iPhone Forensics: Recovering Investigative Evidence using Chip-off Method

iPhone Forensics: Recovering Investigative Evidence using Chip-off Method

Nilay R. Mistry, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi, Priyanka Badva
Copyright: © 2016 |Pages: 15
DOI: 10.4018/IJISP.2016070102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Smartphone usage has increased in the recent past and has become an extension of the personal computer, so has the complexity of forensic investigation. Vital information on these devices makes them more critical especially when it is part of investigative evidences. The challenge here is the extraction of data, especially when the phone is logically or physically damaged. Chip-off is a niche technique, involving removal of Flash Memory chip with due sophistication, this then is subjected to direct extraction and analysis. Apple iPhones are robust and well locked; the study performed chip-off on model A1203 that revealed vital forensic evidences.
Article Preview
Top

Smartphone And Its Taxonomy

Today Smartphone devices are widespread and they hold a number of types of information about the owner and their activities. As a result of the widespread adoption of these devices into every aspect of our lives they can be involved in almost any crime. The aim of digital forensics of Smartphone devices is to recover the digital evidence in a forensically sound manner so that the digital evidence can be forensically presentable and accepted in court. The digital forensic process consists of four phases, which are Preservation, Acquisition, Examination/Analysis and final Presentation. In this paper, we look at various types of smartphone formats and their associated digital evidence. The digital forensics process of the Smartphone devices is discussed and, this paper also contains recommended guidelines and procedures for how to perform the phases of the digital forensics process on Smartphone devices using the chip-off technique.

A smartphone contains much of the functionality of a desktop PC (Personal Computer), but it also includes radio communications capabilities that desktop PCs typically lack. Communication functionalities include GSM/CDMA (Global System for Mobiles / Code Division Multiple Access) radio, NFC (Near Field Communications), GPS (Global Positioning System), Wi-Fi and Bluetooth communication. The high mobility of these devices can be the most important factor in the shift from desktop/laptop computer to smartphones. Unlike laptops or desktop computers, a smartphone can easily fit in a pocket. It is a computer that is easy to use and small enough to be used almost anywhere. A user can browse the Internet, check email, use GPS navigation, and make online payments from personal bank accounts. Hence, a device this capable is also likely to contain personal user data.

There are various ways a user can protect his or her personal information on smartphones. Android and iOS (Operating System) phones can be set up by means of authentication login and password protected application access. Some phones include a data encryption method to protect sensitive data. Also, third-party mobile protection/encryption software can be installed on both Android and iOS phones. The iPhone has hardware encryption enabled by default for all data stored in memory. There is also a Data Protection API (Application Program Interface) provided by Apple that can be used to implement application-level encryption.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing