As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
- Learn techniques to forensically acquire the iPhone, iPad, and other iOS devices
- An entire chapter focused on data and application security can assist not only forensic investigators, but also application developers and IT security managers
- Features an in-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
Amazon Exclusive: Andrew Hoog and Katiey Strzempka, Authors of iPhone and iOS Forensics, Offer Their Top Ten Examples of Data that Can Be Recovered from an iPhone or Android Device
Smartphones are used extensively around the world and serve many purposes. What consumers may not realize, however, is that much of the information stored on these devices can be easily recovered by forensic examiners. The following Top 10 List provides just a few examples of some of the data that can be recovered from an iPhone or Android device:
- Social Networking Data
Sending direct messages on social networking sites might not be the best place to insult your boss or talk behind your friend’s back. In many cases, these messages can be recovered from a smartphone.
- Navigation History
News Flash . . . men ask for directions on their phone. Map searches and driving directions are easily found on these devices.
- Web History
We know what you browsed last summer. Internet browsing history and Google searches are often recovered from iPhone and Android devices.
- Text messages
Deleting a text message does not necessarily mean it is gone forever. Examiners are able to recover deleted messages from certain devices. Think before you text.
A picture is worth a thousand words. Just ask a professional quarterback.
- Financial Apps
Banks aren’t the only ones who know your account numbers and balances. Your smartphone might too. Some bank applications store the individual’s username, account information, and potentially passwords as well.
Find the company leak! E-mail content can be recovered from a smartphone and analyzed to determine whether an employee is sharing confidential data.
- GPS Location
Google and Apple track certain cell tower locations and GPS coordinates, something your mom can’t even do.
Politicians beware: It’s been discovered that direct messages can be recovered from smartphones.
"iPhone and iOS Forensics is a must read by all digital forensic examiners, even the most educated person in the iPhone environment will discover something new in this highly valuable book. The author has proven himself many times over to be a valuable resource to the digital community at large, and this book is the culmination of all of that work. I will not conduct another iOS analysis without using this book as my reference!" -Ryan R. Kubasiak, Investigator, Computer Crime Unit and Editor AppleExaminer.com
"Covering iOS file system information, device application and security, acquisition and analysis methods, this book takes one from basic to advanced information and techniques related to the iOS family of devices. Andrew and Katie have put together a valuable resource for security professionals and forensic examiners alike." -Danny Garcia, DG Digital Services, LLC
"This book is an excellent reference for examiners in the field, looking to understand the many different approaches to forensic imaging of an iPhone." -Jonathan Zdziarski, iPhone forensics expert