In previous chapters, we discussed how to obtain logical data and analyze the acquired data. The iDevice (iPhone, iPod Touch, iPad) was developed by Apple in such a way that the system is jailed (or closed), which, in UNIX terms, gives the ability to create a partitioned operating system. On iDevices, the operating system partition is read-only, and this makes the device a jailed system. This, coupled with using the root model found in Unix systems, provides for a secure system. In this situation, the iDevice’s mobile user has defined and limited access to certain areas of the iOS. Since the first iPhone came out, some people have taken it upon themselves to develop methods to break that jailed system, which has lead to the development of numerous unsupported versions of iOS and jailbreaks. Law enforcement agencies then demanded that they get access to the physical device, as traditional methods of forensics began to fade away in the wake of the iPhone. Numerous arguments arose in areas from digital rights management, to copyright violations, to poor decisions being handed down by Apple. This chapter will discuss relevant case law, as well as procedures and tools to exploit iDevices.
KeywordsMedium Exploitation Digital Right Management Digital Right Management System Digital Millennium Copyright Jailed System
Unable to display preview. Download preview PDF.