SlideShare a Scribd company logo
CHAPTER 13
CELL PHONE AND
MOBILE DEVICES
FORENSICS
2
OBJECTIVES
 Explain the basic concepts of mobile device forensics
 Describe procedures for acquiring data from cell phones and
mobile devices
03/17/25 CH.VijayaBhaskar,SNIST
3
UNDERSTANDING MOBILE DEVICE
FORENSICS
 People store a wealth of information on cell phones
… People don’t think about securing their cell phones
 Items stored on cell phones:
… Incoming, outgoing, and missed calls
… Text and Short Message Service (SMS) messages
… E-mail
… Instant-messaging (IM) logs
… Web pages
… Pictures
03/17/25 CH.VijayaBhaskar,SNIST
4
UNDERSTANDING MOBILE DEVICE
FORENSICS (CONTINUED)
 Items stored on cell phones: (continued)
… Personal calendars
… Address books
… Music files
… Voice recordings
 Investigating cell phones and mobile devices is one of the most
challenging tasks in digital forensics
03/17/25 CH.VijayaBhaskar,SNIST
5
MOBILE PHONE BASICS
 Mobile phone technology has advanced rapidly
 Three generations of mobile phones:
… Analog
… Digital personal communications service (PCS)
… Third-generation (3G)
 3G offers increased bandwidth
 Several digital networks are used in the mobile phone industry
03/17/25 CH.VijayaBhaskar,SNIST
6
MOBILE PHONE BASICS
(CONTINUED)
03/17/25 CH.VijayaBhaskar,SNIST
7
 Main components used for communication:
… Base transceiver station (BTS)
… Base station controller (BSC)
… Mobile switching center (MSC)
MOBILE PHONE BASICS
(CONTINUED)
03/17/25 CH.VijayaBhaskar,SNIST
8
INSIDE MOBILE DEVICES
 Mobile devices can range from simple phones to small
computers
… Also called smart phones
 Hardware components
… Microprocessor, ROM, RAM, a digital signal processor, a radio
module, a microphone and speaker, hardware interfaces, and an
LCD display
 Most basic phones have a proprietary OS
… Although smart phones use the same OSs as PCs
03/17/25 CH.VijayaBhaskar,SNIST
9
INSIDE MOBILE DEVICES
(CONTINUED)
 Phones store system data in electronically erasable
programmable read-only memory (EEPROM)
… Enables service providers to reprogram phones without having to
physically access memory chips
 OS is stored in ROM
… Nonvolatile memory
03/17/25 CH.VijayaBhaskar,SNIST
10
INSIDE MOBILE DEVICES
(CONTINUED)
 Subscriber identity module (SIM) cards
… Found most commonly in GSM devices
… Microprocessor and from 16 KB to 4 MB EEPROM
… GSM refers to mobile phones as “mobile stations” and divides a
station into two parts:
 The SIM card and the mobile equipment (ME)
… SIM cards come in two sizes
… Portability of information makes SIM cards versatile
03/17/25 CH.VijayaBhaskar,SNIST
11
INSIDE MOBILE DEVICES
(CONTINUED)
 Subscriber identity module (SIM) cards (continued)
… Additional SIM card purposes:
 Identifies the subscriber to the network
 Stores personal information
 Stores address books and messages
 Stores service-related information
03/17/25 CH.VijayaBhaskar,SNIST
12
INSIDE PDAS
 Personal digital assistants (PDAs)
… Can be separate devices from mobile phones
… Most users carry them instead of a laptop
 PDAs house a microprocessor, flash ROM, RAM, and various
hardware components
 The amount of information on a PDA varies depending on the
model
 Usually, you can retrieve a user’s calendar, address book, Web
access, and other items
03/17/25 CH.VijayaBhaskar,SNIST
13
INSIDE PDAS (CONTINUED)
 Peripheral memory cards are used with PDAs
… Compact Flash (CF)
… MultiMedia Card (MMC)
… Secure Digital (SD)
 Most PDAs synchronize with a computer
… Built-in slots for that purpose
03/17/25 CH.VijayaBhaskar,SNIST
14
UNDERSTANDING ACQUISITION
PROCEDURES FOR CELL PHONES
AND MOBILE DEVICES
 The main concerns with mobile devices are loss of power and
synchronization with PCs
 All mobile devices have volatile memory
… Making sure they don’t lose power before you can retrieve RAM
data is critical
 Mobile device attached to a PC via a cable or cradle/docking
station should be disconnected from the PC immediately
 Depending on the warrant or subpoena, the time of seizure
might be relevant
03/17/25 CH.VijayaBhaskar,SNIST
15
UNDERSTANDING ACQUISITION
PROCEDURES FOR CELL PHONES
AND MOBILE DEVICES
(CONTINUED)
 Messages might be received on the mobile device after seizure
 Isolate the device from incoming signals with one of the
following options:
… Place the device in a paint can
… Use the Paraben Wireless StrongHold Bag
… Use eight layers of antistatic bags to block the signal
 The drawback to using these isolating options is that the
mobile device is put into roaming mode
… Which accelerates battery drainage
03/17/25 CH.VijayaBhaskar,SNIST
16
UNDERSTANDING ACQUISITION
PROCEDURES FOR CELL PHONES
AND MOBILE DEVICES
(CONTINUED)
 Check these areas in the forensics lab :
… Internal memory
… SIM card
… Removable or external memory cards
… System server
 Checking system servers requires a search warrant or
subpoena
 SIM card file system is a hierarchical structure
03/17/25 CH.VijayaBhaskar,SNIST
17
UNDERSTANDING ACQUISITION
PROCEDURES FOR CELL PHONES
AND MOBILE DEVICES
(CONTINUED)
03/17/25 CH.VijayaBhaskar,SNIST
18
UNDERSTANDING ACQUISITION
PROCEDURES FOR CELL PHONES
AND MOBILE DEVICES
(CONTINUED)
 Information that can be retrieved:
… Service-related data, such as identifiers for the SIM card and the
subscriber
… Call data, such as numbers dialed
… Message information
… Location information
 If power has been lost, PINs or other access codes might be
required to view files
03/17/25 CH.VijayaBhaskar,SNIST
19
MOBILE FORENSICS EQUIPMENT
 Mobile forensics is a new science
 Biggest challenge is dealing with constantly changing models of
cell phones
 When you’re acquiring evidence, generally you’re performing
two tasks:
… Acting as though you’re a PC synchronizing with the device (to
download data)
… Reading the SIM card
 First step is to identify the mobile device
03/17/25 CH.VijayaBhaskar,SNIST
20
MOBILE FORENSICS EQUIPMENT
(CONTINUED)
 Make sure you have installed the mobile device software on
your forensic workstation
 Attach the phone to its power supply and connect the correct
cables
 After you’ve connected the device
… Start the forensics program and begin downloading the available
information
03/17/25 CH.VijayaBhaskar,SNIST
21
MOBILE FORENSICS EQUIPMENT
(CONTINUED)
 SIM card readers
… A combination hardware/software device used to access the SIM
card
… You need to be in a forensics lab equipped with appropriate
antistatic devices
… General procedure is as follows:
 Remove the back panel of the device
 Remove the battery
 Under the battery, remove the SIM card from holder
 Insert the SIM card into the card reader
03/17/25 CH.VijayaBhaskar,SNIST
22
MOBILE FORENSICS EQUIPMENT
(CONTINUED)
 SIM card readers (continued)
… A variety of SIM card readers are on the market
 Some are forensically sound and some are not
… Documenting messages that haven’t been read yet is critical
 Use a tool that takes pictures of each screen
 Mobile forensics tools
… Paraben Software Device Seizure Toolbox
… BitPim
03/17/25 CH.VijayaBhaskar,SNIST
23
MOBILE FORENSICS EQUIPMENT
(CONTINUED)
 Mobile forensics tools (continued)
… MOBILedit!
… SIMCon
 Software tools differ in the items they display and the level of
detail
03/17/25 CH.VijayaBhaskar,SNIST
24
03/17/25 CH.VijayaBhaskar,SNIST
25
03/17/25 CH.VijayaBhaskar,SNIST
26
MOBILE FORENSICS EQUIPMENT
(CONTINUED)
03/17/25 CH.VijayaBhaskar,SNIST
27
SUMMARY
 People store a wealth of information on their cell phones
 Three generations of mobile phones: analog, digital personal
communications service (PCS), and third-generation (3G)
 Mobile devices range from basic, inexpensive phones used
primarily for phone calls to smart phones
03/17/25 CH.VijayaBhaskar,SNIST
28
SUMMARY (CONTINUED)
 Data can be retrieved from several different places in phones
 Personal digital assistants (PDAs) are still in widespread use
and often contain a lot of personal information
 As with computers, proper search and seizure procedures must
be followed for mobile devices
03/17/25 CH.VijayaBhaskar,SNIST
29
SUMMARY (CONTINUED)
 To isolate a mobile device from incoming messages, you can
place it in a specially treated paint can, a wave-blocking
wireless evidence bag, or eight layers of antistatic bags
 SIM cards store data in a hierarchical file structure
 Many software tools are available for reading data stored in
mobile devices
03/17/25 CH.VijayaBhaskar,SNIST

More Related Content

PPTX
Mobile Forensics
PPTX
811719104102_Tamilmannavan S.pptx
PPT
Cell Phone and Mobile Devices Forensics.ppt
PPTX
Mobile Phone Seizure Guide by Raghu Khimani
PPT
presentation on samsung
PPTX
Mobile Forensics
PPT
Computer and Mobile Forensic Analysis
Mobile Forensics
811719104102_Tamilmannavan S.pptx
Cell Phone and Mobile Devices Forensics.ppt
Mobile Phone Seizure Guide by Raghu Khimani
presentation on samsung
Mobile Forensics
Computer and Mobile Forensic Analysis

Similar to Cell Phone and Mobile Devices Forensics.ppt (20)

DOC
Zl embd029 arm and rfid based event management monitoring system
PPT
GSM Introduction
PDF
smartcard-121018150432-phpapp01.pdf
PDF
Introduction to SIM and USIM
PPTX
COMPUTER FORENSICS.pptx
PPT
NFC Basic Concepts
PDF
Cell Phone and Mobile Devices Forensics
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
PDF
Gsm Switching Services And Protocols Second Edition Jorg Eberspacher
PPT
Smartcard
PPT
Smart cards
PDF
IRJET- Cell Phone for Visually Impaired People
PDF
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
PPT
Architecture and Development of NFC Applications
PDF
(Ab)using Smart Cities - Whitepaper
PDF
Third Generation Automatic Teller Machine
Zl embd029 arm and rfid based event management monitoring system
GSM Introduction
smartcard-121018150432-phpapp01.pdf
Introduction to SIM and USIM
COMPUTER FORENSICS.pptx
NFC Basic Concepts
Cell Phone and Mobile Devices Forensics
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Gsm Switching Services And Protocols Second Edition Jorg Eberspacher
Smartcard
Smart cards
IRJET- Cell Phone for Visually Impaired People
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
Architecture and Development of NFC Applications
(Ab)using Smart Cities - Whitepaper
Third Generation Automatic Teller Machine
Ad

More from ChSamson2 (8)

PPT
Current Computer Forensics Tools in Cyber forensics.ppt
PPT
E-mail Investigations in computer forensics.ppt
PPT
Working with Windows and DOS Systems.ppt
PPT
PIPES in Unix programming in computer science and engineering.PPT
PPT
files-inodes in Unix programming in computer science and engineering.ppt
PPT
Computer_ Forensics_ Evidence& Capturing.ppt
PDF
Computer networks Application Layer basics
PPT
Fundamental concepts of ComputersNetworks.ppt
Current Computer Forensics Tools in Cyber forensics.ppt
E-mail Investigations in computer forensics.ppt
Working with Windows and DOS Systems.ppt
PIPES in Unix programming in computer science and engineering.PPT
files-inodes in Unix programming in computer science and engineering.ppt
Computer_ Forensics_ Evidence& Capturing.ppt
Computer networks Application Layer basics
Fundamental concepts of ComputersNetworks.ppt
Ad

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
composite construction of structures.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT 4 Total Quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
Mechanical Engineering MATERIALS Selection
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Internet of Things (IOT) - A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Lecture Notes Electrical Wiring System Components
composite construction of structures.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Foundation to blockchain - A guide to Blockchain Tech
UNIT 4 Total Quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
Mechanical Engineering MATERIALS Selection
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CYBER-CRIMES AND SECURITY A guide to understanding
Digital Logic Computer Design lecture notes
Automation-in-Manufacturing-Chapter-Introduction.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx

Cell Phone and Mobile Devices Forensics.ppt

  • 1. CHAPTER 13 CELL PHONE AND MOBILE DEVICES FORENSICS
  • 2. 2 OBJECTIVES  Explain the basic concepts of mobile device forensics  Describe procedures for acquiring data from cell phones and mobile devices 03/17/25 CH.VijayaBhaskar,SNIST
  • 3. 3 UNDERSTANDING MOBILE DEVICE FORENSICS  People store a wealth of information on cell phones … People don’t think about securing their cell phones  Items stored on cell phones: … Incoming, outgoing, and missed calls … Text and Short Message Service (SMS) messages … E-mail … Instant-messaging (IM) logs … Web pages … Pictures 03/17/25 CH.VijayaBhaskar,SNIST
  • 4. 4 UNDERSTANDING MOBILE DEVICE FORENSICS (CONTINUED)  Items stored on cell phones: (continued) … Personal calendars … Address books … Music files … Voice recordings  Investigating cell phones and mobile devices is one of the most challenging tasks in digital forensics 03/17/25 CH.VijayaBhaskar,SNIST
  • 5. 5 MOBILE PHONE BASICS  Mobile phone technology has advanced rapidly  Three generations of mobile phones: … Analog … Digital personal communications service (PCS) … Third-generation (3G)  3G offers increased bandwidth  Several digital networks are used in the mobile phone industry 03/17/25 CH.VijayaBhaskar,SNIST
  • 7. 7  Main components used for communication: … Base transceiver station (BTS) … Base station controller (BSC) … Mobile switching center (MSC) MOBILE PHONE BASICS (CONTINUED) 03/17/25 CH.VijayaBhaskar,SNIST
  • 8. 8 INSIDE MOBILE DEVICES  Mobile devices can range from simple phones to small computers … Also called smart phones  Hardware components … Microprocessor, ROM, RAM, a digital signal processor, a radio module, a microphone and speaker, hardware interfaces, and an LCD display  Most basic phones have a proprietary OS … Although smart phones use the same OSs as PCs 03/17/25 CH.VijayaBhaskar,SNIST
  • 9. 9 INSIDE MOBILE DEVICES (CONTINUED)  Phones store system data in electronically erasable programmable read-only memory (EEPROM) … Enables service providers to reprogram phones without having to physically access memory chips  OS is stored in ROM … Nonvolatile memory 03/17/25 CH.VijayaBhaskar,SNIST
  • 10. 10 INSIDE MOBILE DEVICES (CONTINUED)  Subscriber identity module (SIM) cards … Found most commonly in GSM devices … Microprocessor and from 16 KB to 4 MB EEPROM … GSM refers to mobile phones as “mobile stations” and divides a station into two parts:  The SIM card and the mobile equipment (ME) … SIM cards come in two sizes … Portability of information makes SIM cards versatile 03/17/25 CH.VijayaBhaskar,SNIST
  • 11. 11 INSIDE MOBILE DEVICES (CONTINUED)  Subscriber identity module (SIM) cards (continued) … Additional SIM card purposes:  Identifies the subscriber to the network  Stores personal information  Stores address books and messages  Stores service-related information 03/17/25 CH.VijayaBhaskar,SNIST
  • 12. 12 INSIDE PDAS  Personal digital assistants (PDAs) … Can be separate devices from mobile phones … Most users carry them instead of a laptop  PDAs house a microprocessor, flash ROM, RAM, and various hardware components  The amount of information on a PDA varies depending on the model  Usually, you can retrieve a user’s calendar, address book, Web access, and other items 03/17/25 CH.VijayaBhaskar,SNIST
  • 13. 13 INSIDE PDAS (CONTINUED)  Peripheral memory cards are used with PDAs … Compact Flash (CF) … MultiMedia Card (MMC) … Secure Digital (SD)  Most PDAs synchronize with a computer … Built-in slots for that purpose 03/17/25 CH.VijayaBhaskar,SNIST
  • 14. 14 UNDERSTANDING ACQUISITION PROCEDURES FOR CELL PHONES AND MOBILE DEVICES  The main concerns with mobile devices are loss of power and synchronization with PCs  All mobile devices have volatile memory … Making sure they don’t lose power before you can retrieve RAM data is critical  Mobile device attached to a PC via a cable or cradle/docking station should be disconnected from the PC immediately  Depending on the warrant or subpoena, the time of seizure might be relevant 03/17/25 CH.VijayaBhaskar,SNIST
  • 15. 15 UNDERSTANDING ACQUISITION PROCEDURES FOR CELL PHONES AND MOBILE DEVICES (CONTINUED)  Messages might be received on the mobile device after seizure  Isolate the device from incoming signals with one of the following options: … Place the device in a paint can … Use the Paraben Wireless StrongHold Bag … Use eight layers of antistatic bags to block the signal  The drawback to using these isolating options is that the mobile device is put into roaming mode … Which accelerates battery drainage 03/17/25 CH.VijayaBhaskar,SNIST
  • 16. 16 UNDERSTANDING ACQUISITION PROCEDURES FOR CELL PHONES AND MOBILE DEVICES (CONTINUED)  Check these areas in the forensics lab : … Internal memory … SIM card … Removable or external memory cards … System server  Checking system servers requires a search warrant or subpoena  SIM card file system is a hierarchical structure 03/17/25 CH.VijayaBhaskar,SNIST
  • 17. 17 UNDERSTANDING ACQUISITION PROCEDURES FOR CELL PHONES AND MOBILE DEVICES (CONTINUED) 03/17/25 CH.VijayaBhaskar,SNIST
  • 18. 18 UNDERSTANDING ACQUISITION PROCEDURES FOR CELL PHONES AND MOBILE DEVICES (CONTINUED)  Information that can be retrieved: … Service-related data, such as identifiers for the SIM card and the subscriber … Call data, such as numbers dialed … Message information … Location information  If power has been lost, PINs or other access codes might be required to view files 03/17/25 CH.VijayaBhaskar,SNIST
  • 19. 19 MOBILE FORENSICS EQUIPMENT  Mobile forensics is a new science  Biggest challenge is dealing with constantly changing models of cell phones  When you’re acquiring evidence, generally you’re performing two tasks: … Acting as though you’re a PC synchronizing with the device (to download data) … Reading the SIM card  First step is to identify the mobile device 03/17/25 CH.VijayaBhaskar,SNIST
  • 20. 20 MOBILE FORENSICS EQUIPMENT (CONTINUED)  Make sure you have installed the mobile device software on your forensic workstation  Attach the phone to its power supply and connect the correct cables  After you’ve connected the device … Start the forensics program and begin downloading the available information 03/17/25 CH.VijayaBhaskar,SNIST
  • 21. 21 MOBILE FORENSICS EQUIPMENT (CONTINUED)  SIM card readers … A combination hardware/software device used to access the SIM card … You need to be in a forensics lab equipped with appropriate antistatic devices … General procedure is as follows:  Remove the back panel of the device  Remove the battery  Under the battery, remove the SIM card from holder  Insert the SIM card into the card reader 03/17/25 CH.VijayaBhaskar,SNIST
  • 22. 22 MOBILE FORENSICS EQUIPMENT (CONTINUED)  SIM card readers (continued) … A variety of SIM card readers are on the market  Some are forensically sound and some are not … Documenting messages that haven’t been read yet is critical  Use a tool that takes pictures of each screen  Mobile forensics tools … Paraben Software Device Seizure Toolbox … BitPim 03/17/25 CH.VijayaBhaskar,SNIST
  • 23. 23 MOBILE FORENSICS EQUIPMENT (CONTINUED)  Mobile forensics tools (continued) … MOBILedit! … SIMCon  Software tools differ in the items they display and the level of detail 03/17/25 CH.VijayaBhaskar,SNIST
  • 27. 27 SUMMARY  People store a wealth of information on their cell phones  Three generations of mobile phones: analog, digital personal communications service (PCS), and third-generation (3G)  Mobile devices range from basic, inexpensive phones used primarily for phone calls to smart phones 03/17/25 CH.VijayaBhaskar,SNIST
  • 28. 28 SUMMARY (CONTINUED)  Data can be retrieved from several different places in phones  Personal digital assistants (PDAs) are still in widespread use and often contain a lot of personal information  As with computers, proper search and seizure procedures must be followed for mobile devices 03/17/25 CH.VijayaBhaskar,SNIST
  • 29. 29 SUMMARY (CONTINUED)  To isolate a mobile device from incoming messages, you can place it in a specially treated paint can, a wave-blocking wireless evidence bag, or eight layers of antistatic bags  SIM cards store data in a hierarchical file structure  Many software tools are available for reading data stored in mobile devices 03/17/25 CH.VijayaBhaskar,SNIST