Password security and encryption
Securing mobile devices has been a focus of device manufacturers over the past several years and continues to be a priority as personal privacy is increasingly important to their markets. As a result, methods for securing and/or encrypting data vary widely from device to device and from one operating system to another. Extracting data from unlocked smartphones is a relatively straightforward task. But accessing locked devices can prove challenging. Manufacturers are developing password and encryption schemes that make it practically impossible for law enforcement agents to access the data. And almost as soon as security flaws are discovered, they are patched and tightened. Encryption will continue to strengthen and be the bane of law enforcement investigations.
Tools such as XRY Physical can help examiners bypass the operating system to dump all the raw data from the device. This memory dump gives them access to system, protected and deleted data, and also allows you to overcome security and encryption challenges on locked devices.
By combining XRY Physical with XAMN Spotlight, you can see the hex code quickly and by activating source mode, you can verify the original raw data.
Mobile operating systems
An Operating System (OS) is the software that enables the user to “operate” the mobile device. It uses a system to store and retrieve data as per the rules of that file system. It provides ways for the user to use the hardware components and essentially makes everything run. There are a variety of operating systems out there, but the most common mobile operating systems are Google Android and Apple iOS. Others operating systems have come and gone, such as Windows Mobile and SymbianOS. Many feature phones use unique, proprietary operating systems that are less well known to users.
At some point, a forensic examiner may have to face a feature phone forensic investigation, especially where people related to terrorism, hacking, secret agents, etc. are involved. In order to handle such phones, law enforcement members need proper training to ensure safe preservation of the extracted data.
Proper handling of mobile devices is vital to maintaining the integrity of the data they contain. Mishandling the device can result in devastating effects, including, in the worst case, destroying data on the handset. Be sure to become familiar with the basic operation of the different operating systems to ensure you do not accidentally reset or wipe a device.
Lack of tools and equipment
There are a wide range of mobile devices. A single tool might not support all the devices or apps on the market, or perform all the necessary functions, so having multiple tools in your toolbox is essential for mobile forensics investigations. The more tools you have at your disposal the better chance you have of getting into the phones you will encounter and decode the data retrieved. This not only applies to the tools designed to extract data from mobile devices, including the myriad of cables available for different devices, but also the analytical tools used to make sense of the data retrieved.
As privacy may be a concern for the general public, some app developers go above and beyond in an attempt to thwart law enforcement. Criminals will use otherwise legitimate apps to hide their criminal activity. Anti-forensics techniques attempt to circumvent mobile forensic examiners by hiding data, data obfuscation, data forgery, and secure wiping. As these products become more widely available and at a price point that makes them accessible to the average user, their use will in all probability dramatically increase.
The cloud-based messaging app, Telegram, became so popular because it offers a ‘Secret Chat’ function, which is increasingly exploited by criminals. The Secret Chat uses end-to-end encryption, but unlike regular messages, secret chats are not cloud-based and can only be accessed on the devices used.
Telegram is not the first app to be put to nefarious use. XRY now supports decoding of Secret Chats and enables examiners to access messages in a secret chat from the original device.
If you have a general educational background in law enforcement or criminal justice but would like to learn more about mobile forensics, training is essential. MSAB offers a full range of training courses and different ways to learn.