Book Review: Digital Forensics For Handheld Devices 87
benrothke writes "Today's handheld device is the mainframe of years past. An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use worldwide, it is imperative that digital forensics investigators and others know how to ensure that the information contained in them, can be legally preserved if needed." Read on for the rest of Ben's review.
In Digital Forensics for Handheld Devices, author Eamon Doherty provides an invaluable resource on how one can obtain data, examine it and prepare it as evidence for court. One of the reasons many computer crime cases fail to be prosecuted is that the evidence was not properly handled and could therefore not be admitted into court. Digital Forensics for Handheld Devices | |
author | Dr. Eamon P. Doherty |
pages | 336 |
publisher | CRC Press |
rating | 8/10 |
reviewer | Ben Rothke |
ISBN | 978-1439898772 |
summary | Valuable reference for digital forensics |
Once of the first things a defense attorney will do in a computer crime case is to attack how the digital evidence was obtained and preserved. In far too many cases, it was done incorrectly and the evidence, no matter that it may be a smoking gun, can't be admitted into court. The case then is dismissed, to the chagrin of the victim.
The books 8 chapters of nearly 300 pages are densely packed text, where Doherty brings significant real-world experience to every chapter. As the cybercrime training lab director at Fairleigh Dickinson University, he brings both an academic formality in additional to real-world experience in this highly tactical guide.
Chapter 1 details cell phone forensics. After a brief introduction to the history of the cell phone, it details the entire inner workings of a cell phone. The chapter also details differences in cell phones worldwide. An important fact is that many Asian countries have cell phones available 12-18 months before they appear in the US. With that, American forensic investigators need to be cognizant of this when entering into an investigation.
The chapter includes an overview of the Susteen Secure View application which is an extremely powerful tool for the mobile phone forensic investigator. Besides that tool, in each chapter, Doherty lists many tools that provide specific assistance to the topic at hand. The book is worth it for those listings alone.
Chapter 2 is similar to the previous chapter except this is about digital camera forensics. The chapter provides a detailed overview of how digital cameras operate and how the underlying hardware works. The chapter includes an extremely comprehensive overview of seemingly every tool available to investigate images on a digital camera.
The chapter also includes a number of fascinating case studies on how to effectively perform a forensics analysis of a digital camera. It concludes with an observation that when considering a career in forensics, as fascinating as it is; it may not be for everyone.
Doherty notes that as a forensics investigator, the examiner is often exposed to disturbing material. He quotes a report that studied investigators from over 500 agencies who had been exposed to child pornography during investigation of crime involving child exportation. The report noted an alarming 35% of the participants had problems arising from work exposure to child pornography.
Chapter 5 provides an extremely detailed look at forensics investigation on a corporate network. Throughout the book, Doherty stresses the need for effective chain of custody and other issues to preserve digital evidence. It is imperative to preserve the integrity of the digital evidence obtained from the time it was seized until it is presented in court.
To facilitate this, the book states a best practice to use checklists to ensure nothing is forgotten. The importance of checklists has been detailed in The Checklist Manifesto: How to Get Things Right where author Atul Gawande makes a compelling case for the use of checklists.
As to evidence and checklists, Doherty writes that once the evidence is obtained, a chain of custody form should be filled out. Each time the evidence is copied, processed, or transported, it should be documented on the chain of custody form. If others receive a copy of the evidence for prosecution or defense purposes, they too should sign for it. This is an imperative if it expected that the evidence would end up in court or be used for human resources purposes. But at the corporate setting detailed in chapter 5, that same level of diligence is not necessarily required.
Chapter 5 also has overviews of nearly 50 different forensic tools for every imaginable purpose.
While the book has exploratory and technical overviews on many tools and numerous case studies, this is not an introductory text on the subject. It is meant for someone with a technical background that is looking for a technical reference to gain competence on the topic of digital forensics.
The only lacking of the book is that while the author is an expert on the topic and the tools, the writing style is one that screams out for an editor. The text suffers from run on sentences and repetition of defining the same acronym, in addition to other readability issues. The book is pervasive its use of passive voice that can be annoying to many readers. It is hoped that the second edition of this book will be updated with the current tools of the time and a good re-editing of the text to ensure its readability doesn't suffer.
Aside from the grammatical issues, for those looking for a very hands-on guide to gain proficiency on the topic, Digital Forensics for Handheld Devices is a valuable reference. Dr. Eamon Doherty has a unique perspective in that he has academic, law enforcement and very practical experience, which is manifest in every chapter.
The notion of digital forensics is seize it, examine it and then prepare it for evidence in court. In Digital Forensics for Handheld Devices, you found out how to do just that.
Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.
You can purchase from amazon.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
to the chagrin of the victim? (Score:4, Insightful)
I would say it depends who is the 'victim'. Yes, protect your handheld data. Encrypt the hell out of it and/or find a good way to wipe it clean before the wrong people get to it..
Out, damn'd spot! out, I say! (Score:2)
Is there an app that will make my phone smoke and melt into itself, a la Mission Impossible, taking all of my pr0n with it? I wouldn't want that stuff to fall into the wrong hands. Like my wife.
Thanks for clearing up what Lady Macbeth was referring to!
Re: (Score:1)
Re: (Score:2)
Model rocket igniter in a packet of thermite, connected to relay off device battery, tripped by a stripped down version of the "android IOIO" type devices with only one io, soldered off the usb ports junction at the board, activated by android service running in background that pings a remote service.
Sounds complicated, but maybe...? :)
Re: (Score:2)
easy.
red phosphorous and a cigarette lighter.
I used to make diskette bombs with red phosphorous. Dramatic but fairly harmless. Unless you're a floppy disk drive.
Re: (Score:1)
My ass (Score:4, Interesting)
If I want it preserved, I'll copy it to local storage or upload it to the cloud if I so choose. Other than that, if I hit the wipe button there better be smoke coming from it.
If I wanted it "preserved" I wouldn't be wiping it out in the first place.
Re: (Score:1)
Re: (Score:3)
I think in some instances, it may be safer on the phone as it isits than in the cloud.
Take an iPhone, say. It's got some very strong protections and all that. But you could get at the same data by looking at the user's iTunes folder if they backed up there and didn't encrypt it. Or subpoena Apple who can dig it out (while the actual disks may be encrypted, the data is not when accessed).
Just knowing there's anothe
Re: (Score:2)
store important files on the smallest, fastest flash device you can get away with, encrypted (I use a 2GB drive for transient secure filing, archive secure filing is in a secret and secure location that is recorded nowhere but my brain). The wipe button should trigger a military-grade sector-by-sector overwrite, which on a solid state drive will be permanent, instant and unrecoverable.
Truecrypt does this.
Re: (Score:2)
So that read:
On the Subject of my ass: If I want it preserved, I'll copy it to local storage or upload it to the cloud if I so choose. Other than that, if I hit the wipe button there better be smoke coming from it.
Which was a little disturbing, but it was followed by the eminently sensible:
If I wanted it "preserved" I wouldn't be wiping it out in the first place.
Which I will now unfortunately have pop into my mind every time I throw used paper into the bowl.
Sounds pretty good, but... (Score:1)
Re: (Score:2)
Re:Sounds pretty good, but... (Score:5, Funny)
Ever try doing a port scan on a 286? Aint’ fun.
Oh, yea, I did that once, way back in the early '90s...
Still waiting on the results.
Re: (Score:1)
Re: (Score:1)
He might be enjoying it - could be a masochist...
Re: (Score:2)
He might be enjoying it - could be a masochist...
Nope, electro-sadist - I also flog the poor thing regularly with a Cat-o-Nine-Tails, just to keep it in line.
Re: (Score:2)
Back in the Day to do a "live report" in %remote location% you had to
1 fly a dozen support folks to %remote location%
2 with Trucks of equipment
3 and a sat uplink truck
and then hope and pray that something did not go wrong
Today (ignoring 3 for a bit)
1 fly your reporter to %remote location% WITH HIS iPhone (or Android device)
or
2 Airdrop your reporter with a Big BackPack (and his personal Mobile Computing Device)
and all you are praying for is that he gets Close Enough (but not To Close) to The Action
The Elder
Double-edged sword... (Score:2)
On one hand, dumping the contacts, text messages, and other items from a phone would be a vast boon for exposing a crime ring for investigators. However, on the other hand, any forensic device that can be used by LEOs can be used by criminals for gain as well.
If one separates a corporate officer from their phone and is able to completely dump the contents, it would mean a gold mine. Competitors would buy contact lists, spreadsheets (accounts payable/receivable), unannounced product sheets, etc. Employee
Re: (Score:2)
Computationally speaking, device-level encryption is probably sufficient, assuming there aren't any serious flaws found in AES-128. The weakness, if any exists, is in the choice of passphrase, and that won't be helped by adding more encryption tied to the same passphrase....
Re: (Score:3)
The trick with cellphones is less encryption than authentication. With the very small keyspace most people chose for a PIN, a device maker wants to have the PIN checking done on a hardened chip before the true 128 or 256 bit key is released. That way an intruder either has to guess through the chip (and be stopped/slowed down after a number of tries), or has to physically uncap the chip and go at it with an electron microscope (good luck.)
Of course, with a chip being the gatekeeper, it can easily be backd
Re: (Score:2)
Security [xkcd.com]
Re: (Score:3)
And assuming you have a magic UI that is both convenient yet also somehow lets people enter keys of sufficient entropy. If the user is entering 4-digit-PINs or stuff like that for a key, then it doesn't matter how excellent the cipher is.
Apple ad? (Score:1, Informative)
iPhone and Apple are trademarks..a generic "smartphone" terminology would have done the job pretty well
Re: (Score:2)
Yeah, and people still see my tiny $40 32GB Sandisk Sansa MP3 player and call it an "iPod".
You gotta hand it to those folks in Cupertino, they are marketing geniuses.
Something Apple will be good at, I'm sure! (Score:2)
Re: (Score:2)
I'm not sure if you are serious, but you are correct, except for you don't have to back up anything to the cloud. Also, the "disk" is encrypted and it has local and remote wipe capabilities.
Re: (Score:2)
Re: (Score:2)
Drill press through the Flash chip will "wipe it so that even the best forensics guys cant recover the data. another one is a good bon fire.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
-1 Dead Wrong.
Also, you don't need anything as expensive as a drill press. A hammer will do the job. All you have to do is split the core.
Re: (Score:1)
Re: (Score:2)
yeah, good luck with that #shock_degaussed_electronics
Re: (Score:1)
This cuts both ways... (Score:2)
Unlike other physical and tangle forms of evidence, digital evidence is both nothing and something at the same time. It's too easy to both plant evidence (by either the defendant or the prosecution) and sometimes impossible to deny the evidence.
Furthermore, digital evidence doesn't necessary mean that I am the author. I don't have my phone on me at all times. I let friends use it.
This being said, I'm not discounting the importance of forensics. I just think more needs to happen before we can say somethi
Re: (Score:2)
The decision about what is or is not evidence is not addressed at the time of the collection. The collection takes place, and then the lawyers sort through what they have to determine what is or is not relevant to the particular dispute or litigation taking place. Of course they will exclude those pictures of your cat, but you can bet that someone will have to look at that picture of your cat to determine that it truly is a picture of your cat.
Re: (Score:2)
if an iPad2 is comparable to a 1985 Cray 2, then an iPhone is a fully specced 1997 Compaq Proliant 2500 6/250H Model 1 (if you got one of the systems with matched Xeon processors like I have, then clock speed is 233MHz instead of 200). Not a minicomputer, more a small server.
Re: (Score:1)
Thank Goodness... (Score:1)
Forensics and BYOD (Score:4, Informative)
BYOD deserves mention in this context. While a lot of people are in love with the idea of bringing their own devices to work, they have not fully considered the legal implications of doing that. If an employer is involved in a dispute and there is any potential that any relevant information could be on the device, the device will be subjected to collection activities. Personal contacts, emails, photos, passwords (potentially) will be collected. The device owner will be without the device for hours, or potentially even days or weeks while the forensics are done.
I have seen it happen. I work with a company that has an established presence in the eDiscovery / EDRM space. Our teams are out doing forensic collections all the time, and it is more and more common to see employees end up in pissing matches with their internal legal and HR departments over who "owns" a device that has been used for work purposes. The employee always loses. Having paid for a device does not exclude them from the collection process.
Re: (Score:2)
And when the employee decides to just quit, what do you do then? Or if they decide to just not provide it to you, smash it or otherwise wreck it (how long does an iPhone have to be submerged in water to render the electronics inoperable)?
Re: (Score:2)
Then that employee gets to explain to the judge why they destroyed evidence. There is zero lag time between the employee being notified that they need to preserve their data and the requirement that they preserve their data. Once the employee is given notice, they are legally bound by a court order to cooperate. If they decide not to, they can have fun hanging out in jail.
If the employee has problems with their device being subject to litigation, they should not use their device for work related activiti
Re: (Score:2)
> what kind of shady business is your employer in that they're always being sued?
hahaha. You must not be from the U.S.
Re: (Score:3)
common to see employees end up in pissing matches with their internal legal and HR departments over who "owns" a device that has been used for work purposes.
Wrong, absolutely wrong. "Ownership" is not ambiguous. I have a true story. About 30 years ago I worked at a bank. One teller would put a stack of $20bills in his pocket every day. ($2000). Every night, he would take it out of his pocket and put it in his cash draw and settle. I asked him why he did this, he said, "in case I am robbed, I get to keep it."
Back to the phone. If the employee buys the phone and pays the bills, the company has no "rights" to that device. In fact "sarbanes oxley" says that compani
Digital Forensics degree (Score:1)
Good read. (Score:2)
Step 1 NEVER use any cloud systems for backups. all they have to do is supeona Apple to get your iphone data, or Google to get your android data.
step 2 set the encryption. They cant read the contents if you have strong encryption.
step 3 Live paranoid. If you are near a river and a cop is trying to steal your phone, Throw it hard into the river. They will never recover it. Be ready to destroy it, I mean really destroy it like wrapped in Det cord, thermite, drill press through the flash chip kind of
"it is imperative" (Score:2)
Re: (Score:2)
Indeed. There's no reason to assume that the courts are not an integral. opponent of a functioning police state.
Re: (Score:2)
integral component, not integral opponent. Cripes. the cops must have implanted something on my iPad that neutralizes my impassioned political critiques.
Good old passive voice (Score:1)
It is to be hoped that critiques of the use of the passive voice are not self conciously ironic.
Supercomputer of yore (Score:2)
"Today's handheld device is the mainframe of years past."
Isn't it more like today's handheld is the supercomputer of decades past? A mainfarme excels in crunching databases, while a supercomputer excels at doing "tasks" faster than even the typical liquid nitrogen-cooled desktop.
Note that I'm using "task" in not in the computer sense of "multitasking", but int the human sense of an activity that a single user might want a computer to perform, like solving a complex equation or modeling a hurricane. While th