Type to search

An Introduction to Forensics Data Acquisition From Android Mobile Devices


An Introduction to Forensics Data Acquisition From Android Mobile Devices


A Page Design Pro  Digital Forensics Investigator (DFI) function is rife with non-stop gaining knowledge of opportunities, particularly as the era expands and proliferates into each nook of communications, amusement, and business. As a DFI, we address a day-by-day onslaught of the latest gadgets. Like the cell phone or pill, many of those gadgets use commonplace working structures that we want to be familiar with. Certainly, the Android OS is predominant within the pill and cell smartphone enterprise. Given the predominance of the Android OS inside the cellular device market, DFIs will run into Android gadgets within the route of many investigations. While numerous fashions recommend strategies to obtain records from Android gadgets, this newsletter introduces 4 possible methods that the DFI must bear in mind when proof gathering from Android devices.

A Bit of History of the Android OS

Android’s first commercial release came in September 2008 with model 1.0. Android is an open-source and ‘free to use’ operating gadget for cell gadgets developed through Google. Importantly, early on, Google and other hardware agencies shaped the “Open Handset Alliance” (OHA) in 2007 to foster and help Android boom inside the marketplace. The OHA now includes 84 hardware businesses and giants like Samsung, HTC, and Motorola (to call a few).

This alliance became mounted to compete with groups who had their personal market services, consisting of aggressive gadgets presented through Apple, Microsoft (Windows Phone 10 – which is now reportedly lifeless to the market), and Blackberry (which has ceased making hardware). Regardless if an OS is defunct or not, the DFI has to recognize approximately the numerous variations of a couple of operating machine platforms, particularly if their forensics cognizance is in a particular realm, such as cellular devices.

Linux and Android

The modern-day new release of the Android OS is based totally on Linux. Keep in mind that “based on Linux” does no longer imply the same old Linux apps will continually run on an Android. Conversely, the Android apps you would possibly revel in (or are acquainted with) will no longer always run on your Linux desktop. But Linux isn’t always Android. To clarify the factor, please be aware that Google selected the Linux kernel, the important part of the Linux operating system, to manage the hardware chipset processing so that Google’s builders wouldn’t be involved with the specifics of ways processing occurs on a given set of hardware. This allows their developers to recognize the broader working gadget layer and the user interface capabilities of the Android OS.


A Large Market Share

The Android OS has a full-size market percentage of the cellular tool market, normally due to its open-source nature. An extra 328 million Android gadgets had been shipped as of the third quarter in 2016. And, according to netwmarketshare.Com, the Android working machine had the majority of installations in 2017 — almost sixty-seven% — as of this writing.

As a DFI, we can assume to encounter Android-based hardware within the path of standard research. Due to the open-source nature of the Android OS at the side of the varied hardware systems from Samsung, Motorola, HTC, etc., the form of combos between hardware type and OS implementation affords an additional project. Consider that Android is currently at model 7.1.1. Still, every telephone producer and cell device supplier will generally alter the OS for the precise hardware and service services, giving an additional layer of complexity for the DFI because that method to data acquisition can also range.

Before we dig deeper into extra attributes of the Android OS that complicate the technique to data acquisition, let’s examine the concept of a ROM version to be carried out to an Android tool. As an outline, a ROM (Read Only Memory) application is low-level programming. This is close to the kernel degree, and the precise ROM software is regularly referred to as firmware. If you believe you studied in terms of a tablet in assessment to a cellular phone.

The tablet can have one-of-a-kind ROM programming compared to a cellular telephone, given that hardware features among the pill and cell cellphone can be specific, even if each hardware gadgets are from an identical hardware manufacturer. Complicating the want for greater specifics inside the ROM software, upload within the unique necessities of mobile provider carriers (Verizon, AT&T, and so forth.).

While there are commonalities of acquiring statistics from a mobile phone, now not all Android gadgets are the same, in particular in mind that there are fourteen fundamental Android OS releases on the market (from variations 1.0 to 7.1.1), a couple of vendors with version-particular ROMs, and further endless custom person-complied versions (purchaser ROMs). The ‘purchaser compiled variants’ also are model-specific ROMs. In standard, the ROM-level updates implemented to each wireless tool will incorporate operating and device primary packages that work for a specific hardware tool, for a given dealer (for instance, your Samsung S7 from Verizon), and specific implementation.

Even although there is no ‘silver bullet’ technique to investigating any Android tool, the forensics research of an Android device ought to follow the identical standard system for the collection of evidence, requiring an established method and approach that cope with the research, seizure, isolation, acquisition, examination, and analysis, and reporting for any virtual evidence.

When a request to look at a device is obtained, the DFI starts with making plans and coaching to encompass the needful method of acquiring gadgets, the necessary office work to guide and document the chain of custody, the development of a cause declaration for the examination, the detailing of the tool model (and different precise attributes of the received hardware), and a list or description of the information the requestor is looking for to accumulate.

Unique Challenges of Acquisition

Mobile gadgets, including cell telephones, pills, and so on., face unique, demanding situations for the duration of the proof seizure. Since battery existence is constrained on cell gadgets and it isn’t always recommended that a charger is inserted right into a tool, the isolation degree of proof amassing can be an important country in obtaining the device. Confounding right acquisition, the cellular statistics, WiFi connectivity, and Bluetooth connectivity must also be protected within the investigator’s recognition during acquisition.

Android has many security functions constructed into the smartphone. The lock-screen feature may be set as PIN, password, drawing a pattern, facial reputation, location reputation, depending on on-device reputation, and biometrics such as fingerprints. A predicted 70% of customers do use some protection on their phones. Critically, there may be an available software program that the consumer may additionally have downloaded, which could deliver them the potential to wipe the phone remotely, complicating acquisition.

Calvin M. Barker

Typical tv scholar. Problem solver. Writer. Extreme bacon fan. Twitter maven. Music evangelist. Spent a year consulting about salsa in Fort Lauderdale, FL. Spoke at an international conference about lecturing about junk food in New York, NY. Earned praise for promoting robotic shrimp in Phoenix, AZ. Spent 2002-2007 working on catfish in Naples, FL. Spent several months developing yogurt in Orlando, FL. Spent high school summers managing dandruff in Africa.