Investigations, Practices and Procedures: Seizure-Forensic Examination-Evidence. Cellular and Satellite Telephones, Call Records-Billing Data, Cell Site Analysis. Telecomms. Computer and Network Analysis. GPS devices & Jammers, Cyber, IoT forensics.
Sunday, April 24, 2011
Faraday containers found unsafe
A report that focuses on the results, following conducted practical tests, on the reliability of mobile phone shielding devices (eg 'faraday' containers) found the device shielding failed in a number of instances that the author of the report placed under test and did not prevent RF signalling reaching the test mobile phones inside the containers, the findings in this recently published paper suggests:
https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2010-27.pdf
The implications might require that an 'impact assessment' on evidence that is seized and placed in shielding devices at the scene of a crime and transported from Police Station to Police Station etc may need to be 'reconducted'. The findings in the report raise the notion whether published Guidelines advocating the use of shielding devices may now need to identify exactly the tests and research considered prior to adopting published policy on the use of shielding devices, although it is unclear at present whether that will happen at all.
Whilst the report dealt primarily with external factors (radio communications) and how the shielding devices coped with them, it also includes some other influences shielding devices can have on touch screen mobile phones, for example.
There have previously been mixed reviews about shielding devices and their impact on seized evidence that is left switched ON within shielding containers:
http://www.forensicfocus.com/index.php?name=Forums&file=viewtopic&t=3914
http://www.forensicfocus.com/index.php?name=Forums&file=viewtopic&t=4277&postdays=0&postorder=asc&start=0
If a mobile phone is already OFF, or is switched OFF at the point of seizure, then such shielding devices shouldn't be necessary at that particular juncture.
Friday, July 31, 2009
Cellphone Examination and Myths
Sunday, March 09, 2008
Writing To Mobile Phones Under Examination
Writing To Mobile Phones Under Examination
There is always the debate as to what amounts to "forensic" processes and whether that can be left to human intervention to do that, whether a device alone can do that or whether it is the combination of human intervention and the device working together that can fulfil the objective? Perhaps germane and relevant to the above question is (1) knowing the potential of each to write to a mobile telephone should be understood first? (2) Whether, as a consequence of using the process, what data are or might be altered/lost? (3) To then decide whether "forensic" is an appropriate and applicable statement to label the process in the first place?
The discussion below starts to address Point 1. When examining mobile telephones there are at least five separate categories under which an examiner can or may write to a mobile telephone due to automated processes (indirect intervention) and/or direct human intervention. The categories and their contents below are not exhaustive, but have been used to illustrate some elements involved with Point 1.
A) Standard powering ON (direct human intervention) a mobile telephone can invoke automated processes (indirect intervention):
SENDING frametype 0x00/length 0x08/8
41A54T2B+43C47G4DM49I0D AT+CGMI.
1 "AT+CGMI"
2 "Sony Ericsson"
3 "OK"
RECEIVED frametype 0x00/length 0x1F/31
41A54T2B+43C47G4DM49I0D 0D 0A 53S6Fo6En79y2045
AT+CGMI...Sony E
72r69i63c73s73s6Fo6En0D 0A 0D 0A 4FO4BK0D 0A
ricsson....OK..
Manufacturer info received
Sony Ericsson [Manufacturer: Sony Ericsson]
SENDING frametype 0x00/length 0x09/9
41A54T2B+43C53S43C53S3F?0D
AT+CSCS?.
1 "AT+CSCS?"
2 "+CSCS:
"GSM""
3 "OK"
SENDING frametype 0x00/length 0x0A/
10 41A54T2B+43C53S43C53S3D=3F?0D
AT+CSCS=?.
1 "AT+CSCS=?"
2 "+CSCS: ("GSM","IRA","8859-1","UTF-8","UCS2")"
3 "OK"
RECEIVED frametype 0x00/length 0x40/64
41A54T2B+43C53S43C53S3D=3F?0D 0D 0A
2B+43C53S43
AT+CSCS=?...+CSC
53S3A:20 28
(22"47G53S4DM22"2C,22"49I52R41A22"2C S:
("GSM","IRA",
22"3883883553992D-31122"2C,22"55U54T46F2D-38822
"8859-1","UTF-8"
2C,22"55U43C53S32222"29)0D 0A 0D 0A 4FO4BK0D 0A ,
"UCS2")....OK..
E) Examiners using devices to select (direct human intervention) specific data can cause the operating system of a mobile telephone to handle data in a particular way (indirect intervention):
-some smart phones write to files in order to keep track of data and in some instances shift data around to accommodate the "fetch" request for certain data
Essentially the categories and content illustrated above merely sets the stage to highlight what an examiner faces when seeking to conduct data aquisition from a mobile telephone. Plug and play (PnP) devices cannot be used in isolation, that they need supervision (direct human intervention). Direct human intervention, with ot without a device, can have consequences too. Furthermore the mobile telephone under examination can as a consequence react to direct human intervention, as well as indirect intervention.