Cyber Forensics: Mobile
COMPUTER FORENSICS : MOBILE
DISCLAIMER:
- This document contains unedited notes and has not been formally proofread.
- The information provided in this document is intended to provide a basic understanding of certain technologies.
- Please exercise caution when visiting or downloading from websites mentioned in this document and verify the safety of the website and software.
- Some websites and software may be flagged as malware by antivirus programs.
- The document is not intended to be a comprehensive guide and should not be relied upon as the sole source of information.
- The document is not a substitute for professional advice or expert analysis and should not be used as such.
- The document does not constitute an endorsement or recommendation of any particular technology, product, or service.
- The reader assumes all responsibility for their use of the information contained in this document and any consequences that may arise.
- The author disclaim any liability for any damages or losses that may result from the use of this document or the information contained therein.
- The author reserve the right to update or change the information contained in this document at any time without prior notice.
- Any attempts to perform penetration testing or ethical hacking on systems or networks should be done with the explicit permission of the system/network owner. Unauthorized access is illegal and can result in serious legal consequences.
- It is important to fully understand the scope of the testing and to only test within that scope. Testing outside the agreed upon scope is considered unauthorized and may result in legal action.
- Any findings or vulnerabilities discovered during testing should be reported to the system/network owner immediately and kept confidential until a fix can be implemented.
- It is recommended to use a separate, dedicated testing environment rather than testing on a live production system to minimize the risk of accidentally causing damage or downtime.
- It is important to take steps to protect your own identity and prevent accidental data leaks or exposure of sensitive information during testing.
- It is also recommended to follow a standard code of ethics for ethical hacking and penetration testing.
ACKNOWLEDGEMENT
Table of Contents
- ACKNOWLEDGEMENT 2
- Table of Contents 3
- Table Of Figures 4
- List Of Tables 5
- 1. INTRODUCTION 6
- 2. ANALYSIS 6
- 2.1. TOOLS USED 7
- 2.1. EVIDENCE: CHAT MEDIUM TIMELINES 8
- 2.2. EVIDENCE: STAGE 1: EMAIL MESSAGES 9
- 2.3. Evidence Part 2: Chats (Facebook) 10
- 2.4. Evidence Part 3: Chats (SMS) 11
- 2.5. Evidence Part 4: Chats (Email with PIXELKNOT app) 12
- 2.5.1. Evidence Part 4: Pixelknot: 01: Tree- Email & JPG 13
- 2.5.2. Evidence Part 4: Pixelknot: 02: Email Outbox: jpg 14
- 2.5.3. Evidence Part 4: Pixelknot: 03: Wall - Email & JPG 15
- 2.6. Evidence Part 5: Google Drive 17
- 2.7. Evidence Part 6: Choosing (PIXELKNOT app & Google Drive) 18
- 2.8. Evidence Part 7: Cipher, Place and Payment 19
- 3. EVIDENCE PART 8: MEDIA ANALYSIS 21
- 3.1. LOCATION ANALYSIS 21
- 3.2. GALLERY ANALYSIS 21
- SCREENSHOT FOLDER: 21
- FACES FOLDER: 21
- Invoices Folder 21
- OTHER ANALYSIS 21
- PLAY STORE SEARCH 21
- 3.3. INTERNET BROWSING HISTORY 22
- Searched History: 22
- Browsing History 22
- Download History: 23
- 4. LAWS TO CONSIDER: 24
- The Sexual Offences Act 2003: 24
- Policing and Crime Act 2009: 24
- Street Offences Act 1959 24
- Modern Slavery Act 2015 24
- Legality: 24
- Age factor: 24
- 5. CONCLUSION 25
- Appendix Table: A 27
- LOCATION: DATA SCREENSHOT 27
- Appendix Table: B 27
- SCREENSHOT FOLDER 27
- Appendix Table: C 29
- Gallery: Faces Folder 29
- Appendix Table: D 30
- PIXELKNOT decoded Image’s 30
- REFERENCES 33
Table Of Figures
- Figure 1 Problem statement 6
- Figure 2 Cellebrite Physical Analyzer Extraction Summary 7
- Figure 3 Evidence: Email step01: registration 9
- Figure 4 Evidence Email Step 02 - Setup Custom Search 9
- Figure 5 FB Chat 01: Initial contact. 10
- Figure 6 FB Chat 02: Continue. 10
- Figure 7 SMS Chat 03: Specialized dating 11
- Figure 8 SMS Chat 04: Secure method info 11
- Figure 9 SMS Chat 05: PIXELKNOT & Stephanie APPs 12
- Figure 10 Email chat to install Pixelknot. 12
- Figure 11 Pixelknot:01: Tree – JPG -Decoded 13
- Figure 12 Pixelknot:01: Tree - Email 13
- Figure 13 Pixelknot:02: Decoded: girl-7172340_1280.jpg 14
- Figure 14 Pixelknot:02: Email Outbox: girl-7172340_1280.jpg 14
- Figure 15 Pixelknot:03: Wall - decoded 15
- Figure 16 Pixelknot:03: Wall - Email & JPG 15
- Figure 17 Stephanie Not working SMS. 16
- Figure 18 Stephanie App Step 01 16
- Figure 19 Stephanie App Step 02 16
- Figure 20 Stephanie App Step: Error Message 16
- Figure 21 Google Drive Share Emails 17
- Figure 22 Email- Google Drive Folder: KT 17
- Figure 23 Screenshot Google Drive: KT 17
- Figure 24 Pixelknot:04: Choice-Decoded 18
- Figure 25 Pixelknot:04: Choice-Email 18
- Figure 26 Google Drive: Choice- Seven.jpg 18
- Figure 27 Pixelknot: Place and Payment -Decoded 19
- Figure 28 Pixelknot: Place and Payment - Email 19
- Figure 29 Deciphered Text 20
- Figure 30 Tom Biddle personal details 21
- Figure 31PLAY STORE SEARCH 22
- Figure 32 Searched History 22
- Figure 33 Browsing History 23
- Figure 34 Internet: Downloads 23
List Of Tables
- Table 1 Communication Medium Timelines 8
- Table 2 Evidence Stage 1 Email 9
- Table 3 Evidence: FB- initial startup 10
- Table 4 Evidence SMS Chat 11
- Table 5 Evidence Pixelknot & Stephanie APPs 12
- Table 6 Pixelknot:01: Tree: Email & JPG 13
- Table 7 Pixelknot:02: Email Outbox: girl-7172340_1280.jpg 14
- Table 8 Install Stephanie App Decoded 15
- Table 9 Stephanie App Steps & error message 16
- Table 10 Google Drive: KT - Email & Screenshot 17
- Table 11 Evidence: Place and Payment 19
- Table 12 Cipher: Message & Screenshot 20
- Table 13 Tom's Offences 25
- Table 14 Katie’s Offences 25
1. INTRODUCTION
|
|
| Figure 1 Problem statement |
2. ANALYSIS
2.1. TOOLS USED
2.1. EVIDENCE: CHAT MEDIUM TIMELINES
Table 1 Communication Medium Timelines
|
COMMUNICATION MEDIUM |
TIMELINE |
|
Facebook Messenger Chat |
14-09-2023 10:39:02(UTC+1) |
|
Text Messages - SMS |
14-09-2023 11:34:12(UTC+1) |
|
Email – Install APK |
14-09-2023 16:53:03(UTC+1) |
|
Email - PIXELKNOT: tree |
15-09-2023 16:28:05(UTC+1) |
|
Email PIXELKNOT: girl-7172340_1280.jpg |
15-09-2023 16:35:53(UTC+1) |
|
Email PIXELKNOT: Wall IMG_20230915_144729.jpg |
15-09-2023 17:24:30(UTC+1) |
|
Email: Folder shared with you: ‘KT’ |
26-09-2023 12:53:24(UTC+1) |
|
Email: PIXELKNOT: Choice - 0_one.jpg |
26-09-2023 13:18:27(UTC+1) |
|
Email: PIXELKNOT: IMG_20230915_152522.jpg |
26-09-2023 13:27:18(UTC+1) |
|
Cipher: 181_task_thumbnail.png |
26-09-2023 13:35:30(UTC+1) |
2.2. EVIDENCE: STAGE 1: EMAIL MESSAGES
|
||||
|
|
2.3. Evidence Part 2: Chats (Facebook)
2.4. Evidence Part 3: Chats (SMS)
|
|
|
Figure 7 SMS Chat 03: Specialized dating |
|
|
| Figure 8 SMS Chat 04: Secure method info |
2.5. Evidence Part 4: Chats (Email with PIXELKNOT app)
|
|
|
Figure 9 SMS Chat 05: PIXELKNOT & Stephanie APPs |
|
|
|
Figure 10
Email chat to install Pixelknot. |
2.5.1. Evidence Part 4: Pixelknot: 01: Tree- Email & JPG
|
|
| Figure 11 Pixelknot:01: Tree – JPG -Decoded |
|
|
| Figure 12 Pixelknot:01: Tree - Email |
2.5.2. Evidence Part 4: Pixelknot: 02: Email Outbox: jpg
|
|
| Figure 13 Pixelknot:02: Decoded: girl-7172340_1280.jpg |
|
|
| Figure 14 Pixelknot:02: Email Outbox: girl-7172340_1280.jpg |
2.5.3. Evidence Part 4: Pixelknot: 03: Wall - Email & JPG
Table 9 Stephanie App Steps & error message
|
|
| Figure 17 Stephanie Not working SMS |
|
|
| Figure 18 Stephanie App Step 01 |
|
|
| Figure 19 Stephanie App Step 02 |
|
|
| Figure 20 Stephanie App Step: Error Message |
2.6. Evidence Part 5: Google Drive
|
|
| Figure 21 Google Drive Share Emails |
Table 10 Google Drive: KT - Email & Screenshot
|
|
| Figure 22 Email- Google Drive Folder: KT |
|
|
| Figure 23 Screenshot Google Drive: KT |
2.7. Evidence Part 6: Choosing (PIXELKNOT app & Google Drive)
|
|
| Figure 24 Pixelknot:04: Choice-Decoded |
|
|
| Figure 25 Pixelknot:04: Choice-Email |
|
|
| Figure 26 Google Drive: Choice- Seven.jpg |
2.8. Evidence Part 7: Cipher, Place and Payment
Table 11 Evidence: Place and Payment
|
|
| Figure 27 Pixelknot: Place and Payment -Decoded |
|
|
| Figure 28 Pixelknot: Place and Payment - Email |
Table 12 Cipher: Message & Screenshot
|
|
| Screenshot |
|
|
| Cipher: Message |
|
|
| Figure 29 Deciphered Text |
3. EVIDENCE PART 8: MEDIA
ANALYSIS
3.1. LOCATION
ANALYSIS
3.2. GALLERY ANALYSIS
SCREENSHOT FOLDER:
FACES FOLDER:
OTHER ANALYSIS
|
|
| Figure 30 Tom Biddle personal details |
PLAY STORE SEARCH
|
|
| Figure 31 PLAY STORE SEARCH |
3.3. INTERNET BROWSING HISTORY
Searched History:
|
|
| Figure 32 Searched History |
Browsing History
|
|
| Figure 33 Browsing History |
Download History:
|
|
| Figure 34 Internet: Downloads |
4. LAWS TO CONSIDER:
5. CONCLUSION
|
Acts |
Tom - commits this offense |
|
The Sexual Offences Act 2003: |
·
Tom's agreement to pay for sexual services constitutes
facilitation of a child sex offense. If any of the girls are
under 16, - Facilitating the commission of a child sex
offence.
·
Sharing images of girls with the intent of sexual
exploitation could be considered grooming (Katie) and meeting
them in person (Tom) would fulfill the offense, - Meeting a
child following grooming. |
|
Policing and Crime Act 2009 |
·
Agreement under the Policing and Crime Act 2009: potential
implications of Tom's payment for sexual services. |
|
Street Offences Act 1959 |
·
The messages exchanged suggest Tom's potential intention to
seek out prostitution in a public space, where his phone was
seized. |
|
Modern Slavery Act 2015 |
·
Tom's potential action may fall under Section 2 of the Modern
Slavery Act 2015, which criminalizes arranging or facilitating
travel of another person with the view to them being
exploited, including for sexual purposes. |
Table 14 Katie’s Offences
|
Acts |
Katie - commits this offense |
|
The Sexual Offences Act 2003: |
·
Katie is offering to provide girls for sexual activity in
exchange for money, fulfilling the criteria of controlling
prostitution for personal gain.
·
If any of the girls involved are under 18, Katie commits this
offense by arranging for their sexual exploitation, - Causing or
inciting prostitution of a child.
·
Sharing images of girls with the intent of sexual exploitation
could be considered grooming (Katie), - Meeting a child
following grooming. |
|
Policing and Crime Act 2009 |
·
Kaite is suspected of utilizing various methods, including
coercion, deception, and potentially non-violent force, to
influence the girls he provides |
|
Street Offences Act 1959 |
·
Kaite's actions of arranging for individuals to meet in public
spaces for the exchange of money raise concerns about potential
violations of the Street Offences Act 1959, specifically
regarding loitering or soliciting for prostitution. |
|
Modern Slavery Act 2015 |
·
The situation surrounding Kaite and the girls raises questions
about their living and working conditions, with concerns about
potential violations of the Modern Slavery Act 2015 due to
suspected forced or compulsory labor. |
Appendix Table: A
Appendix Table: D
PIXELKNOT decoded Image’s
|
COMMUNICATION MEDIUM |
TIMELINE |
|
Email - PIXELKNOT: tree |
Timestamp: 15-09-2023 16:28:05(UTC+1)
Folder: Inbox, Personal
From: katiecam211@gmail.com
To: tombiddle029@gmail.com
Attachment: IMG_20230915_144429.jpg |
|
Email PIXELKNOT: Outbox |
Timestamp: 15-09-2023 16:35:53(UTC+1)
Folder: Outbox
From: tombiddle029@gmail.com
To: katiecam211@gmail.com
Attachment: girl-7172340_1280.jpg |
|
Email PIXELKNOT: Wall |
Timestamp: 15-09-2023 17:24:30(UTC+1)
Folder: Inbox, Personal
From: katiecam211@gmail.com
To: tombiddle029@gmail.com
Attachment: IMG_20230915_144729.jpg |
|
Email: Folder shared with you: ‘KT’ |
Timestamp: 26-09-2023 12:53:24(UTC+1)
From: tombiddle029@gmail.com
To: katiecam211@gmail.com
Attachment: |
|
Email: PIXELKNOT: Choice |
Timestamp: 26-09-2023 13:18:27(UTC+1)
From: tombiddle029@gmail.com
To: katiecam211@gmail.com
Attachment: 0_one.jpg |
|
Email: PIXELKNOT: |
Timestamp: 26-09-2023 13:27:18(UTC+1)
From: tombiddle029@gmail.com
To: katiecam211@gmail.com
Attachment: IMG_20230915_152522.jpg |
|
Cipher: 181_task_thumbnail.png |
Timestamp: 26-09-2023 13:35:30(UTC+1) |
Comments
Post a Comment