Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in China. These pirated phones, referred to as “Shanzhai phones,” are often used by criminals because they are inexpensive and easy to obtain. However, the variety of pirated phones and the absence of documentation hinder the forensic analysis of these phones. This paper provides key details about the storage of the phonebook and call records in popular MediaTek Shanzhai mobile phones. This information can help investigators retrieve deleted call records and assist them in reconstructing the sequence of user activities.
KeywordsChinese Shanzhai phones forensic analysis phonebook deleted data
- 1.BreakPoint Software, Hex Workshop Hex Editor (www.hexworkshop.com).
- 2.M. Breeuwsma, M. de Jongh, C. Klaver, R. van der Knijff and M. Roeloffs, Forensic data recovery from flash memory, Small Scale Digital Device Forensics Journal, vol. 1(1), pp. 1–17, 2007.Google Scholar
- 5.P. McCarthy, Forensic Analysis of Mobile Phones, Bachelor’s Thesis, School of Computer and Information Science, University of South Australia, Mawson Lakes, Australia, 2005.Google Scholar
- 6.MediaTek, Product lines, Hsinchu City, Taiwan (www.mediatek.com/en/index.php).
- 7.P. Mokhonoana and M. Olivier, Acquisition of a Symbian smartphone’s content with an on-phone forensic tool, Proceedings of Southern African Telecommunication Networks and Applications Conference, 2007.Google Scholar
- 8.S. Punja and R. Mislan, Mobile device analysis, Small Scale Digital Device Forensics Journal, vol. 2(1), pp. 1–16, 2008.Google Scholar
- 9.Spreadtrum Communications, Overview, Shanghai, China (www.spreadtrum.com/en/products/products_overview).
- 11.R. Wauters, Worldwide mobile phone market grew 20% in Q1 2011, fueled by smartphone boom, techcrunch.com, April 28, 2011.Google Scholar
- 12.S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191–204, 2005.Google Scholar
- 13.Z. Zhang, The research of MTK mobile phones flash file system recovery, Netinfo Security, issue 11, pp. 34–36, 2010. Google Scholar