Early investigations consisted of live manual analysis of mobile devices; with examiners photographing or writing down useful material for use as evidence. Without forensic photography equipment such as Fernico ZRT, EDEC Eclipse, or Project-a-Phone, this had the disadvantage of risking the modification of the device content, as well as leaving many parts of the proprietary operating system inaccessible. In recent years a number of hardware/software tools have emerged to recover logical and physical evidence from mobile devices. Most tools consist of both hardware and software portions. The hardware includes a number of cables to connect the mobile device to the acquisition machine; the software exists to extract the evidence and, occasionally, even to analyze it. Most recently, mobile device forensic tools have been developed for the field. This is in response both to military units' demand for fast and accurate anti-terrorism intelligence, and to law enforcement demand for forensic previewing capabilities at a crime scene, search warrant execution, or exigent circumstances. Such mobile forensic tools are often
ruggedized for harsh environments (e.g. the battlefield) and rough treatment (e.g. being dropped or submerged in water). Generally, because it is impossible for any one tool to capture all evidence from all mobile devices, mobile forensic professionals recommend that examiners establish entire toolkits consisting of a mix of commercial, open-source, broad support, and narrow support forensic tools, together with accessories such as battery chargers, Faraday bags or other signal disruption equipment, and so forth.
Commercial forensic tools Some current tools include Belkasoft Evidence Center,
Cellebrite UFED, Oxygen Forensic Detective, Elcomsoft Mobile Forensic Bundle, Susteen Secure View, MOBILEdit Forensic Express, and
Micro Systemation XRY. Some tools have additionally been developed to address increasing criminal usage of phones manufactured with Chinese chipsets, which include
MediaTek (MTK),
Spreadtrum and
MStar. Such tools include
Cellebrite's CHINEX, and
XRY PinPoint.
Open-source Most open-source mobile forensics tools are platform-specific and geared toward smartphone analysis. Though not originally designed to be a forensics tool,
BitPim has been widely used on CDMA phones as well as LG VX4400/VX6000 and many Sanyo Sprint cell phones.
Physical tools Forensic desoldering Commonly referred to as a "chip-off" technique within the industry, the last and most intrusive method to get a memory image is to
desolder the
non-volatile memory chip and connect it to a memory chip reader. This method contains the potential danger of total data destruction: it is possible to destroy the chip and its content because of the heat required during desoldering. Before the invention of the
BGA technology it was possible to attach probes to the pins of the memory chip and to recover the memory through these probes. The BGA technique bonds the chips directly onto the
PCB through molten
solder balls, such that it is no longer possible to attach probes. Desoldering the chips is done carefully and slowly, so that the heat does not destroy the chip or data. Before the chip is desoldered the PCB is baked in an oven to eliminate remaining water. This prevents the so-called popcorn effect, at which the remaining water would blow the chip package at desoldering. There are mainly three methods to melt the solder: hot air, infrared light, and steam-phasing. The infrared light technology works with a focused infrared light beam onto a specific
integrated circuit and is used for small chips. The hot air and steam methods cannot focus as much as the infrared technique.
Chip re-balling After desoldering the chip a re-balling process cleans the chip and adds new tin balls to the chip. Re-balling can be done in two different ways. • The first is to use a stencil. The stencil is chip-dependent and must fit exactly. Then the tin-solder is put on the stencil. After cooling the tin the stencil is removed and if necessary a second cleaning step is done. • The second method is laser re-balling. Here the stencil is programmed into the re-balling unit. A bondhead (looks like a tube/needle) is automatically loaded with one tin ball from a solder ball singulation tank. The ball is then heated by a laser, such that the tin-solder ball becomes fluid and flows onto the cleaned chip. Instantly after melting the ball the laser turns off and a new ball falls into the bondhead. While reloading, the bondhead of the re-balling unit changes the position to the next pin. A third method makes the entire re-balling process unnecessary. The chip is connected to an adapter with Y-shaped springs or spring-loaded
pogo pins. The Y-shaped springs need to have a ball onto the pin to establish an electric connection, but the
pogo pins can be used directly on the pads on the chip without the balls.
Command line tools System commands Mobile devices do not provide the possibility to run or boot from a
CD, connecting to a
network share or another device with clean tools. Therefore, system commands could be the only way to save the volatile memory of a mobile device. With the risk of modified system commands it must be estimated if the volatile memory is really important. A similar problem arises when no network connection is available and no secondary memory can be connected to a mobile device because the volatile memory image must be saved on the internal
non-volatile memory, where the user data is stored and most likely deleted important data will be lost. System commands are the cheapest method, but imply some risks of data loss. Every command usage with options and output must be documented.
AT commands AT commands are old
modem commands, e.g.,
Hayes command set and
Motorola phone AT commands, and can therefore only be used on a device that has modem support. Using these commands one can only obtain information through the
operating system, such that no deleted data can be extracted. The SIM card is soundly analyzed, such that it is possible to recover (deleted) data like contacts or text messages. Note, this would not prevent writing or using the memory internally by the
CPU. The flasher tools are easy to connect and use, but some can change the data and have other dangerous options or do not make a complete copy. == Controversies ==