Top-Rated Free Essay
Preview

Phone

Good Essays
3477 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phone
SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

1

The Fraternal Clone Method for CDMA Cell Phones
Det. Cynthia A. Murphy
Abstract - There are times during the examination of CDMA cell phones where the available phone forensics tools do not allow the forensic examiner/analyst to extract the data they need from the device. At other times, the available tools may allow the forensic examiner/analyst to extract the full file system of a CDMA phone, but data contained in the file system is encoded in a proprietary manner and cannot be decoded using forensic tools such as EnCase or FTK. Additionally, there are a number of situations that might preclude a forensic examiner/analyst from using a camera to document the data on a phone, such as when the phone’s LCD screen is broken, the phone itself is broken, or the forensic examiner/analyst wishes to avoid physical manipulation of the phone to the extent possible during the examination. The CDMA Fraternal Clone method will allow the forensic examiner/analyst to transfer all user-created files and current settings from one CDMA phone into another phone, so that the target phone (CDMA Fraternal Clone) can be examined. The CDMA Fraternal Clone is used as a means to view the user created data and settings from the original phone in their native format allowing the forensic examiner/analyst to view and work with the extracted data in a way that emulates the original phone. Index Terms - CDMA Cell Phone, CDMA Clone, Mobile Phone, BitPim, broken cell phone, broken mobile phone, Mobile Phone Forensics, Cell Phone Forensics, Cell Phone Forensics Techniques, CDMA, ESN, MIN, CDMA Protected Files

The CDMA Fraternal Clone method will allow the forensic examiner/analyst to transfer all user-created files and current settings from one CDMA phone into another, so that the target phone (CDMA Fraternal Clone) can be examined. The CDMA Fraternal Clone is used as a vehicle to view the user created data and settings from the original phone in their native format. The CDMA Fraternal Clone process allows the forensic examiner/analyst to view and work with the extracted data in a way that emulates the original phone.

I. INTRODUCTION

T

HERE are times during the examination of CDMA cell phones where the available phone forensics tools do not allow the forensic examiner/analyst to extract the specific data they need from the device. At other times, the available tools may allow the forensic examiner/analyst to extract the full file system of a CDMA phone, but data contained in the file system is still encoded in a proprietary manner and cannot be decoded using forensic tools such as EnCase or FTK. When these situations arise, a common fall back method is to document the contents of the phone screen by screen, using a camera system such as Project-A-Phone or ZRT. There are a number of situations that might preclude an forensic examiner/analyst from using a camera to document the data on a cell phone using screenshots, such as when the phone’s LCD screen is broken, the phone itself is broken, or the forensic examiner/analyst wishes to avoid physical manipulation of the phone to the extent possible during the examination. With GSM cell phones, a common solution used during the examination of the phone is to clone the SIM card from the evidentiary phone and to insert the cloned SIM card into another GSM phone to complete the examination. This method is not an option for CDMA phones because the data exists on internal storage chips within the phone and not on a SIM card.

Figure 1: Using the CDMA Fraternal Clone method, it is possible to transfer user data and settings from a broken CDMA phone to an intact one in order to view data from the original phone in its native format.

II. USES AND LIMITATIONS OF THE CDMA FRATERNAL CLONE
METHOD

The CDMA Fraternal Clone method may be helpful to the forensic examiner/analyst under the following circumstances: 1. A CDMA cell phone is damaged or broken in a way that does not allow the forensic examiner/analyst to view the data displayed on the LCD screen, 2. The forensic examiner/analyst would like to work with the data extracted from a CDMA phone with minimal physical manipulation of the original evidence, 3. Available software tools don’t report all of the pertinent data from the broken phone such as the duration of the last call or other data of importance to the investigation, 4. Available software tools report conflicting information regarding data on the broken phone. Limitations: In order for the CDMA Fraternal Clone method to be successful, the phone must not be so damaged that the data on the phone isn’t accessible electronically and the data port must be functional. This method may not be successful on all CDMA based smart phones, but does work with some such phones. If the forensic examiner/analyst is unable to access

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

2

and create a copy of the file structure of the phone, this method will not be effective. III. CREATING A CDMA CELL PHONE FRATERNAL CLONE The goal of creating a CDMA Fraternal Clone is to transfer all of the user settings and user created data from the evidentiary phone into a second phone that is identical in make, model and firmware version. The resulting “Fraternal Clone” is so named because although the user data in the fraternal clone will be identical to that in the original phone, some system files will differ from phone to phone. This is an expected result: phone manufactures and service providers protect certain system files such as the Electronic Serial Number (ESN) as a method of preventing CDMA cloning fraud [1]. CDMA devices are protected by Electronic Serial Numbers (ESN), which acts as the authentication facility between the devices and the network [2].1 IV. HARDWARE AND SOFTWARE REQUIREMENTS In order to successfully complete the CDMA Fraternal Clone process, the following hardware and software is necessary: • Forensic computer • Correct USB Cable and drivers for the CDMA phone • A CDMA phone of same make, model, and firmware version of original phone 2 • Cell phone software/equipment capable of extracting or creating an image of the file system of the CDMA phone such as BitPim,3 Paraben’s Device Seizure, or Cellebrite V. THE CDMA FRATERNAL CLONE PROCESS The process of creating a CDMA Fraternal Clone phone consists of four phases: (1) preparation of the forensic machine and the target phone; (2) creation of a full copy of the file structure of the evidentiary phone; (3) transfer of the data extracted from the evidentiary phone to the target phone to create the CDMA Fraternal Clone, and (4) verification of the integrity of the data transferred from the evidence phone to the CDMA Fraternal Clone. Phase 1 - Prepare the forensic machine and target phone: • Ensure that all necessary software and drivers are installed on the forensic computer:
1



Applicable cell phone and cable drivers Chosen software for extracting the logical file system of from the evidentiary cell phone (Instructions for using BitPim are included here.) Clear the data from the target phone: o Ensure that the target phone (the eventual CDMA Fraternal Clone) is reset to factory default settings. 4 o Physically check the target phone to ensure that it contains no remaining user data. If there are extra files and folders on the target phone from previous user installed application installations that are not removed by the factory reset process, the forensic examiner/analyst may wish to delete these files and folders using BitPim prior to beginning the Fraternal Clone Process. o The target phone will maintain its original ESN and other manufacture and/or carrier protected files. o o

Phase2 - Create a full copy of the file structure of the evidentiary phone: • Using BitPim, set up a read-only session for the original evidence phone. Follow the instructions described in “Setting Up BitPim to Extract &Document Cell Phone Data” in Appendix A. Following this process carefully will prevent co-mingling of data between cases and between phones. • Attach the evidentiary phone to the forensic computer and ensure that the phone is recognized in BitPim. If the phone isn’t recognized automatically in BitPim, try clicking the “Find Phone” icon.

Figure 2: BitPim Find Phone

“A CDMA device is protected by an Electronic Serial Number (ESN), which acts as the authentication facility between the devices and the network. So in the CDMA world, instead of approaching fraud from the ESN side, criminals are more likely to try to obtain handsets or network access fraudulently and build their attacks from there.” 2 It is easier than may be expected to find phones of the same make, model, and firmware. Good sources of target phones are cell phone recycling companies, and cell phone donation programs, and ebay.com. 3 Instructions for using BitPim to extract the file structure from CDMA cell phones are described in this document.



BitPim will notify you when the phone has been detected, and will inform you of the phone’s status on the bottom panel of the BitPim screen.

4

Instructions for resetting CDMA phones to factory default can be found in the user manual for the phone, or at phone recycling sites such as: http://www.recellular.com/recycling/ data_eraser/default

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

3

Figure 3: BitPim Phone Recognized

TROUBLESHOOTING HINTS: If the phone isn’t recognized automatically in BitPim, go to Edit >Settings and either choose the correct make/model of phone or choose Other CDMA Phone. Then choose Edit>Detect Phone. You may have to manually set the correct port for the phone in BitPim. To set the port manually, choose Edit>Settings>Browse and find the correct port setting. • Once the phone is detected by BitPim, choose View > View Filesystem. , (Even if BitPim reports that it doesn’t detect the phone, this may still work.)

Figure 5: BitPim View Filesystem - expanded

o

Once the file system of the phone is displayed in BitPim, right-click on the root of the file system and choose “Backup entire tree”.

Figure 4: BitPim View Filesystem Figure 6: Bit Pim - Backup Entire Tree



Next, click on the file system icon on the left side of the window. Once you see the folder in the middle pane of BitPim, click on the plus sign, and BitPim will begin to read and display the file system of the phone.

o

BitPim will then allow you to save the file system of the phone to a .zip file on your forensic machine. Save the .zip file in the proper directory on your forensic computer, and make sure to give it an identifiable file name.

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

4

Figure 7: BitPim – Backup Entire Tree – Save to .zip file

TROUBLESHOOTING HINT: You may need to copy out each folder individually from the file structure of the phone, depending on the make and model of the phone you are working with. To do so, right click on each folder and save it out to your forensic machine. o Once you have successfully obtained a copy of the logical file structure from the phone, secure your original evidentiary phone.

Figure 8: BitPim – Restore from Backup

TROUBLESHOOTING HINT: If the BitPim restore function does not work, each folder or file may need to be added manually. To manually restore the file system of the phone, unzip the archive you created earlier from the evidence phone and drag and drop the folders and files individually. o Once you have successfully restored the files from the original phone to the target phone, your CDMA Fraternal Clone is complete.

Phase 3 - Transfer the data back into the target phone to create the CDMA Fraternal Clone: o Set up a BitPim session for the target phone. Follow the instructions described in “Setting Up BitPim to Extract &Document Cell Phone Data:” in Appendix A. Following this process carefully will prevent co-mingling of data between cases and between phones. o Select Edit >Settings and then uncheck the box titled “block writing data to the phone”. This will allow you to write the data extracted back to the target phone. o Attach the Target phone to the forensic computer using the correct USB Cable. o Choose View > View Filesystem and view the file system of target phone in BitPim. 5 o Right click on the root of the directory (/) and select Restore… Locate the backup of the evidentiary .zip created earlier and click open.

Phase 4 - Verify the data transferred from the evidence phone to the CDMA Fraternal Clone: 1. To ensure that the user data and settings transferred from the evidence phone to the CDMA Fraternal Clone are identical, create a logical image of the file structure of the fraternal clone phone with BitPim, using the “back up entire tree” option described earlier. 2. Using EnCase, FTK, or another tool that has the ability to analyze hash values, compare the hash values of the files from within the archive files of the evidence phone and the CDMA Fraternal Clone phone. 6 o You should find that the hash values related to the user-created data on the evidence phone and the CDMA Fraternal Clone are identical. 3. Those files that are system generated and/or protected will not have identical hash values. After completion of the above processes, the CDMA Fraternal Clone Phone will contain all of the data from the evidence phone, and the CDMA Fraternal Clone Phone can be used to view the files extracted from the evidence phone in their native format.

5

Caution: Because you have disabled the function to block writing data to the phone, this will allow you to not only view, but also to manipulate the file system of target phone directly.

6

Note that the archive files from the original phone and the cloned phone will not be identical because they contain the protected system files from the originating phones.

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

5

REFERENCES VI. ABOUT BITPIM BitPim is an open source tool designed to allow the user to view and manipulate data on cell phones (www.bitpim.org). BitPim runs on Windows, Linux and Mac. The latest version of BitPim can be found at www.bitpim.org. (As of the writing of this document, the current version of BitPim is: 1.0.7) VII. VALIDATION OF THE CDMA FRATERNAL CLONE METHOD The CDMA Fraternal Clone method was tested and results successfully replicated at the Champlain College Center for Digital Investigation, and by the Cyber Forensics Program, College of Technology at Purdue University. VIII. SUMMARY Under circumstances where cell phone forensic tools do not allow the forensic examiner/analyst to extract or view the data they need from a device; available tools allow the extraction of the file system of a CDMA phone, but data contained in the file system is encoded and unreadable; or when the phone’s LCD screen is broken, the phone itself is broken, the CDMA Fraternal Clone method will allow the forensic examiner/analyst to transfer all user-created files and current settings from one CDMA phone into another, so that the CDMA Fraternal Clone phone can be examined. The CDMA Fraternal Clone is used to view user created data and settings from the original phone in their native format. The CDMA Fraternal Clone process allows the forensic examiner/analyst to view and work with the extracted data in a way that emulates the original phone. ACKNOWLEDGEMENT The CDMA Fraternal Clone method was developed during the course of an ongoing homicide investigation to address limitations of current phone forensics tools in reporting data extracted from a severely broken phone. The author would like to express her gratitude to Richard Mislan, Richard Ayers and Gary Kessler for making themselves available for consultation and advice during the homicide investigation. The author recognized that external testing and validation of the method would be necessary in the event of a trial. The author would like to thank Jeff Lessard and Gary Kessler at Champlain College Center for Digital Investigation, and Matt Levendowski and Richard Mislan in the Cyber Forensics Program, College of Technology at Purdue University for their assistance in the testing and validation of the CDMA Fraternal Clone Method. The author would also like to acknowledge the contributions of Garilyn Truttschel, Sam Brothers, and Gary Kessler who reviewed and commented on this document.
[1] Federal Communications Commission. (November ,2008). FCC consumer advisory: cell phone fraud. Retreived from htttp://www.fcc.gov/cgb/consumerfacts/ cellphonefraud.html [2] Henegouwen, E. B. (Winter, 2008). Protecting mobile networks from fraudulent attack. Retreived from www.cita.org/advocacy/index.cfm/ AID/11210

Cynthia A. Murphy is a Detective with the City of Madison, Wisconsin Police Department and has been a law enforcement officer since 1985. She is a certified computer forensic examiner and has directly participated in the forensic examination hundreds of digital devices pursuant to criminal investigations of various types of crimes including homicides, missing persons, computer intrusions, sexual assaults, child pornography, financial crimes, and other investigations. She has successfully utilized her skills in the investigation and prosecution of numerous criminal cases involving digital evidence and has testified as an expert in both state and federal court. Det. Murphy is also a part time Digital Forensics instructor at Madison Area Technical College.

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

6

APPENDIX A Setting Up BitPim to Extract &Document Cell Phone Data: BitPim software can be set up to store data from multiple phones in separate storage areas, preventing the co-mingling of data between cases and between phones. 1. Install BitPim Software – www.sourceforge.net/ projects/bitpim 2. Create a Master Copy of BitPim. The BitPim Master will be the starting point for each phone you process: a. Create a Folder on your desktop (or elsewhere if you want) named “BitPim Master” b. Open BitPim. Set up BitPim to Block Writing Data to the Phone: From the upper right menu bar, choose >Edit >Settings

5. Next, choose, Data >Create New Storage in the upper right menu bar of BitPim. 6. In the “Storage Name” box, type “BitPim Master”

3.

7.

In the “Select New Storage Dir” box, browse to the BitPim Master folder you created earlier.

4.

The Settings screen will appear. Click the box “Block writing anything to the phone.” Set Phone type to “Other CDMA Phone” and Com Port to “Auto”

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

7

8.

In the “Select Options” box, select “Use Current Settings”

9.

You will now see a box called “Selection Summary.” Check your settings to be sure they are correct and then click “Finish”. If so, you have successfully configured the master copy of BitPim.

12. Create a unique name for the new instance of BitPim. Choose a name that will allow you to specifically identify the phone you are working on (case number, make, model, property tag or other unique ID.)

10. Once you are finished with the above process, EXIT OUT OF BITPIM. 11. For each phone that you process, you will create a new storage area for the individual phone. a. Start by opening the BitPim Master that you created above. b. From the BitPim Master, create a new instance of BitPim. In the upper right menu bar, choose >Data >Create New Storage

13. Create a unique folder for each cell phone you process. Again, choose a unique name for the folder (case number, make, model, property tag or other unique ID.) Browse to that storage location in BitPim, and then choose Next.

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# 1941-6164

8

14. In the Select Options dialog box, select “Use Current Settings” and then choose Next.

15. A summary dialog box will appear showing your selections. If you want to change anything, hit the back button and change the settings accordingly.

16. Close out of the BitPim Master, and open up the new BitPim storage area you created for the phone you are working on. Use this instance of BitPim to process the phone. While it may seem that this is a lengthy process to go through for each phone, once you get a couple of repetitions in, it will become second nature. This process will ensure that the data you extract from each individual phone is not co-mingled in BitPim.

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile Data Technology is connected to live scan these device works effectively together by how they link offenders together by fingerprints. The two device communicate by the information that they both hold these system helps the criminal justice field in many different but when officer are out in the field these systems help with solving a problem in a speedy amount of time. (Security Info Watch, 2010).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    After the interview, I Detective L. Donegain brought Margaret Grant to the Police Department in-reference to having her cellphone downloaded. I obtained written consent from Margaret Grant and obtained her phone from her along with the pass code.…

    • 675 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    CCJS321 Project 1

    • 1347 Words
    • 4 Pages

    K-Mart Corp. v. Trotti, 677 S.W.2d 632 (Court of Appeals of Texas, Houston First District 1984).…

    • 1347 Words
    • 4 Pages
    Better Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Mobile Phone

    • 215 Words
    • 1 Page

    A company produces accessories for smart phones and tablets. The profit on each smart phone case is $2, and the profit on each tablet case is $3. The company made a profit of $1,200 on the cases last month. The equation 2x + 3y = 1,200 represents the company's profit from cases last month, where x is the number of smart phone cases sold and y is the number of tablet cases sold.…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    **Collection**Any and all investigating officers should keep this in mind as well as have a warrant baring the proper wording and language that adheres to search and seizure of a personal computer in order to avoid violating any privacy rights. First the officer should check to see if the computer is on or off. If an officer finds that the computer is not on, he or she should not turn it on the evidence must not be altered; however if the officer finds the computer on then the officer should photograph the screen even if the screen is in sleep mode. Once the computer is photographed the power should be disconnected. In other words the modem should be drained of power by unplugging it. Next the officer should be sure to insert a police disc into the CD or DVD drive; bear in mind the disc should be blank and after inserting it the drive should be sealed. All other hardware connected to the system should be photographed in order to have a record of how the system was…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    References: Dahake, S. & Daware, S. (2012). A Study of Digital Forensic: Process and Tools. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), (10).…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Csi Effect

    • 1232 Words
    • 5 Pages

    References: * forensics. (n.d.) The American Heritage® Dictionary of the English Language, Fourth Edition. (2003). Retrieved January 24 2012 from http://www.thefreedictionary.com/forensics…

    • 1232 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Trace Evidence

    • 963 Words
    • 4 Pages

    Deedrick, D. W. (2000). Forensic Science Communications. Retrieved from The FBI Federal Bureau of Investigations: http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/july2000/deedric1.htm…

    • 963 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Peripheral devices, including VoIP devices, memory card readers, and USB and FireWire hubs. Information stored on these devices can be used as evidence, such as recently faxed or printed documents, sources for fingerprints, and other identifiers (National Institute of Justice, 2008).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays