Difference between pages "Blackberry Forensics" and "Cell Phone Forensics"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Blackberry Simulator)
 
(External Links)
 
Line 1: Line 1:
== Acquiring BlackBerry Backup File (.ipd) ==
+
== Guidelines ==
  
1. Open Blackberry’s Desktop Manager<br/>
+
# If on, switch it off. If off, leave off.  
2. Click “Options” then “Connection Settings” <br/>
+
[[Image:4.JPG]]<br/>
+
4. Select “USB-PIN: 2016CC12” for connection<br/>
+
[[Image:1.JPG]]<br/>
+
5. Click “Detect”, then it should show a dialog box saying it found the device<br/>
+
6.     Click "OK" to return to the main menu<br/>
+
7. Double click “Backup and Restore”<br/>
+
[[Image:2.JPG]]  <br/>
+
8. Save the .ipd file<br/>
+
[[Image:3.JPG]]<br/>
+
  
== Opening Blackberry Backup Files (.ipd) ==
+
#* Note only under exceptional circumstances should the handset be left switched on and in any case every precaution to prevent the handset connecting with the Communication Service Provider should be made. Consider use of one of many [[wireless preservation]] or [[RF isolation]] techniques. Note that the slightest signal leakage will allow an overwriting text message through even if a phone call can't get through.
1. Purchase Amber BlackBerry Converter from [http://www.processtext.com/abcblackberry.html]
+
<br>Or
+
<br>Download Trial Version
+
<br><br>2. Use File | Open and point the program to the BlackBerry backup file (.ipd).
+
<br><br>3. Navigate to the appropriate content by using the navigator icons on the left.
+
  
== Blackberry Simulator ==
+
#* Instead of switching off, it may be better to remove the battery. Phones run a different part of their program when they are turned off.  You may wish to avoid having this part of the program run.
  
This is a step by step guide to downloading and using a Blackberry simulator. For this example I downloaded version 4.0.2 in order to simulate the 9230 series.
+
#* Note that removing the battery or powering off a mobile phone may introduce a handset unlock code upon powering the device on.
  
1. Select a simulator to download from the drop-down list on the [https://www.blackberry.com/Downloads/entry.do?code=060AD92489947D410D897474079C1477]Blackberry website. Click ''Next''.
+
# Collect and preserve other surrounding and related devices. Be especially careful to collect the power charger. The phone's battery will only last a certain amount of time. When it dies, much of the data on the device may go too!
 +
 +
# Plug the phone in, preferably in the evidence room, as soon as possible.
 +
# Retain [[search warrant]] (if necessary - [[LE]]).
 +
# Return device to forensic lab if able.
 +
# Use [[forensically sound]] tools for processing. However, also remember ACPO Principle 2 says: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
  
2. Look through the list and download BlackBerry Handheld Simulator v4.0.2.51.
+
== Notes ==
  
3. Enter your proper user credentials and click ''Next'' to continue.
+
Expand on as to what to collect:
  
4. On the next page, reply accordingly to the eligibility prompt and click ''Next'' to continue.*
+
* [[ESN]],
 +
* [[IMEI]],
 +
* [[Carrier]],
 +
* Manufacturer,
 +
* Model Number,
 +
* Color, and
 +
* Other information related to [[Cell Phone]] and [[SIM Card]]...
  
5. Agree or disagree to the SDK agreement and click ''Submit'' to continue.*
+
Process:
 +
# Photograph the [[Cell Phone]] screen during power up.
 +
# Research the [[Cell Phone]] for technical specifications.  
 +
# Research the [[Cell Phone]] for forensic information.
 +
# Based on phone type [[GSM]], [[CDMA]], [[iDEN]], or [[Pay As You Go]] determine acquisition tools
  
6. The next page will provide you with a link to download the .ZIP file containing the wanted simulator.
+
GSM:
 +
# Phone and SIM Card
 +
# SIM Card
  
* - If you disagree at any of these point you will not be able to continue to the download.
+
CDMA:
 +
# Phone
  
INCOMPLETE, WILL COMPLETE BY 11.3.2008
+
iDEN:
 +
# Three major tools exist for iDEN Phones:
 +
* iDEN Companion Pro
 +
* iDEN Media Downloader
 +
* iDEN Phonebook Manager
  
== Blackberry Protocol ==
+
Pay As You Go:
http://www.off.net/cassis/protocol-description.html
+
# Phone
  
Here is a useful link to the Blackberry Protocol as documented by Phil Schwan, Mike Shaver, and Ian Goldberg. The article goes into great description of packet sniffing and the protocol as it relates to data transfer across a USB port.
+
== External Links ==
 +
 
 +
Articles and Reference Materials
 +
*[http://www.e-evidence.info/cellarticles.html E-Evidence.Info Articles, Papers, Presentations, etc.]
 +
*[http://esm.cis.unisa.edu.au/new_esml/resources/publications/forensic%20analysis%20of%20mobile%20phones.pdf Forensic Analysis of Mobile Phones]
 +
*[http://www.ijde.org/docs/03_spring_art1.pdf Forensics and the GSM Mobile Telephone System]
 +
*[http://www.cl.cam.ac.uk/~fms27/persec-2006/goodies/2006-Naccache-forensic.pdf Law Enforcement, Forensics and Mobile Communications]
 +
*[http://www.forensics.nl/mobile-pda-forensics Mobile Phone Forensics & PDA Forensics Links]
 +
*[http://www.holmes.nl/MPF/FlowChartForensicMobilePhoneExamination.htm Netherlands Forensic Institute: Mobile Phone Forensics Examination - Basic Workflow and Preservation]
 +
*[http://csrc.nist.gov/mobilesecurity/publications.html#MF U.S. National Institute of Standards and Technology Documents]
 +
 
 +
Conferences
 +
*[http://www.MobileForensicsWorld.com/ Mobile Forensics World]
 +
 
 +
Investigative Support
 +
*[http://www.search.org/files/pdf/CellphoneInvestToolkit-0806.pdf Creating a Cell Phone Investigation Toolkit: Basic Hardware and Software Specifications]
 +
*[http://www.e-evidence.info/cellular.html E-Evidence.Info Mobile Forensic Tools]
 +
*[http://www.forensicfocus.com ForensicFocus.com(Practitioners Forum)]
 +
*[http://www.hex-dump.com Hex-Dump.com(Advanced Forum for Hex Dump and Memory Analysis)]
 +
*[http://www.Mobile-Examiner.com Mobile-Examiner.com (Forum for Practitioners)]
 +
*[http://www.Mobile-Forensics.com Mobile-Forensics.com (Research Forum for Mobile Device Forensics)]
 +
*[http://www.mfi-training.com Mobile Forensics Training Forum (Mobile Device Investigative Support and Training)]
 +
*[http://www.SmartPhoneForensics.com SmartPhoneForensics.com (Mobile Device Forensics Training and Investigative Support)]
 +
*[http://www.Phone-Forensics.com Phone-Forensics.com (Advanced Forum for Practitioners)]
 +
*[http://trewmte.blogspot.com TREW Mobile Telephone Evidence (Mobile Telephone Evidence Practitioner Site)]
 +
 
 +
Phone Research
 +
*[http://www.GSMArena.com GSMArena.com (Technical information regarding GSM Cell Phones)]
 +
*[http://www.MobileForensicsCentral.com MobileForensicsCentral.com (Information regarding Cell Phone Forensic Applications)]
 +
*[http://www.PhoneScoop.com PhoneScoop.com (Technical information regarding all Cell Phones)]
 +
*[http://www.ssddforensics.com/ Small Scale Digital Device Forensics Information]
 +
 
 +
Training
 +
*[http://www.Mobile-Forensics.com Mobile-Forensics.com (Research Forum for Mobile Device Forensics)]
 +
*[http://www.MobileForensicsWorld.com/Training.aspx Mobile Forensics World Training]
 +
*[http://www.mobileforensicstraining.com Mobile Forensics Training (Mobile Forensics Inc. Training Class site)]
 +
*[http://www.paraben-training.com/training.html Paraben-Forensics.com (Paraben's Handheld Forensic Training Classes)]
 +
*[http://www.SmartPhoneForensics.com SmartPhoneForensics.com (Mobile Device Forensics Training and Investigative Support)]
 +
*[http://www.msab.com/training/schedule Micro Systemation Training (Mobile Forensics Training)]

Latest revision as of 09:27, 11 May 2011

Guidelines

  1. If on, switch it off. If off, leave off.
    • Note only under exceptional circumstances should the handset be left switched on and in any case every precaution to prevent the handset connecting with the Communication Service Provider should be made. Consider use of one of many wireless preservation or RF isolation techniques. Note that the slightest signal leakage will allow an overwriting text message through even if a phone call can't get through.
    • Instead of switching off, it may be better to remove the battery. Phones run a different part of their program when they are turned off. You may wish to avoid having this part of the program run.
    • Note that removing the battery or powering off a mobile phone may introduce a handset unlock code upon powering the device on.
  1. Collect and preserve other surrounding and related devices. Be especially careful to collect the power charger. The phone's battery will only last a certain amount of time. When it dies, much of the data on the device may go too!
  1. Plug the phone in, preferably in the evidence room, as soon as possible.
  2. Retain search warrant (if necessary - LE).
  3. Return device to forensic lab if able.
  4. Use forensically sound tools for processing. However, also remember ACPO Principle 2 says: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Notes

Expand on as to what to collect:

Process:

  1. Photograph the Cell Phone screen during power up.
  2. Research the Cell Phone for technical specifications.
  3. Research the Cell Phone for forensic information.
  4. Based on phone type GSM, CDMA, iDEN, or Pay As You Go determine acquisition tools

GSM:

  1. Phone and SIM Card
  2. SIM Card

CDMA:

  1. Phone

iDEN:

  1. Three major tools exist for iDEN Phones:
  • iDEN Companion Pro
  • iDEN Media Downloader
  • iDEN Phonebook Manager

Pay As You Go:

  1. Phone

External Links

Articles and Reference Materials

Conferences

Investigative Support

Phone Research

Training