An Introduction to Forensics Data Acquisition From Android Mobile Devices

The function that a Digital Forensics Investigator (DFI) is rife with continuous studying opportunities, mainly as technology expands and proliferates into each nook of communications, amusement, and business. As a DFI, we cope with each day’s onslaught of recent devices. Like the cellular phone or tablet, many of these gadgets use not unusual running systems that we want to be acquainted with. Certainly, the Android OS is fundamental in the pill and cell cellphone enterprise. Given the predominance of the Android OS in the cellular tool marketplace, DFIs will run into Android gadgets within the direction of many investigations. While numerous models recommend processes to acquire information from Android gadgets, this newsletter introduces four feasible techniques that the DFI must keep in mind when collecting evidence from Android devices.

 Introduction to Forensics

A Bit of History of the Android OS

Android’s first industrial release came in September 2008 with model 1.0. Android is the open-source and ‘free to use’ operating machine for cellular gadgets developed via Google. Importantly, early on, Google and different hardware groups shaped the “Open Handset Alliance” (OHA) in 2007 to foster and assist the growth of the Android in the market. The OHA now consists of 84 hardware corporations, including giants like Samsung, HTC, and Motorola (to name some). This alliance became hooked up to compete with organizations with their own market offerings, including aggressive gadgets provided through Apple, Microsoft (Windows Phone 10 – that is now reportedly lifeless to the marketplace), and Blackberry (which has ceased making hardware). Regardless of whether an OS is defunct or now not, the DFI has to recognize the various versions of a couple of operating system systems, particularly if their forensics focus is in a selected realm, such as cellular gadgets.

Linux and Android

The modern new release of the Android OS is based on Linux. Keep in thoughts that “based on Linux” does no longer mean the same old Linux apps will continually run on an Android and, conversely, the Android apps that you would possibly experience (or are familiar with) will not necessarily run to your Linux computer. But Linux isn’t always Android. To clarify the point, please word that Google selected the Linux kernel, the crucial part of the Linux running machine, to manipulate the hardware chipset processing so that Google’s builders wouldn’t be involved with the specifics of ways processing happens on a given set of hardware. This lets their developers to recognition at the broader working machine layer and the user interface functions of the Android OS.

A Large Market Share

 Introduction to Forensics

The Android OS has a massive market proportion of the mobile tool market, by and large, because of its open-source nature. An extra 328 million Android gadgets were shipped as of the 0.33 region in 2016. In step with netwmarketshare.Com, the Android working gadget had the bulk of installations in 2017 — almost sixty-seven % — as of this writing.

As a DFI, we can anticipate coming across Android-based hardware within the direction of an ordinary investigation. Due to the open supply nature of the Android OS at the side of the various hardware platforms from Samsung, Motorola, HTC, etc., the form of combinations among hardware kind and OS implementation provides an extra project. Consider that Android is currently at version 7.1.1. Yet, every telephone manufacturer and mobile device dealer will typically modify the OS for the specific hardware and carrier services, giving a further layer of complexity for the DFI. The approach to records acquisition may also vary.

Before we dig deeper into extra attributes of the Android OS that complicate the approach to facts acquisition, let’s study the concept of a ROM version, a good way to be applied to an Android device. As a top-level view, ROM (Read Only Memory) software is low-degree programming. This is close to the kernel level, and the precise ROM program is often referred to as firmware. If you watched a pill in assessment to a mobile cellphone, the pill would have distinctive ROM programming as contrasted to a mobile telephone, given that hardware functions between the pill and mobile cellphone could be one-of-a-kind, even if both hardware gadgets are from the identical hardware producer. Complicating the need for greater specifics inside the ROM software, add inside the specific requirements of cell provider companies (Verizon, AT&T, and many others.).

While there are commonalities of obtaining facts from a cellular phone, now not all Android devices are the same, mainly in mind that there are fourteen predominant Android OS releases in the marketplace (from versions 1.0 to 7.1.1), multiple providers with version-particular ROMs, and extra limitless custom person-complied versions (client ROMs). The ‘patron compiled versions’ also are version-precise ROMs. The ROM-stage updates applied to each wi-fi tool will contain running and gadget fundamental programs that work for a particular hardware tool, for a given dealer (for instance, your Samsung S7 from Verizon), and a selected implementation.

Even although there is no ‘silver bullet’ technique to investigating any Android device, the forensic investigation of an Android tool must comply with the identical fashionable method for the gathering of evidence, requiring a structured method and approach that deal with the investigation, seizure, isolation, acquisition, exam, and evaluation, and reporting for any virtual proof. When a request to study a device is acquired, the DFI starts with making plans and practice to consist of the considered necessary technique of acquiring devices, the essential paperwork to help and report the chain of custody, the improvement of a cause assertion for the examination, the detailing of the device model (and different specific attributes of the receiver hardware), and a listing or description of the information the requestor is in search of to gather.

Unique Challenges of Acquisition

 Introduction to Forensics

Mobile gadgets, mobile phones, tablets, and many others. Face precise, demanding situations all through the proof seizure. Since battery lifestyles are confined on mobile devices, and it isn’t usually endorsed that a charger is inserted right into a tool, the isolation degree of evidence amassing may be crucial in acquiring the device. Confounding proper acquisition, the cell statistics, WiFi connectivity, and Bluetooth connectivity need to be covered in the investigator’s consciousness during acquisition. Android has many protection features built into the telephone. The lock-display screen feature may be set as PIN, password, drawing a sample, facial recognition, place recognition, depending on on-tool recognition, and biometrics, which include fingerprints. A predicted 70% of customers do use a few kinds of protection on their telephone. Critically, there’s to be a software program that the person may have downloaded that can deliver them the capability to wipe the telephone remotely, complicating acquisition.

It is not going during the seizure of the cell tool that the display screen may be unlocked. If the device isn’t locked, the DFI’s exam will be simpler because the DFI can directly trade the settings within the cell phone. If access is permitted to the cell phone, disable the lock-display and alternate the display timeout to its maximum value (which may be 30 minutes for a few gadgets). Keep in thoughts that of key significance is to isolate the cellphone from any Internet connections to prevent far-flung wiping of the device. Place the telephone in Airplane mode. Attach an external energy delivery to the phone after it has been located in a static-unfastened bag designed to block radiofrequency indicators. Once comfortable, you have to be later able to allow USB debugging to permit the Android Debug Bridge (ADB) that could provide proper statistics seize. While it can be important to look at RAM’s artifacts on a mobile tool, this will not take place.

Acquiring the Android Data

Copying a tough-power from a laptop or PC in a forensically-sound way is trivial compared to the records extraction methods wished for mobile tool data acquisition. Generally, DFIs have geared up bodily get right of entry to a hard-pressure without obstacles, allowing for a hardware reproduction or software bit move image to be created. Mobile gadgets have their facts stored internally of the cellphone in hard-to-reach locations. Extraction of records via the USB port may be a mission but may be carried out with care and luck on Android devices.

Leah Leonard

Coffee expert. Troublemaker. Typical music guru. Friendly beer fanatic. Introvert. Web specialist. Uniquely-equipped for implementing bullwhips in Ocean City, NJ. Spent a year importing licorice in Hanford, CA. Have some experience licensing cigarettes for the government. Once had a dream of selling toy monkeys in Las Vegas, NV. Spent the 80's working on hula hoops in Minneapolis, MN. What gets me going now is working with action figures in the government sector.

Related Articles

Back to top button