Introduction |
|
xv | |
Chapter 1 Introduction to the World of Mobile Device Forensics |
|
1 | (24) |
|
A Brief History of the Mobile Device |
|
|
3 | (3) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Mobile Device Data: The Relevance Today |
|
|
6 | (2) |
|
Mobile Devices in the Media |
|
|
7 | (1) |
|
The Overuse of the Word "Forensic" |
|
|
8 | (2) |
|
Write Blockers and Mobile Devices |
|
|
8 | (2) |
|
Mobile Device Technology and Mobile Forensics |
|
|
10 | (2) |
|
From Data Transfer to Data Forensics |
|
|
10 | (1) |
|
|
11 | (1) |
|
Examination Awareness and Progression |
|
|
12 | (2) |
|
|
14 | (7) |
|
Mobile Technology Acronyms |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
21 | (2) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Preparing for Your Journey |
|
|
23 | (1) |
|
|
23 | (2) |
Chapter 2 Mobile Devices vs. Computer Devices in the World of Forensics |
|
25 | (20) |
|
Computer Forensics Defined |
|
|
26 | (1) |
|
International Association of Computer Investigative Specialists (IACIS) |
|
|
26 | (1) |
|
International Society of Forensic Computer Examiners (ISFCE) |
|
|
27 | (1) |
|
Applying Forensic Processes and Procedures |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Approach to Mobile Device Forensics |
|
|
28 | (7) |
|
NIST and Mobile Forensics |
|
|
33 | (1) |
|
|
34 | (1) |
|
Standard Operating Procedure Document |
|
|
35 | (4) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Successful SOP Creation and Execution |
|
|
38 | (1) |
|
|
39 | (1) |
|
Specialty Mobile Forensic Units |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (2) |
|
Seasoned Computer Forensics Examiners' Misconceptions |
|
|
41 | (1) |
|
First Responders' Misconceptions |
|
|
42 | (1) |
|
|
43 | (2) |
Chapter 3 Collecting Mobile Devices, USB Drives, and Storage Media at the Scene |
|
45 | (20) |
|
|
45 | (3) |
|
|
47 | (1) |
|
|
48 | (6) |
|
The Supreme Court and Mobile Device Data Seizure |
|
|
48 | (1) |
|
|
49 | (2) |
|
Location to Be Searched: Physical Location |
|
|
51 | (1) |
|
Location to Be Searched: Mobile Device |
|
|
52 | (2) |
|
|
54 | (3) |
|
Data Volatility at the Scene |
|
|
54 | (1) |
|
Asking the Right Questions |
|
|
55 | (2) |
|
Examining the Scene for Evidence |
|
|
57 | (2) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Once You Find It, What's Next? |
|
|
59 | (2) |
|
|
60 | (1) |
|
Data Collection: Where and When |
|
|
61 | (1) |
|
|
62 | (3) |
Chapter 4 Preparing, Protecting, and Seizing Digital Device Evidence |
|
65 | (26) |
|
Before Seizure: Understanding Mobile Device Communication |
|
|
65 | (6) |
|
|
66 | (3) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
Understanding Mobile Device Security |
|
|
71 | (6) |
|
|
72 | (3) |
|
|
75 | (2) |
|
Windows Mobile and Windows Phone |
|
|
77 | (1) |
|
|
77 | (1) |
|
Photographing the Evidence at the Scene |
|
|
77 | (1) |
|
Tagging and Marking Evidence |
|
|
78 | (2) |
|
Documentating the Evidence at the Scene |
|
|
80 | (2) |
|
|
80 | (1) |
|
Mobile Device Accessories |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
Dealing with Power Issues: The Device State |
|
|
82 | (3) |
|
Bagging Sensitive Evidence |
|
|
85 | (2) |
|
Types of Bagging Equipment |
|
|
85 | (1) |
|
Properly Bagging Mobile Device Evidence |
|
|
86 | (1) |
|
Transporting Mobile Device Evidence |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Establishing Chain of Custody |
|
|
88 | (1) |
|
|
89 | (2) |
Chapter 5 Toolbox Forensics: Multiple-Tool Approach |
|
91 | (28) |
|
|
92 | (20) |
|
Analyzing Several Devices Collectively |
|
|
94 | (3) |
|
Verifying and Validating Software |
|
|
97 | (13) |
|
Using Multiple Tools to Your Advantage |
|
|
110 | (2) |
|
|
112 | (4) |
|
Overcoming Challenges by Verification and Validation |
|
|
112 | (1) |
|
Overcoming Challenges for Single- and Multiple-Tool Examinations |
|
|
113 | (3) |
|
|
116 | (3) |
Chapter 6 Mobile Forensic Tool Overview |
|
119 | (34) |
|
|
120 | (7) |
|
|
120 | (5) |
|
|
125 | (2) |
|
|
127 | (15) |
|
|
131 | (2) |
|
|
133 | (9) |
|
|
142 | (1) |
|
|
143 | (8) |
|
|
143 | (4) |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
151 | (2) |
Chapter 7 Preparing the Environment for Your First Collection |
|
153 | (26) |
|
Creating the Ideal System |
|
|
154 | (7) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (2) |
|
Device Drivers and Multiple-Tool Environments |
|
|
161 | (16) |
|
|
161 | (1) |
|
Finding Mobile Device Drivers |
|
|
162 | (4) |
|
|
166 | (8) |
|
Cleaning the Computer System of Unused Drivers and Ports |
|
|
174 | (3) |
|
|
177 | (2) |
Chapter 8 Conducting a Collection of a Mobile Device: Considerations and Actions |
|
179 | (46) |
|
|
180 | (3) |
|
|
180 | (1) |
|
Device Collection Type: Logical or Physical |
|
|
181 | (2) |
|
|
183 | (6) |
|
|
184 | (2) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Isolation of the Mobile Device |
|
|
189 | (5) |
|
Methods, Appliances, and Techniques for Isolating a Device |
|
|
189 | (5) |
|
Mobile Device Processing Workflow |
|
|
194 | (29) |
|
Feature Phone Collections |
|
|
196 | (5) |
|
|
201 | (4) |
|
Windows Mobile and Windows Phone Examinations |
|
|
205 | (4) |
|
Apple iOS Connections and Collections |
|
|
209 | (6) |
|
Android OS Connections and Collections |
|
|
215 | (8) |
|
|
223 | (2) |
Chapter 9 Analyzing SIM Cards |
|
225 | (22) |
|
Smart Card Overview: SIM and UICC |
|
|
225 | (20) |
|
|
226 | (2) |
|
File System UICC Structure |
|
|
228 | (1) |
|
Network Information Data Locations |
|
|
229 | (5) |
|
|
234 | (11) |
|
|
245 | (2) |
Chapter 10 Analyzing Feature Phone, BlackBerry, and Windows Phone Data |
|
247 | (50) |
|
Avoiding Tool Hashing Inconsistencies |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
251 | (14) |
|
Feature Phone "Tip of the Iceberg Data" |
|
|
252 | (1) |
|
Parsing a Feature Phone File System |
|
|
252 | (13) |
|
|
265 | (21) |
|
BlackBerry "Tip of the Iceberg Data" |
|
|
266 | (1) |
|
Blackberry Database Breakdown |
|
|
267 | (7) |
|
BlackBerry Data Formats and Data Types |
|
|
274 | (6) |
|
BlackBerry 10 File System |
|
|
280 | (6) |
|
|
286 | (8) |
|
Windows Phone "Tip of the Iceberg Data" |
|
|
286 | (1) |
|
Windows Phone File System |
|
|
286 | (8) |
|
|
294 | (3) |
Chapter 11 Advanced iOS Analysis |
|
297 | (52) |
|
|
298 | (5) |
|
iOS "Tip of the Iceberg Data" |
|
|
303 | (2) |
|
|
305 | (19) |
|
|
305 | (7) |
|
|
312 | (5) |
|
Additional File System Locations |
|
|
317 | (7) |
|
iOS Evidentiary File Types |
|
|
324 | (22) |
|
|
325 | (12) |
|
|
337 | (5) |
|
|
342 | (4) |
|
|
346 | (3) |
Chapter 12 Querying SQLite and Taming the Forensic Snake |
|
349 | (26) |
|
Querying of the SQLite Database |
|
|
350 | (8) |
|
|
350 | (4) |
|
Building a Simple SQL Query |
|
|
354 | (3) |
|
Automating Query Building |
|
|
357 | (1) |
|
|
358 | (14) |
|
|
360 | (5) |
|
|
365 | (4) |
|
Hashing a Directory of Files |
|
|
369 | (2) |
|
Using Regular Expressions |
|
|
371 | (1) |
|
|
372 | (3) |
Chapter 13 Advanced Android Analysis |
|
375 | (44) |
|
Android Device Information |
|
|
376 | (7) |
|
|
376 | (2) |
|
|
378 | (5) |
|
Predominate Android File Types |
|
|
383 | (2) |
|
|
385 | (1) |
|
"Tip of the Iceberg Data" |
|
|
386 | (17) |
|
Additional File System Locations |
|
|
387 | (6) |
|
|
393 | (10) |
|
|
403 | (3) |
|
|
404 | (2) |
|
Android App Files and Malware |
|
|
406 | (9) |
|
|
408 | (7) |
|
|
415 | (4) |
Chapter 14 Presenting the Data as a Mobile Forensics Expert |
|
419 | (24) |
|
|
420 | (15) |
|
The Importance of Taking Notes |
|
|
421 | (2) |
|
|
423 | (1) |
|
Format of the Examiner's Presentation |
|
|
424 | (1) |
|
Why Being Technical Is Not Always Best |
|
|
425 | (1) |
|
What Data to Include in the Report |
|
|
426 | (7) |
|
To Include or Not to Include |
|
|
433 | (2) |
|
Becoming a Mobile Forensic Device Expert |
|
|
435 | (6) |
|
Importance of a Complete Collection |
|
|
437 | (1) |
|
Conforming to Current Expectations May Not Be the Best Approach |
|
|
438 | (1) |
|
Additional Suggestions and Advice |
|
|
439 | (2) |
|
|
441 | (2) |
Index |
|
443 | |