Smartphone Forensics and Security MOD 5

Jul 1, 2025

Overview

The transcript discusses how law enforcement accesses data on smartphones using specialized forensic tools, the technology behind these tools, their limitations, and basic advice for protecting personal device data.

Law Enforcement Use of Smartphone Forensics

  • Police often need to access locked smartphones during investigations.
  • Tools like Cellebrite UFED help law enforcement bypass security measures and extract data.
  • UFED comes in different forms and can retrieve data from phones and SIM cards.
  • Data extraction success depends on device model, iOS version, and encryption state.

Encryption States and Vulnerabilities

  • A phone can be in "Before First Unlock" (BFU) or "After First Unlock" (AFU) states.
  • BFU: Device data is strongly encrypted and generally inaccessible without the passcode.
  • AFU: Device is less protected since more encryption keys are stored in memory.
  • Cellebrite tools are less effective in BFU; brute force attacks are sometimes attempted.
  • Most devices seized are in AFU, where exploits are more likely to succeed.

Forensic Tool Capabilities and Secrecy

  • Cellebrite and similar companies keep technical details secret to prevent device makers from patching exploits.
  • Tools can extract app data, browser history, location history, and social media information.
  • Cloud data extraction is possible if login credentials or session tokens are available; they do not hack cloud accounts directly.

Prevalence and Use Cases

  • Cellebrite serves over 7,000 customers in 150 countries, including law enforcement, airports, and schools.
  • Some US school districts use these tools to search student phones.
  • Global calls for backdoors and weaker device security are increasing.

User Security Recommendations

  • Using a longer, alphanumeric passcode greatly increases protection against brute force attacks.
  • A six-digit PIN can be guessed in hours, while a 10+ character passcode may take decades.
  • Most iPhones allow quick disabling of biometric unlock by pressing the side button five times.

Questions / Follow-Ups

  • The transcript ends by prompting reflection on who should be allowed access to such forensic technology.