unit 5
unit 5
Fon ie cue Properties | vawer Har Yaw far Text Vew log Hatem —Corment| Email property sheet [280Chapter 8 Attachments to e-mail messages can be viewed by displaying the messages in the E-Mail List and then selecting the File List. Fach message will have an icon associated with it in the leftmost column by default. This icon is either an envelope to denote an e-mail message with no attachment or a paper clip to denote a message with a file attachment, as shown here: Nana aD } spy eine c ee Bless ss ‘Checking e-mail attachment status This will show all the files attached to the messages and allow the practitioner to work with them as a group, but it does not show the specific source of each attachment. By selecting the E-Mail List, the practitioner has more options for viewing attachments in the context of the messages to which they were originally attached: eae ene oe r= ts 3 Felot | EMauie (ny [Cabin EiTak Reger” whee —— — Doe —> Viewing email attachments [261]Examining Browsers, E-mails, Messaging Systems, and Mobile Phon In addition, the attachment column shows the number of attachments for each, individual message: all st (3) cattorod) subpet Fen enateae + ‘fowber Hib sorn sina cto. zmey]2013 081958 wal FB torn riche chon, 27 Mey 2012 06404 1 & Lemtbelove ti ote char” <0. 4/2207. 0751 ONDE Headers attachments, and email body ILookIX can also group and filter messages in the E-Mail List. Grouping allows the practitioner to take all messages displayed and group them by a single column. This can save time and enhance the cataloging of relevant evidence as the practitioner works through evidence selection: EM Lot (SY TaereaT Selected group John Richards Ealdte 1 rebertbennerdchem.. O4Mar/2012 07:07:31 2 we = 0 bert.beerdehem. Za D ons = 0 rberttennerdeham. 27May2012005408 Cataloging e-mail evidence of potential elevance E-mail messages can be included in the same categories as files or in separate categories specifically created for correspondence, as determined by the practitioner. Whole e-mail stores or subfolders therein can be added to categories by selecting the store or folder in the e-mail explorer and selecting Save Messages to My Categories: [282}Chapter 8 Categorised emails z EMail st (15) a oO) subject va |&) fon 10 [= tented, 1 Sep 2019 18:208 40800 0 tensten.con cba bonnet, cg tented, Se 019 221640600 0 blstertersecn rebut bonrehen, = test ed, Sep 2019 14:2038 40600 0 bstesBeiclcm bat brn, a ut a ‘cbt cee Q This ool! o robert bonne che + Thee a icbrbeoenr cha hn ae we meting a scbrteneerSche a: ° tbr bower ‘Were have youbsen a a ‘cbr tower isc a bet bower The tcl! = Q ccbr.bewarBch suite cht becca CCategorizing e-mails of potential relevance The categorized file(s) may be viewed in the Category Explorer, where they are collated for convenient access: [Bp Sr catecones “5 a03 Categories youve Geatedto allocate seul evidenalmateralto ltoxc eshoiestectests sine TE eke pcb aee : Good housekeeping sen by calaloging evidence of value during the selection process Recovering and analyzing e-mails from larger datasets As outlined in Chapter 5, The Need for Enhanced Forensic Tools, the ISeckDiscovery automaton is a distributed collection tool that captures electronically stored information (ESI) from unlimited populations of computers and digital storage. Unlike other tools, it harnesses its patented technology to use each targeted machine for processing with minimum impact on the user of that computer. ISeekDiscovery greatly improves ESI collection and has been enhanced for use by forensic examiners to enable live acquisition of data that traditional digital forensic tools would be unable to capture remotely in large-scale networks (including RAM and Windows Registry data) [283]Examining Browsers, E-mails, Messaging Systems, and Mobile Phon To reiterate, the automaton only requires access to the device and appropriate designing of the configuration file; it collects only the evidence needed, thereby ‘making endpoint analysis less daunting because of the smaller size of the dataset, which enhances filtering and searching for evidence. However, the extracted data may still be large and require substantial post-recovery processing ‘The 32-bit and 64-bit APIs provided by XtremeForensics allow users to make use of companies’ servers to extract large datasets from a . 15x evidence container. This is a relatively simple process of opening the application and logging on to our server, which then allows ISeekExtractor to commence the operation The extraction process provides a number of extraction style options: ‘+ Original folders and filenames, discarding metadata ‘+ Original folders and filenames, adding .xm1, metadata + Numbered files with metadata in a .xmu index ‘The API can be initialized in minutes using Dynamic Link Library (DLL) files and guided to facilitate the expeditious and secure transport of all captured data in an ISeekExplorer container into: + Any database or review system intended for a basic review platform in current use + Another file format suitable for import to any other system This is especially time-saving when large sets of data have been captured from extensive network servers. Searching for scanned files Searching for scanned images may be done using the Portable Scanned Images tool provided by ILookIX, shown in the following screenshot. Locating scanned objects can be helpful in identifying those documents that cannot be indexed and searched because, during the scanning process, they were not converted using optical character recognition (OCR) to allow them to be indexed as text documents. These files may contain relevant information and so they may require manual viewing, or conversion through OCR processes if the number is too large. (284)Chapter 8 ‘The process is also useful for determining the provenance and authenticity of documents relating to forgeries and deception: » DnraeIReRE.) aie seen ee. See. Stdvodeateameh 2021500 2S GOAL 250 BR ster sz 68 5). 0. 3a ST hiswoteenerdinh. 32 dee. ono. ste [SS lowinherwndinh.—_asa5e ein CeO. 21s “B38 tomnaatiored gen. aL Doe KENT. oR. ES ha Fis cater Duet ebb scamet naps) * i oF 1 Es ca Recovered scanned fies ready for manual inspection The growing challenge of evidence recovery from mobile phones and handheld devices Digital evidence may come from a range of devices, including mobile phones, GPS navigation devices, printers, digital cameras and video recorders, voice recorders, Kindles, home security devices, motor vehicle computers, Xbox and Wii players, black-box flight recorders, and digital watches. Mobile phones and other handheld devices store users’ personal information, including call history, Internet browsing records, file downloads and uploads, ‘geographical locations, text messages, e-mails, multimedia files, contact lists, calendar events, and private information. They also record the position of users if they have the positioning setting activated —all in all, a considerable amount of data that may assist an investigation. For example, stored information may reveal details of the user's contacts and details of their communications relating to some transgression as well as an insight into their motivation and mindset. [285]Examining Browsers, E-mails, Messaging Systems, and Mobile Phon ‘The following screenshot shows a report of items and deleted items regarding, the activity of the phone user, including messages, calls, locations, and browsing, activities: View Sinai (eve Evert Lon on oo eve Ap Usage : ‘ec tad ope ts Mesoges ih 3% Messages Sau Use ° Web eto 3a 4 Fee ores a {A general forensic report of mobile phone accounts and files However, mobile phones pose challenges to the forensic practitioner, especially with the rapid development of new phone types and operating systems with increased reliance on protection and encryption that effectively challenges evidence recovery ‘The rapid growth of mobile phones using different hardware and operating systems has made it difficult to develop a single process or tool to address all eventualities. In addition to a growing variety of smartphones and platforms, including Android, Blackberry, Apple iPhone, and Windows Mobile, there is a staggering range of inexpensive phones using legacy systems. The following section provides an outline of evidence recovery from mobile phones. [286Chapters Extracting data from mobile devices Evidence of different types of files is stored in mobile phones and may be found in several locations, including device memory, detachable memory such as SD cards, and removable SIM cards. Each mobile phone is provided with a usually unique identifier known as the International Mobile Station Equipment Identity (IMEI) to uniquely identify a broad range of mobile phones. The unique number is normally printed inside the battery compartment or on the outside casing of the phone. It is also stored inside the embedded memory of the phone and, from there, may be displayed on the screen and recovered using forensic tools. The IMEI identifies and validates the phone hardware to a GSM network to prevent stolen phones from accessing that network ‘The IMEI is an important record of a phone's use and identity. In the following screenshot, the XRY Micro Systemation forensic tool has extracted general information about an iPhone 4, including its IMEI number. The SIM identification number is recorded at the bottom of the report: cnsic report of an iPhone 4 showing the basic device settings (297)E Messagin ind Mobile Phone Subscribers at identified by another unique identifi: the IMEL rte stored onthe SIM card, which identifies and authenticates GG Sabserters This attates a practioner ising with he telephone network to abn bling information locations of alls and contacts al potential evidence Among practitioners, itis considered best practice to document manual and technical processes used to access and recover evidence from mobile phones and to minimize any loss or changes to data. Android and Apple phones and a host of others store a significant amount of user information in SQLite databases information which sometimes remains on the device after other information has been deleted. This can be a useful source of information, and forensic tools often recover a broad range of file types, including databases. In the following screenshot, the mobile forensic tool NowSecure Mobile Forensics was used to recover information from an Android mobile phone. These new-generation tools organize the examination into a project so that all the recovered data is cataloged and may be analyzed with simple-to-use graphic interfaces: Ne — ie : tS" sings me ‘Creating a forensic casein NowSecure Mobile Forensics, (288)Chapter 8 ‘The device under examination is a late-model Android and cannot be rooted to extract a physical dump, as shown in the following screenshot: Eee come hse com Bones ter th gees Ge Binet) | eer i? ‘Options available to recover data from an Android phone A logical extraction or backup of the device is available for analysis, and in this instance, a backup of the device was selected: @ Select extraction ype ad Evidence Name [Case 40007 Evidence Number [Mobile 01 )y Evidence Timazane | australia/pert 0800) ale Type | Android Backup ale ‘adb backup ofthe target device WARNING: On high capacity devices extractions can take upto afew hours to complete, Xcanel | YOK Preparing the forensic examination and inserting ease details [289]‘Once the extraction is complete, the practitioner may select from a range of recovered categories of items, as shown here: John Boe Audio ternal 24) Bhcatendors i) (calendar Events (22) Recattiog samsung) 0) | @ Downloads ' @iemallAccount) Bolles External asa | Boles eral a - Roimage thumbnals 640 - Roimages external Bogs (samsung) ne Rovideos external) Seinstaled packages 70) F wirioetae Bookmarks (serowse I ‘Browser story (5. 13) Asana rinaings carved Data Filesystem Browser audio) FQ ninary na Directory in NowSecure Mobile Forensics of recovered dats from an Android phone In the following instance, an array of Internet browsing activity showing the ttle of the webpage, URLs, and timestamps is available to the practitioner: [270].om iy Bo) a ‘Recovered webpages, including tiles, URLs, and timestamps In the following screenshot, a list of downloaded files and the originating websites is shown with the associated timestamps: [271]Examining Browsers, Esmails, Messaging Systems, and Mobile Phones In the next screenshot, the tool has recovered video and music files located on the external SD card housed in the phone: ‘View of data recovered from an attached SD card ‘A range of different applications were installed on the phone, and some of those can bbe seen in the following screenshot: 3 hanno § eae Fe Bae He Ghaieay XS Gaara Xm ambena *e ao Sec te vivastreet isis /elrstomapersa Details of applications installed on an Android phone and the dates oftheir installation DryChapter 8 In the following crime simulation, XRY Micro Systemation has recovered some chat ‘messages of an incriminating nature: eS Ta eeei se 8 ‘Record of SMS conversations, which ean be traced back to caller and sender phones E-mail may also be recovered from mobile phones, and the following simulation shows some communications between the suspect and his wife: ‘Record of email and content recovered from an Android phone [273]Ex Messagin ind Mobile Phone General information about the suspect's iPhone 5 was recovered and reveals the IMEI and International Mobile Subscriber Identity (IMSI) numbers and general information about the phone: (General ntormation a 2 ey = avon 1085) ar Cote Hom MS) Tata Copan Lt, uate GES) Shien OCOD) sSxofserranNNos Sere Capacy soe (General information obtained from an iPhone 5 rayChapter 8 In the following screenshot is a Google Map extraction, showing the specific location of the mobile phone on 23/12/2012. In this simulation, it was possible to track the phone at its location in western Australia and then to another destination in Victoria ‘on the eastern Australian seaboard. These records can be triangulated, with Telco formation being recorded of the location of the device as it passes each cell tower while it is active, Records of its location when making and receiving calls can also be obtained: Recovered map showing the location ofthe phone In the following screenshot, a new location has been recorded, showing the position of the phone approaching a major road intersection: Recovered map showing location ofthe phone during transit [275]‘The following table is an extract of chat messages recorded on at used to rebut an allegation of rape by the spouse. It served as a record of conversation between the two parties showing a greater degree of friendliness and empathy than *hone that was the victim had previously disclosed. The case was dismissed in a lower court: Message Tine Sian [older] Deleted aay BOU-OEIS | Read | Inbox | Yor ors240 lute) Wupfora hone ca 20ULGFIS | Sent Sentbor | Ver orso4s lure) Thome now dong ok zondris [Read | box | Ver lure) How farauayrunoa? 2OUL-GEAS | Sent | Sentbor | Ver orazso (ure) Yesbut willbe coming straight [2011058 | Sent | Sentbox | Ver beet oss lure) Waldo uhave2gobscimoro? [20110135 | Read | inbox | Vor 5:12.07 (ure) ‘Dont knon probabiy could do] 2011-0048 | Sent | Sentbor | Vor tha coup daye rast, 61050 cure) ‘Chat messages between spouses used sabi evidence In the following extract from a civil case over a disputed will, one chat message between the deceased and her spouse and a number of voicemail notifications recorded on the Nokia mobile phone were recovered. Regrettably, the phone did not provide any further information to assist either party to the dispute: ev hope racing's ine | 19/08/2010 well ustleting uno | 3:27-5¢ px cami (20:00) tered | sna | a | ng 19/08/2010, es Voice message(s. | 531557 PMI Icom (09:30) sted | sna | 2 | ng GaIriOF younaved | 5/08/2000 ew Voice message(s}. | 11:00:25 am com (+0800) eteted | nm |_| ne GaIPIOF youhaved ew Voice messagets. 30/07/2010 3327 PM Incomi (08:00) tered [sim [4 __| ne (Chat messages and voicemail notifications elaing toa civil dispute over the deceased's will, [276}