Week 8 - Mobile Forensics Flashcards

(35 cards)

1
Q

High-profile example of mobile evidence in terrorism

A

2010 Times Square bombing attempt – Verizon call logs + GPS proved the suspect bought the vehicle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are mobile phones central to criminal investigations?

A

Involved in almost all levels of criminal activity.

Standard practice to seize and examine a suspect’s phone even if they are only questioned, not charged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does UE stand for in 5G?

A

User Equipment (the phone itself)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of gNodeB in 5G?

A

Part of RAN (Radio Access Network).

5G base station that handles radio communication, scheduling, and connects UE to the core network.

Has base station ID and GPS coordinates (either statically or dynamically established)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5G Core Network Functions - AMF

A

Access & Mobility Management - manages device registration, connection, authentication, and mobility w/in network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5G Core Network Functions - SMF

A

Session Management Function - session management, allocates IP addresses, selects UPF and controls QoS for data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5G Core Network Functions - PCF

A

Policy Control Function - provides policy rules (e.g., QoS, charging) for SMF and other functions to enforce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do UDM do in 5G?

A

Unified Data Management - Stores and manages subscriber data, user identities and authentication credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do AUSF do in 5G?

A

Authentication Server Function - Performs authentication of UE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do UPF do in 5G?

A

User Plane Function - forwards user data traffic, enforces policies, and interacts with external data network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a “cell” in cellular networks?

A

Area covered by more than 3 base stations.

Each base station transmits on 3 frequency channels.

Frequencies are never reused in adjacent cells to avoid interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Difference between Soft Hand-Over and Hard Hand-Over?

A

Soft: Phone connects to new base station before releasing the old one

Hard: Old connection is dropped before new one is established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IMEI and its format?

A

International Mobile Equipment ID – uniquely identifies mobile device

Format: WW-XXXXXX-YYYYYY-Z
WW=TAC Reporting Body
XXXXXX=TAC Model
YYYYYY=Serial
Z=Check digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legal note about changing IMEI in the UK?

A

Tampering with IMEI is illegal under the Mobile Telephones (Re-programming) Act 2002 – up to 3 years in prison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many IMEIs does a dual SIM phone have

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is IMSI and its format?

A

International Mobile Subscriber Identity – internationally unique number stored in the SIM card that identifies a user on a network

Format: MCC (3 digits) + MNC (2-3 digits) + subscriber number

17
Q

What is ICCID?

A

Integrated Circuit Card Identifier - Identifies the physical SIM card itself

18
Q

How does SIM card cloning work?

A

Attacker copies IMSI + Ki (authentication key) + ICCID onto another card.

Attacker can then make/receive calls, read SMS (incl. OTPs), use data plan, commit fraud

19
Q

What memory types are in a SIM card?

A

EEPROM (Electronically Erasable Programmable ROM) : Writable hierarchical file system

ROM: OS, authentication, and encryption algorithms

20
Q

What is a SIM card?

A

smart card with processor + memory

21
Q

SIM Card - File System Structure

A

MF (Master File) – root
DF (Dedicated Files) – directories
EF (Elementary Files) – actual data

22
Q

Key Elementary Files (EFs) on a SIM card for forensics (8)

A

EF_ICCID
EF_IMSI
EF_Ki (ciphering key)
EF_LOCI (last known location - very important)
EF_ADN (phone book)
EF_SMS (text messages)
EF_LND (last numbers dialled)
EF_MSISDN (subscriber phone number)

23
Q

Preferred order of data extraction?

A

Physical image > Logical extraction

24
Q

What is ADB and what does it require?

A

Android Debug Bridge – command-line tool allows the device to receive instructions, from a computer, via a USB cable

Requires USB debugging

25
ADB Architecture
Client – sends commands A daemon (adbd) – runs commands on a device. Runs a background process on each device Server – manages communication between client and daemon. Runs as a background process on your development machine
26
Common ADB commands for logical extraction?
adb pull – copy files/folders adb backup – create .ab backup adb shell – access command line (ls, cd, cat)
27
Advanced physical acquisition methods (list 4)
ADB via dd + netcat + ort forwarding (bit-for-bit image) Qualcomm EDL (Emergency Download) – bypasses bootloader JTAG – solder to test points on PCB for full dump ISP / Chip-Off (last resort)
28
What is Qualcomm Emergency Download used for?
Used for locked Qualcomm devices Bypasses bootloader integrity check → rooted ADB shell Methods: EDL cable, short PCB pins, button combos
29
What is JTAG used for?
Bypassing security/encryption to obtain a physical dump. Works on most phones (Samsung, iPhone, etc.). Tools: Z3X, UFI Box
30
What is In-System Programming used for?
Connects to an eMMC or eMCP flash memory chip to access files stored on the chip
31
What is chip off used for?
Used to circumvent encryption, PCB damaged method: physically desolder NAND flash chip and read it in a programmer. High cost, high skill, not always successful
32
What is Root / Jailbreak in forensics?
Exploiting the device to gain root privileges. Exploit is a small piece of code. Must be fully documented for court. iOS or locked non-Qualcomm phones - JTAG or ISP required
33
Key best practices in mobile device forensics? (4)
Follow ACPO/ISO, (Standard Operating Procedures) SOPs Document everyone who touched the device, Record if device was fingerprinted before lab arrival Prefer physical acquisition
34
Hardware containment options for mobile phones?
Faraday box/bag Paraben StrongHold bag Arson can (metal paint can)
35
Software steps to contain a phone? (3)
Enable Airplane Mode Disable Wi-Fi Disable Bluetooth