as such, we may be able to obtain the subscriber information associated with the account.

GPS data can be grouped into two categories: system data and user data. System data will provide us with trackpoints and a track log. Track points are a record of where the unit has been. They are automatically created by the system. Trackpoints can't be altered by the user. By default, the system determines the interval at which they are recorded. Users can however modify this setting, changing the time or distance interval. The track log is a comprehensive list of all trackpoints. This list is intended to help users retrace their path (LeMere, 2011).

Waypoints are part of the user-created data. When interpreting a waypoint, you need to keep in mind what they represent. Unlike a trackpoint, waypoints don't always indicate the physical locations where the unit has been. They can be places the user intends to visit. The user can enter these locations based on the address, the actual coordinates, or from a list of Points of Interest (POI) supplied by the GPS unit manufacturer.

GPS devices are similar in many respects to cellular phones and are handled in much the same way. They can have volatile memory that may need to be preserved. When powered on, these units are constantly interacting with the satellites above. This interaction can cause complications from a forensic perspective, potentially causing relevant evidence to be overwritten or compromising its integrity.

GPS devices are cropping up in many different places. Taxi cabs, delivery trucks, and more are frequently being outfitted with GPS units. One such example of a GPS unit assisting investigators is the case of Las Vegas dancer Debbie Flores-Narvaez. The brutal December 2010 murder showed the value of GPS evidence. Police were able to locate her dismembered remains using GPS data from a U-Haul truck. The suspect, Jason “Blu” Griffith, apparently transported her remains in the truck and was unaware that the truck was equipped with GPS. Police obtained the GPS data and used them to retrace Griffith's movements, leading to her body.

Evidence in the case also included text messages. The victim's mother, Elise Narvaez, said that her daughter sent her this text message on December 1, 2010: “In case there is ever an emergency with me, contact Blu Griffith in Vegas. My ex-boyfriend. Not my best friend” (Hartenstein & Sheridan, 2010).

Q&A with Christopher Vance

Christopher Vance is a Digital Forensic Specialist assisting the West Virginia State Police Digital Forensics Unit. In the Q&A here, he shares some of his insights from the trenches.

[Q] What do you see as the biggest forensic challenges when dealing with cell phones?

[A] Vance: The single biggest challenge when dealing with cell phone forensics is that there are thousands of phones, each with different operating systems. There is such a wide variety when dealing with mobile devices it is impossible to be well versed in every single operating structure. It is a constant learning process by trial and error and validation.

[Q] What advice would you give a new examiner wanting to learn more about cell phones?

[A] Vance: There's a lot of training opportunities out there, especially for law enforcement. However, even with the best of trainings, it's absolutely key to get your hands on some devices and try it for yourself.

[Q] How important is continuing education?

[A] Vance: In this field, it's probably the most important thing there is.

[Q] How are you seeing cell phones used in the commission of crimes?

[A] Vance: Depending on the type of case, there's a variety of ways they're being used. However, the biggest pieces of evidence usually trace back to the SMS/MMS messages, stored images, and Call Logs. From drug trafficking, to solicitation, to murder, these always seem to be the biggest key to the case if the evidence exists on the handset.

[Q] Can you talk a little about the general process you follow when conducting an examination?

[A] Vance: The two largest keys are Isolation and Validation. The first step is always to isolate your device from its network and keep it that way until the case is completed. Then using a variety of tools and processes (as there is no “super tool” that works on every device) I will collect the data. After the data are collected, I attempt to validate the data either by using multiple tools, hash values, or even visual validation while checking the data against what the phone is saying.

[Q] What other mobile devices are you seeing brought to the lab? What kind of evidence are you recovering from those?

[A] Vance: The two biggest mobile devices outside of cell phones are iPod Touch devices and Tablets. Seeing as these devices can run the same operating systems as their cell phone counterparts, we can usually pull about the same. In most cases, it's usually chat logs from third-party applications installed on the devices, i.e., Skype, TextNow, Yahoo!, etc.

[Q] From your perspective, what does the future hold for cell phone forensics?

[A] Vance: Hopefully the “dumb-phone” will either die or become assimilated. If the major smartphone operating systems can take over the forefront and standardize the market a little, it will make analysts' and engineers' jobs much easier. It's my opinion that one day we'll talk about mobile device operating systems the same way we mention the “big three” of Mac, Windows, and Linux.

[Q] Can you talk a little about the tools you use?

[A] Vance: I use a lot of tools to get the job done. There's not one tool that will hit every phone every time and pull all the data. It just does not exist. In our lab we use the Cellebrite UFED Physical Pro, AccessData's Mobile Phone Examiner+, Paraben Corporations's Device Seizure, viaForensic's viaExtract, LogicCube's CellDek, Flasher Boxes, and a handful of other niche tools that are used from time to time.

[Q] Do you have a couple of “war stories” you can share?

[A] Vance: There have been a couple of cases I've worked where mobile device evidence has proven to be the smoking gun. Recently, in a murder investigation, there were multiple messages on a phone from the suspect to victim not only informing the victim the suspect was planning on murdering her but even saying when and how the crime would take place.
After the crime, the suspect even used the victim's phone to send out messages to other individuals confessing his guilt. In a solicitation case, we had a single iPod Touch, which we found evidence of not just one crime in the chat logs, but several victims of the same crime all by a single individual. I've even had cases where the individuals will store their entire Child Pornography libraries on the memory in their phones.

[Q] Are there misconceptions you would like to shoot down?

[A] Vance: Mainly what we refer to as the “CSI Effect.” The job is never as fast or as glamorous as the TV shows make it out to be. In many cases, our job is sometimes as much an art as a science. When dealing with mobile devices, the memory that we have to analyze is so small and dynamic that it is much harder for us to recover deleted data in many cases. However, it's not impossible.

[Q] How would you compare and contrast the evidence you're finding on phones to that which is typically found on computers?

[A] Vance: The data actually play hand in hand. There have been many cases where we can see a chat log start on a computer and then carry over to a mobile device. A lot of times we still see the same types of data, mainly communications and user generated media. It is a lot easier to recover deleted information from a computer than it is a cell phone, however.

[Q] How big a role has geolocation data played in your investigations?

[A] Vance: There are so many issues with geolocation data that they haven't played a huge role to date. There have been investigations where we have found images with GPS data embedded to assist the investigators. The GPS “tracking” debates1 of earlier this year were by and large unnecessary. While the GPS data can assist a case, it would take serious validation to make sure that the records you had were exactly what you were looking for. Just because you have geolocation points is not a 100 percent indicator your individual is in that exact point and location.

[Q] Anything else you would like to add?

[A] Vance: Cell Phone or Mobile Forensics is becoming its own specialization within the digital forensics field. I can easily see that this new wave of technology will one day replace our older machines in the same way the “Cloud” threatens to do.

Summary

Our mobile technology allows us to check e-mail, browse the Internet, plot out a road trip, and instantly access other people in our lives. Many people can't remember when or even imagine how they made it through the day without their smartphone. The advent of this technology has created both sources of evidence and challenges for forensic examiners.

In Chapter 10, we covered a wide range of topics on mobile devices, particularly cellular phones and GPS units. Cell networks are comprised of several components including base stations, Mobile Switching Centers, Visitor Location Registers, and others. There are different types of cell networks, each with their own unique characteristics. Code Division Multiple Access (CDMA), Global System for Mobile Communications (GSM), and Integrated Digitally Enhanced Network (iDEN) are the most common.

Like computers, there is more than one operating system used by cell phones. Windows Mobile, iOS, Android, and Symbian were covered in Chapter 10. Cell phones can contain vast amounts of digital evidence including e-mail, call logs, text messages, images, videos, and more.

Records maintained by the carrier can also be valuable during an investigation particularly the Call Detail Records. These records can provide us with dates, times, phone numbers, as well as the originating and terminating towers used during a call. The tower information can help us determine the general vicinity in which the phone has been used.

How cell phone evidence is collected and preserved is critically important. The first priority in dealing with any mobile device is to isolate it from the network. A powered on device that isn't isolated is a major problem. In this state, evidence can be changed, overwritten, or destroyed. Keep in mind that certain cell phones can be wiped remotely by the suspect or the carrier. Isolating a cell phone can be done using a Faraday bag or an arson can. While Subscriber Identity Modules or SIM cards contain data worth examining, it's important to remember that not all phones will have them.

GPS or Global Positioning Systems are in wide use today and function as another source of digital evidence. There are different types of GPS units including simple, smart, hybrid, and connected. Waypoints, trackpoints, and track logs are some of the data recorded by the units that we can use. These artifacts can tell us where the unit has been and where a user intended to go.

REFERENCES

1. Barbara, J. J. (2010, October 17). Understanding the World of Cellular Telephones: Part 1. Retrieved November 13, 2011, from Forensicmag.com: http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-1?page=0,1.

2. Barbara, J. J. (n.d.). SIM Forensics: Part 1. Retrieved September 19, 2011, from: http://www.forensicmag.com/article/sim-forensics-part-1.

3. Barbara, J. J. (n.d.). Sim Forensics: Part 2. Retrieved September 19, 2011, from: http://www.forensicmag.com/article/sim-forensics-part-2.

4. Barbara, J. J. (n.d.). SIM Forensics: Part 3. Retrieved September 18, 2011, from: http://www.forensicmag.com/article/sim-forensics-part-3.

5. Barbara, J. J. (n.d.). Understanding the World of Cellular Telephones: Part 1. Retrieved September 21, 2011, from: http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-1.

6. Barbara, J. J. (n.d.). Understanding the World of Cellular Telephones: Part 2. Retrieved September 21, 2011, from: http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-2.

7. Barbara, J. J. (n.d.). Understanding The World of Cellular Telephones: Part 3. Retrieved September 21, 2011, from: http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-3.

8. BitPim. (n.d.). BitPim. Retrieved September 22, 2011, from: http://www.bitpim.org/.

9. Brian, M., & Harris, T. (n.d.). How GPS Receivers Work. Retrieved September 14, 2011, from: http://electronics.howstuffworks.com/gadgets/travel/gps.htm.

10. Casey E. Handbook of Digital Forensics and Investigation Burlington, MA: Academic Press; 2009.

11. Casey E. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet Waltham, MA: Academic Press; 2011.

12. Hartenstein, M., & Sheridan, M. (2010, December 21). Missing Vegas Showgirl Debbie Flores-Narvaez was Pregnant, Beaten by her ex, According to Police. Retrieved September 25, 2011, from: http://articles.nydailynews.com/2010-12-21/news/27085062_1_license-plates-cell-phone-police.

13. Hoog, A. (2010, April 30). An Introduction to Android Forensics. Retrieved September 2011, 2011, from: http://www.dfinews.com/article/introduction-android-forensics?page=0,0.

14. Hoog A. Android forensics: Investigation, Analysis and Mobile Security for Google Android Waltham, MA: Elsevier; 2011.

15. Jansen W, Ayers R. Guidelines on Cell Phone Forensics Gaithersburg, TN: National Institute of Standards and Technology; 2007.

16. Kessler, G. C. (2011, June). Cell Phone Analysis: Technology, Tools, and Processes. Retrieved September 12, 2011, from: http://www.garykessler.net/presentations/CellPhone_201106_ICAC-sanitized.pdf.

17. LeMere, B. (n.d.). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from: http://www.forensicmag.com/article/enhancing-investigations-gps-evidence.

18. LeMere, B. (2011, April 25). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from: http://www.forensicmag.com/article/enhancing-investigations-gps-evidence.

19. Mobile-phone-directory.org. (n.d.). Predictive Text Input. Retrieved September 17, 2011, from: http://www.mobile-phone-directory.org/Glossary/P/Predictive_Text_Input.html.

20. Morrissey S. iOS forensic analysis: for iPhone, iPad, and iPod Touch New York: Apress; 2010.

21. Open Handset Alliance. (2007, November). FAQ. Retrieved September 19, 2011, from: http://www.openhandsetalliance.com/oha_faq.html.

22. Shachtman, N. (2006, May 3). Fighting Crime With Cellphones’ Clues. Retrieved September 19, 2011, from: http://www.nytimes.com/2006/05/03/technology/techspecial3/03cops.html.

1 Researchers discovered that the iPhone or 3G iPad—anything with 3G data access—are logging location data to a file called consolidated.db with latitude and longitude coordinates and a timestamp.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.133.160