Course 11 - Mobile Forensics Fundamentals | Episode 2: Data Acquisition, Diverse Operating Systems, and Forensic Challenges
カートのアイテムが多すぎます
ご購入は五十タイトルがカートに入っている場合のみです。
カートに追加できませんでした。
しばらく経ってから再度お試しください。
ウィッシュリストに追加できませんでした。
しばらく経ってから再度お試しください。
ほしい物リストの削除に失敗しました。
しばらく経ってから再度お試しください。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
- Mobile forensics follows the standard digital forensic phases—collection, examination, analysis, and reporting—but must adapt to mobile-specific risks.
- Devices must be isolated immediately to prevent remote wiping or network interference using Faraday cages, Stronghold bags, or shielded rooms.
- Some devices (e.g., BlackBerry) support remote kill commands, making rapid on-scene triage essential before the device locks.
- Investigators must document the exact state of the device on seizure (powered on/off, locked/unlocked) and any actions taken (e.g., enabling Airplane Mode).
- Used when automated tools fail or when handling unsupported “feature phones” or burner devices.
- Often involves photographing each screen manually using tools like Project Phone.
- Least reliable but sometimes the only option.
- The most common method for smartphones, performed with forensic tools such as Cellebrite, XRY, and Paraben.
- Retrieves allocated data, app data, logs, contacts, SMS, and backups.
- iPhone logical extraction usually requires iTunes to force the device to generate a backup.
- Android logical extraction may use ADB, especially on rooted devices.
- Targets both allocated and unallocated data, including deleted content.
- Methods include JTAG, ISP, and Chip-Off forensics.
- Increasingly limited by full-disk encryption—data may be physically extracted but cryptographically useless without keys.
- RAM acquisition is highly difficult due to hardware protections, sandboxing, and security mechanisms.
- Any volatile data disappears once the device powers down.
- Linux-based and secured with SE Linux for mandatory access control.
- SE Linux sandboxing has known bypasses through covert channels.
- Highly fragmented ecosystem creates inconsistent forensic tool performance.
- Unix-based, secured by Apple’s robust Secure Boot Chain.
- Uses APFS (Apple File System) with strong encryption.
- Extremely resistant to physical extraction on modern versions.
- Historically optimized for usability over security.
- Weak sandboxing may allow cross-privilege interaction and artifact leakage.
- GSM: International, open-standard.
- CDMA: North American, proprietary.
- Key identifiers:
- IMEI – device hardware identity
- IMSI – subscriber identity stored in SIM
- Mobile devices fall under Fourth Amendment protections.
- Accessing cloud data using cached credentials without a warrant violates the Computer Abuse Act (18 USC §1030).
- Carrier metadata (CDRs, tower location, HLR/VLR info) requires a subpoena or discovery order.
- Operating signal-jamming equipment without government authorization is illegal under FCC regulations.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
まだレビューはありません