Download
introduction to handheld digital forensics n.
Skip this Video
Loading SlideShow in 5 Seconds..
Introduction to Handheld Digital Forensics PowerPoint Presentation
Download Presentation
Introduction to Handheld Digital Forensics

Introduction to Handheld Digital Forensics

94 Views Download Presentation
Download Presentation

Introduction to Handheld Digital Forensics

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Introduction to Handheld Digital Forensics Created by DM Kaputa Ph.D.

  2. New Certificate Fall 2009 • Computer Security & Investigations/Digital Forensics • Developed under the auspices of National Science Foundation/Advanced technological Education Grant # 802062 • Faculty members: Kaputa, Kuroski, Kowalski, Palombo & Gill

  3. Some high-profile forensics cases • These cases probably would not have been solved, if not for the digital forensics investigations.

  4. Police give J. Rodemeyer’s cell phone to RCFL

  5. M. Jackson’s doc’s phone

  6. What is Handheld forensics? • Computer Forensics: • storage device requiring file system, device is “static”, • larger storage capacity (although this is changing) • Forensic:bit stream imaging • Handheld Forensics: • embedded systems, device is “active”, • smaller on board capacity (16 G) • Forensic: active memory imaging

  7. Forensic Rules for PDA seizure • disconnect wireless connectivity • Keep power • Cables…gather • Unit is always changing, RAM main storage for files & apps acquire in lab • Fundamentals of forensic grade software • PDA OS: WinCE, RIM (Blackberry), Palm OS, embedded Linux, Symbian

  8. Forensic rules for cell phone seizure • 1. disconnect wireless communication • 2. keep power or may need psswd • 3.gather cables & accessories • 4. acquire in lab • 5. use forensic grade software

  9. HYBRIDS (combination of both) although most cell phones now are hybrids & beyond!!!!) ) • Windows pocket PC • I-phone • Googlephone • Linux • Blackberry • Most contain PDAs, GPS & camera, MP3 player

  10. Quick Time Line • 1960s Bell labs develops electronics for cell phone technology • 1978 AMPS ..advanced mobile phone system debuts 1st commercial cellular network in Chicago • 1988 Cellular Technology Industry Assoc. created • 1991 TDMA also first GSM phone in Finland • 2001 Bell South leaves payphone business

  11. Major Access Technologies for cell phones • AMPS…Advanced mobile phone service 1 G systems FDMA … analog standard • Frequency division multiple access • ****************************************** • DIGITAL CELLULAR NETWORKS • 1.TDMA time division multiple access (digital link technology) • Different time slot for each channel (6 slots) • 2 G SYSTEMS • 2. GSM Global Systems Mobile 1991 (replacing TDMA to 3 G)

  12. GSM continued • Used TDMA air interface…8 time slots • Uses SIM card. removable thumb sized card, identifies user to network & stores information • 82% of the world’s phones available in over 168 countries • Next generation (UMTS) (universal mobile) enhancing GSM with CDMA air interface • AT & T service (Cingular,T-mobile)

  13. Other common cellular networks • 3.Also IDEN network designed by Motorola • 4.And a digital version of original analog called D-AMPS digital advanced mobile phone service

  14. CDMA developed about 1989 by Qualcomm • Code Division Multiple Access • Spread spectrum technology • Spreads digitized data over the entire bandwidth • 3 G SYSTEM • Always on data access • High data speeds • Live streaming video • Verizon & Sprint

  15. 4 G SYSTEM • 4 G systems • 100 Mbits while moving • 1 G while still • High quality audio/video

  16. Intro to Cell Phone Forensics • Very popular devices today under GSM SIM & mobile equipment (ME) • CDMA phones (Verizon & Sprint) historically no SIM although RUIMs are gaining in popularity (removable user identity modules)

  17. Introduction to SIM Card • What is SIM Card? • Subscriber Identity Module which • authenticates device to network • Stores names and phone numbers • Sends and Receives text messages • Stores network configuration info (IMSI)

  18. SIM disadavantage • Unless SIM card lock is enabled…can steal SIM and rack up charges against you !!!

  19. SIM Card continued • Useful for quick transfer of numbers and info from one phone to another

  20. SIM advantages • Portability is main advantage • SIM can be swapped out to new phone • Stores contact info

  21. What exactly is on SIM card? • Simple phone book • Last 10 outgoing numbers • SMS messages (short message system) aka text messages • IMSI

  22. Paraben’s SIM Card Seizure • Last 10 outgoing phone numbers…….

  23. Cell phone forensics…last 10 outgoing numbers

  24. Components continued • Outgoing SMS text messages

  25. SMS outgoing text messages

  26. Components continued • Incoming SMS text messages

  27. Delivered (to you) text messages

  28. Components continued • IMSI….this is a network configuration number • International Mobile Subscriber Identity • OR • IMEI number • International Mobile Equipment Identity

  29. Conclusions…forensically speaking • Can track deleted SMS……by analysis of unallocated space • Be cogniscent of what you send out in text messages…..!!!! • They could come back to haunt you.

  30. Some Hand Held Forensic Toolkits • MOBILedit! Software Highly rated by NIST • BitPim Software CDMA open source • Device Manager, proprietary software by Paraben • Cellebrite Hardware used by LE • Next slide : Using Device Manager to attempt an acquisition of a cell phone

  31. Mobile Malware or who said mobiles don’t have malware? • Phoenix • Facebook mobile • DroidDream • Plankton • Zitmo • Golddream A

  32. 1st Case Mobile malware • 2004 first mobile malware • By 2010…250% increase • 2011 Botnet enabled malware for Androids • From June 2010 to Jan 2011 Android malware increased by 400%

  33. What does it do? • Disables phone • Remotely controls phone….can record phone conversations & store to phone’s SD card..can then upload to server controlled by hacker (drops a configuration file) • Steals valuable data

  34. 2011 iPad users hacked • Hackers pleads guilty to stealing data from 100,000 iPad users • Fake version of “Angry Birds” apps sent sensitive info about user to hacker to gain access to phone

  35. What can we do? • Do NOT access banking sites over public Wi Fi connections • Do NOT leave “Wi Fi ad-hoc mode” on • Don’t download apps from 3rd party app repository !!! • Check permissions of every app you download • Run it through secure app that will scan it from market to device…….

  36. Scanning for apps • Norton • Lookout • Bitdefender • NetQin • Also scan Facebook and Twitter!!!!