iPhone Forensics: Recovering Investigative Evidence using Chip-off Method

iPhone Forensics: Recovering Investigative Evidence using Chip-off Method

Nilay R. Mistry (Institute of Forensic Science, Gandhinagar, India), Binoj Koshy (Institute of Forensic Science, Gandhinagar, India), Mohindersinh Dahiya (Institute of Forensic Science, Gandhinagar, India), Chirag Chaudhary (Institute of Forensic Science, Gandhinagar, India), Harshal Patel (Institute of Forensic Science, Gandhinagar, India), Dhaval Parekh (Institute of Forensic Science, Gandhinagar, India), Jaidip Kotak (Institute of Forensic Science, Gandhinagar, India), Komal Nayi (Institute of Forensic Science, Gandhinagar, India) and Priyanka Badva (Institute of Forensic Science, Gandhinagar, India)
Copyright: © 2016 |Pages: 15
DOI: 10.4018/IJISP.2016070102
OnDemand PDF Download:
$37.50

Abstract

Smartphone usage has increased in the recent past and has become an extension of the personal computer, so has the complexity of forensic investigation. Vital information on these devices makes them more critical especially when it is part of investigative evidences. The challenge here is the extraction of data, especially when the phone is logically or physically damaged. Chip-off is a niche technique, involving removal of Flash Memory chip with due sophistication, this then is subjected to direct extraction and analysis. Apple iPhones are robust and well locked; the study performed chip-off on model A1203 that revealed vital forensic evidences.
Article Preview

Smartphone And Its Taxonomy

Today Smartphone devices are widespread and they hold a number of types of information about the owner and their activities. As a result of the widespread adoption of these devices into every aspect of our lives they can be involved in almost any crime. The aim of digital forensics of Smartphone devices is to recover the digital evidence in a forensically sound manner so that the digital evidence can be forensically presentable and accepted in court. The digital forensic process consists of four phases, which are Preservation, Acquisition, Examination/Analysis and final Presentation. In this paper, we look at various types of smartphone formats and their associated digital evidence. The digital forensics process of the Smartphone devices is discussed and, this paper also contains recommended guidelines and procedures for how to perform the phases of the digital forensics process on Smartphone devices using the chip-off technique.

A smartphone contains much of the functionality of a desktop PC (Personal Computer), but it also includes radio communications capabilities that desktop PCs typically lack. Communication functionalities include GSM/CDMA (Global System for Mobiles / Code Division Multiple Access) radio, NFC (Near Field Communications), GPS (Global Positioning System), Wi-Fi and Bluetooth communication. The high mobility of these devices can be the most important factor in the shift from desktop/laptop computer to smartphones. Unlike laptops or desktop computers, a smartphone can easily fit in a pocket. It is a computer that is easy to use and small enough to be used almost anywhere. A user can browse the Internet, check email, use GPS navigation, and make online payments from personal bank accounts. Hence, a device this capable is also likely to contain personal user data.

There are various ways a user can protect his or her personal information on smartphones. Android and iOS (Operating System) phones can be set up by means of authentication login and password protected application access. Some phones include a data encryption method to protect sensitive data. Also, third-party mobile protection/encryption software can be installed on both Android and iOS phones. The iPhone has hardware encryption enabled by default for all data stored in memory. There is also a Data Protection API (Application Program Interface) provided by Apple that can be used to implement application-level encryption.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing