We spend much time and effort reviewing email and documents from corporate systems for electronic discovery. However, many times the key piece of communication may be overlooked on a smartphone (e.g. iPhone, Blackberry, Samsung Galaxy, etc.) where that “smoking gun” text communication may reside. Employees at corporations may use applications to text and for other purposes on phones. The most popular applications are supported for examination. There are so many permutations of smartphones and tablets your head may spin (Cellebrite has over 6,500 phones listed for their Logical product matrix alone). Unlike many corporations which systems are built upon Windows operating systems, smart phones have many more flavors of operating systems such as Android, iOS, Windows and Blackberry OS making interoperability of data preservation and analysis tools much more complex. As a result, specialized tools are needed that are more expensive to maintain since specific tools may work better at analyzing certain types of devices and applications. Although there are many specialized tools in the market, the mainstream ones as of this writing are Cellebrite, Oxygen, Susteen, XRY, Katana (Lantern) and Paraben. The quality of results can vary dramatically based on the tool and also the examiner’s training. For example, manual decoding may sometimes be an option to make data not easily parsed by a tool available for review. Also, the depth of the imaging process available may be the difference causing variance in price quotes from the vendor community. There are 3 types of images to contemplate when having a phone preserved and analyzed:
- 1) Physical Image – this bypasses the phone’s operating system and enables data to be preserved directly from the phone’s internal flash memory which includes unallocated space and deleted data. This extraction option is not available on all devices and is a bit-by-bit copy of the entire flash memory of a mobile device. This includes access to usually inaccessible partitions of the device.
- 2) File System Dump – this extraction option relies on the operating system of the device and allows access to active data as well as data that may be recognized by the file system as deleted or hidden data.
- 3) Logical Image – this extraction option relies on the device’s designated API (Application Programming Interface) and operating system and allows access to active data that is viewable. This is typically the quickest option, but does not provide access to deleted data.