SIM Card Forensics: Digital Evidence
Total Page:16
File Type:pdf, Size:1020Kb
2016 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings May 26th, 9:00 AM SIM Card Forensics: Digital Evidence Nada Ibrahim Zayed University, College of Technological Innovation Nuha Al Naqbi Zayed University, College of Technological Innovation Farkhund Iqbal Zayed University, College of Technological Innovation, [email protected] Omar AlFandi Zayed University, College of Technological Innovation, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Aviation Safety and Security Commons, Computer Law Commons, Defense and Security Studies Commons, Forensic Science and Technology Commons, Information Security Commons, National Security Law Commons, OS and Networks Commons, Other Computer Sciences Commons, and the Social Control, Law, Crime, and Deviance Commons Scholarly Commons Citation Ibrahim, Nada; Al Naqbi, Nuha; Iqbal, Farkhund; and AlFandi, Omar, "SIM Card Forensics: Digital Evidence" (2016). Annual ADFSL Conference on Digital Forensics, Security and Law. 3. https://commons.erau.edu/adfsl/2016/thursday/3 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Forensic Investigation of SIM Card CDFSL Proceedings 2016 FORENSIC INVESTIGATION OF SIM CARD Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal and Omar AlFandi Zayed University College of Technological Innovation Abu Dhabi, P.O. Box 144534 {M80006330, M80004910, Farkhund.Iqbal, Omar.AlFandi}@zu.ac.ae ABSTRACT With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in terms of retrieving specific data; in the second set, genuine user data from eight different SIM cards is extracted and analyzed. The experimental results on a real-life dataset support the effectiveness of the SIM card forensics approach presented in this paper. Keywords: SIM card, Digital Forensics, Forensic tools, ICCID, IMSI INTRODUCTION Pictures/video clips on the phone or memory card. Regardless of its role in crime (direct or indirect), data within a mobile phone remains The SIM (Subscriber Identity Module) is a crucial. A wealth of information is stored on smart card that is used in mobile phones to cell phones that includes, but is not limited to, store user data and network information that call history, text messages, email messages, is required to activate the handset for use. SIM web pages, and photos. Mobile phone forensics, card demand has been growing worldwide on a the most challenging digital forensics field, yearly basis (ABIResearch, 2015) and is should be enriched with SIM card forensics. expected to break the record of 5.4 billion shipments for the year 2015 alone. Given this Most of the existing research is focused on widespread usage, a massive amount of searching for the following key evidence in a information is available for forensic mobile telephone: investigators. Calls made, including numbers Since the introduction of UMTS, better dialed, dates, and times. known as 3G technologies, USIM cards are Calls received, including numbers favored. While SIM cards provide network received, dates, and times. access, the tiny computer within a USIM enables it to handle several mini-applications Data stored within address and video calls if it is supported by the book/phone book. network and the handset. Integrated algorithm SMS details. users are protected from unauthorized access © 2016 ADFSL Page 219 ADFSL Conference Proceedings 2016 Forensic Investigation of SIM Card to their phone lines. Furthermore, data Exploring the amount of exchanges are encrypted with stronger keys information extracted from SIM than those provided by SIMs. Additionally, a cards; USIM’s phonebook is much bigger, with the Investigating whether the ability to store thousands of richer contacts extractable SIM card evidence is that might contain email addresses, photos, tool dependent; and several additional phone numbers. Evaluating the contribution of SIM card forensics provide valuable obtained evidence to SIM card information about contacts, SMSs, call logs, forensics; and much more. There are commercial and open-source tools that can assist an Investigating whether SIM cards investigator in extracting relevant evidence from different GSM Service from SIM cards. Providers offer different evidentiary The CDR, or ‘call detailed records’ in a data; SIM card, led to the arrest of the suspect A smartphone might be the key to an Sameer Vishnu Gaikwak in the murder of entire investigation; thus, an investigator’s Govind Pansare in Kolhapur earlier this year. task in uncovering evidence will be much The records proved that the phone was active harder if it is not supported with the necessary at the time of the murder and led the police to knowledge. Our motivation emerged from the discover another 23 mobile phones used by the fact that SIM card forensics is a new field with suspect due to his frequent SIM card change. minor literature as far as we know. We intend 1 (Indian Express September 2015). the analysis of our results to contribute to the In another case, the fraudsters used cell mobile forensic field with the essential phone information to illegally transfer bank knowledge needed to make informed decisions funds. The scammer managed to transfer funds based on the tools’ actual capabilities. We also from an online bank account of the original believe that the analysis of the retrieved data post-paid subscriber through a “SIM-swap” will play a crucial role in proving suspects promotion where an existing SIM card was guilty or not. replaced with a new one. This replacement The remainder of the paper is organized as allowed the fraudster to take over the victim’s follows: Background information and mobile number and use it for fraudulent fundamental concepts needed to understand 2 activities (Manila Times, July 2015) SIM forensics are discussed in Section 2; In our research we aim to contribute to the literature review is presented in Section 3. field of SIM card forensics through: Experimental tools and setup are explained in Section 4; experimental results are discussed in Section 5, followed by the conclusion and future work in Section 6. BACKGROUND 1 http://indianexpress.com/article/india/india- others/suspects-sim-card-was-active-at-spot-of- INFORMATION pansare-murder-police/ The introduction of the Global System for 2 http://www.manilatimes.net/nbi-probes-sim- Mobile Communications (GSM) standard for card-swap-scam/199564/ transmitting text, voice, and data services Page 220 © 2016 ADFSL Forensic Investigation of SIM Card CDFSL Proceedings 2016 through cellular networks marked a such as the DF (DCS1800) and DF (GSM), telecommunication revolution that affected all which contain network-related information, aspects of our lives. Ever since the European and DF (Telecom), which holds service/carrier- Telecommunications Standards Institute related information. Furthermore, elementary (ETSI) released their GSM 11.11 Specifications files contain the actual data in various types, of the SIM-ME interface in the 1990s, the structured as either a sequence of data bytes, a industry has experienced a radical growth. It sequence of fixed-size records, or a fixed set of was initiated by the recommendation to split fixed-size records used cyclically. It is the Mobile Station (i.e., Cellular Phone) into important to note that all the files have two components: a removable Subscriber headers, but only EFs contain data (Savoldi Identity Module (SIM), which contains all and Gubian, 2007). network related subscriber information, and a Mobile Equipment (ME) that is the remaining part of the Mobile Station, i.e., the mobile handset (ETSI, 1994). As the name implies, a SIM card holds the identity of the subscriber, which enables users to be registered in the telecommunication network. In addition to identification and authentication, the SIM card can also store the subscriber’s contacts, messages, calls, location information, and other subscriber-specific data. The components of a SIM card, as explored thoroughly by Savoldi and Gubian (2007), include a central processor unit (CPU) and an operating system (OS) with electronically Figure 1. SIM Card File System Hierarchy erasable programmable read-only memory (EEPROM). It also contains a Random Access Memory (RAM) that controls the program SIM cards have certain physical dimensions execution flow. Moreover, it includes a Read- that follow the ISO/IEC 7816 standard, Only Memory (ROM) which controls the managed jointly by the International operating system workflow, user Organization for Standardization (ISO) and authentication, data encryption algorithm, and the International Electrotechnical Commission other applications. The SIM card file system is (IEC). This standard is structured in 15 parts, organized in a hierarchal tree structure and in which parts 1 and 2 specify in detail the resides in the EEPROM for storing data such physical characteristics of the identification as names and phone number entries, text Integrated Circuit Cards (ICC, SIM Cards is a messages, and network service settings. particular type of ICC) along with contacts, location, and dimensions. Manufacturers The anatomy of the file system—as adopted the ISO/IEC 7816 standard and demonstrated in Figure 1—includes three types created SIM cards in the following sizes (Singh, of files: Master File (MF), Dedicated Files 2015): Full Size, Mini, Micro, and Nano SIMs.