CASE Sub-topic of Contacts
Mobile device forensics allows for investigators to obtain digital evidence and personal data from the user's cellular device. Data can be obtained through logical extraction in which live data can include call and text logs and contact lists. Moreover, investigators can look to recover information from physical sources, including external memory devices such as subscriber identification module (SIM) cards. The SIM card separates personal information (contacts and network settings) from the device. Its file system consists of a root directory file that is subdivided into directory and elementary files (DF and EF) that hold binary data.
Proper acquisition, examination, and analysis of the SIM card allow investigators access to the user's SMS messages and phone book contacts.
Washington County Law Enforcement has seized the mobile device of a low-level narcotics dealer. The department wants to identify individuals that the dealer has been in contact with and other movers that may be in the area. Firstly, the investigator ensures that the device is preserved in its original state and cuts off connection to all wireless networks. Using a write blocking device, he creates an exact sector-level duplicate. Software imaging tool ACME Mobile Device Imager is used to duplicate the device's primary storage, recording a SHA-256 hash. The original device is retained for analysis.
Following seizure and acquisition, the investigator begins a logical analysis by extracting live data of the dealer's contacts. The process of his logical extraction is as follows:
Next, he begins his analysis of SMS messages sent from the dealer's device and the phone contact list. He looks for signs of tampering by analyzing the duplicated image. To undergo SIM card forensics and analysis of the dealer's contacts, the investigator follows this process: