Law Enforcement Technology

JUN 2013

Issue link: https://let.epubxp.com/i/137309

Contents of this Issue

Navigation

Page 45 of 55

TAL K IN G P OI N T S with consent to perform a full forensic examination of their device. password-protected. ■ Device encryption. iOS, BlackBerry, and newer Android versions (3.0 and above) allow users to enable device-level and file system encryption. ■ App sandboxes. The operating system forces apps to ask the API for permission to access contacts, locations, and other information; the apps do not communicate directly, so data within each app is protected. Mobile forensics password extraction or bypass exists for many of the most popular devices, but not for every device—including iPhone 4S and iPhone 5. Decryption, too, is hit or miss. On BlackBerry devices, where different encryption exists for the different operating system versions, it is possible to decrypt the data if you know the password in OS 4-6. However, disabling the encryption only does so for future data. Data encrypted prior to disablement remains encrypted. Jailbroken and rooted devices At times, users jailbreak their iOS devices or root their Androids to access the underlying kernel—the controller between software and hardware—which removes security features designed to restrict app download only to signed certificates. As a result, jailbreaking or rooting makes a device more susceptible to malware from Web browsers, non-App Store or Google Play apps, and malicious QR (scannable "quick response") codes. Malware that would not otherwise have been able to run, can run. Rooting and jailbreaking also remove the "sandboxing" that maintains barriers between apps. In a jailbroken or rooted device, all apps have access to all data— making it easy for embedded malware to siphon data. This may have direct relevance to identity theft and cyber harassment types of cases. The good news: the victim of domestic violence or credit card fraud is likely to provide you 46 Law Enforcement Technology Special cases: down-market prepaid "burner" and counterfeit devices Encrypted data wiping Android is the predominant operating system for prepaid smartphones, and fortunately, its open source nature makes it easier for mobile forensics vendors to support. However, "feature" phones' use of the Java-based BREW platform complicates forensic extractions. Vendors disable their data ports, and don't make their APIs available so that commercial forensic extraction tools can perform logical and file system extractions. There are two ways to potentially get around the data port lock. First is to attempt to perform a physical extraction by selecting the postpaid device profile. However, the firmware differs from a prepaid to a postpaid device, and so this may or may not work—depending on the forensic tool's ability to reconstruct the file system and/or parse the data. Law enforcement may also attempt to obtain the MSL (Master Subsidiary Lock) code from the prepaid carrier, which unlocks the data port. Once unlocked, a logical or file system extraction can be run under the postpaid device profile, if it exists. However, it is subject to the same limitations as attempting physical extraction without the MSL code. Counterfeit mobile devices, made mainly in China but also in India and There's a reason why isolating a mobile device from the network is considered a best practice for seizure: data wiping isn't the same as deleted data—once data is wiped, it's gone. On iPhone 3GS and above, there is no known way to decrypt and recover wiped data; wiping deletes the keys to the AES 256 decryption. Four different methods wipe a BlackBerry: Desktop Manager, remote wipe through the BlackBerry Enterprise Server, entering the wrong password 10 times, and via the phone's menu. iOS devices can also be set to wipe data if a password is incorrectly entered, or remote-wiped via iCloud. Android remote-wiping takes place via Google Sync; for Windows, it's Find My Phone. Data wiping is also available on Android, iOS and Windows devices, not only on Blackberry (through settings menu). Make sure first responders know to isolate a mobile device by putting it in Airplane Mode or in a Faraday container (and seizing its charger, too). You won't always be able to crack encryption, but make sure the processes are in place to at least give yourself the chance. June 2013 Why do mobile vendors disable feature phones' data ports? Vendors lock feature phones' data ports to prevent consumers from purchasing the devices at prepaid carriers' subsidized prices and then flashing the firmware so it can operate on a different carrier. Consumers do this either for convenience's sake—which nonetheless undercuts the carrier's business model—or because they are operating on the black market, purchasing devices in bulk and then shipping them to a different country where they are sold for the non-subsidized price. www.officer.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Law Enforcement Technology - JUN 2013