Lecture on Digital Forensics and Mobile Device Analysis
Introduction
- Speaker: Jessica Hyde
- Occupation: Digital Forensics Examiner, Adjunct Professor at George Mason University
- Runs a digital forensics company focusing on training and research
Teaching and Training
- Teaches mobile forensic analysis and data structures
- Offers training to law enforcement and civilians
- Chairs DFIR Review to support peer-reviewed research
Peer Review and Research
- Peer review: Assessment of study methodology and data validation
- Published work on file classification and forensic timelines
Forensic Data Analysis
- Focus: Mobile phones, Internet of Things (IoT) devices
- Tasks: Data extraction, analysis, and recovery
- Education: Masters in Digital Forensics, multiple certifications
Tools Used in Digital Forensics
- Reliance on tools for data extraction, not interpretation
- Importance of examiner expertise in providing context and meaning to data
- Use of multiple forensic tools (e.g., Celbrite, Magnet Axiom)
Issues with Forensic Tools
- Importance of human analysis beyond tool results
- Risks of over-reliance on parsed results
- Tools update regularly; cannot cover every app
Case Study: Jennifer McCabe's Phone
- Mandate: Analyze phone for user-initiated deletions within a specific timeframe
- Tasks: Examine web search deletions, phone call deletions
- Findings included web searches and call logs within specified dates
- Hashing: Ensured data integrity through hash validation
Analysis Methodology
- Examined databases and artifacts (e.g., browser state, history)
- Importance of manual testing in verifying forensic tool results
- Industry standards from NIST and SWDGE
Discussion on Specific Artifacts
- Clarification of timestamps significance in search activities
- Examination focused on understanding true search times
- Specific terms such as "How long to die in cold" analyzed
Cross-examination Highlights
- Questions on past cases and report discrepancies
- Discussion on potential errors in report findings
- Examination of secure handling of forensic devices
Conclusion
- Emphasis on comprehensive analysis rather than reliance solely on tool outputs
- Importance of peer-reviewed methodologies in forensics
- Ensured integrity of data and processes used in analysis
Additional Notes:
- Questions on device extraction process and best practices
- Differences between Celbrite and Axiom in artifact representation
- Importance of network isolation in forensic procedures
These notes provide a structured overview of key points discussed during the lecture on digital forensics with a focus on mobile device analysis. The lecture highlighted the complexities in forensic analysis, the importance of examiner expertise, and the necessity of using multiple tools and methodologies.