08 - Mobile Devices

Class: CYBR-405


Notes:

Objectives:

Mobile Device Types

Cellular Networks

Cellular Networks

Digital network Description
Code Division Multiple Access (CDMA) Developed during World War II, this technology was patented by Qualcomm after the war. One of the most commonly used digital network technologies, CDMA uses the full radio frequency spectrum to define channels. In the United States, U.S. Cellular, Verizon, and Twigby, for example, use CDMA networks.
Global System for Mobile Communications (GSM) A second-generation cellular network standard that is currently the most used cellular network standard in the world. It is used by AT&T, T-Mobile, and Mint Mobile in the United States and is the standard in Europe and Asia.

How do you know?

Inside Mobile Devices

Evidence

Do you need a search warrant to analyze a mobile device already in your possession (e.g. a phone in arrestee’s jail property)?

Case Law - Riley v. California (2014)

Do you need a search warrant to compel the use of biometrics to unlock a phone? (e.g. using face or thumbprint)

Case Law

United States v. Brown (D.C. Cir 2025)

The U.S. Court of Appeals for the D.C. Circuit held that compelling a suspect to unlock a phone with a thumbprint violated the Fifth Amendment's protection against selfincrimination.

The court reasoned that forced biometric unlocking constituted a testimonial act because it disclosed the defendant's control over and access to the device's contents, similar to revealing knowledge.

This case is a major departure from prior rulings that treated compelled biometrics as non-testimonial.

Cellular Service Provider Logs

Seizing and Securing Mobile Devices

Data Extraction

image.png482

Two Most Common Extraction Methods

Mobile Device Management (MDM)

Perform the Extraction

Advanced Extraction Methods

Jailbreaking

Jailbreaking a phone refers to the process of removing restrictions imposed by the device's manufacturer, typically on iOS devices like iPhones and iPads. This allows users to install apps and tweaks that aren't available through the official app store, customize the operating system, and access system files. While jailbreaking can provide more control and flexibility, it can also void warranties, expose the device to security risks, and lead to instability.

SQLite

Common Evidence Types

Modern phones document a person's timeline of life.

Week 8 Summary