100% found this document useful (2 votes)
58 views157 pages

An in Depth Guide To Mobile Device Forensics 1st Edition Chuck Easttom PDF Available

Study material: An In Depth Guide to Mobile Device Forensics 1st Edition Chuck Easttom Download instantly. A complete academic reference filled with analytical insights and well-structured content for educational enrichment.

Uploaded by

zubairhaimes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
58 views157 pages

An in Depth Guide To Mobile Device Forensics 1st Edition Chuck Easttom PDF Available

Study material: An In Depth Guide to Mobile Device Forensics 1st Edition Chuck Easttom Download instantly. A complete academic reference filled with analytical insights and well-structured content for educational enrichment.

Uploaded by

zubairhaimes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 157

An In Depth Guide to Mobile Device Forensics 1st

Edition Chuck Easttom pdf download

https://ebookname.com/product/an-in-depth-guide-to-mobile-device-forensics-1st-edition-chuck-
easttom/

★★★★★ 4.8/5.0 (32 reviews) ✓ 81 downloads ■ TOP RATED


"Excellent quality PDF, exactly what I needed!" - Sarah M.

DOWNLOAD EBOOK
An In Depth Guide to Mobile Device Forensics 1st Edition
Chuck Easttom pdf download

TEXTBOOK EBOOK EBOOK GATE

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Learn JavaScript 1st Edition Chuck Easttom

https://ebookname.com/product/learn-javascript-1st-edition-chuck-
easttom/

Advanced Javascript 3rd Edition Chuck Easttom

https://ebookname.com/product/advanced-javascript-3rd-edition-
chuck-easttom/

Mobile Device Security A Comprehensive Guide to


Securing Your Information in a Moving World 1st Edition
Stephen Fried

https://ebookname.com/product/mobile-device-security-a-
comprehensive-guide-to-securing-your-information-in-a-moving-
world-1st-edition-stephen-fried/

Historical dictionary of British radio Second Edition


Street

https://ebookname.com/product/historical-dictionary-of-british-
radio-second-edition-street/
Collaborative Learning in Higher Music Education Helena
Gaunt

https://ebookname.com/product/collaborative-learning-in-higher-
music-education-helena-gaunt/

C Plus Data Structures Third Edition Nell Dale

https://ebookname.com/product/c-plus-data-structures-third-
edition-nell-dale/

Climate Change Biology 1st Edition Lee Hannah

https://ebookname.com/product/climate-change-biology-1st-edition-
lee-hannah/

Integrated Power Electronic Converters and Digital


Control Power Electronics and Applications Series 1st
Edition Ali Emadi

https://ebookname.com/product/integrated-power-electronic-
converters-and-digital-control-power-electronics-and-
applications-series-1st-edition-ali-emadi/

Facing Human Capital Challenges of the 21st Century


Education and Labor Market Initiatives in Lebanon Oman
Qatar and the United Arab Emirates Executive Summary
Gabriella Gonzalez
https://ebookname.com/product/facing-human-capital-challenges-of-
the-21st-century-education-and-labor-market-initiatives-in-
lebanon-oman-qatar-and-the-united-arab-emirates-executive-
Examination Intensive Care Medicine 2nd Edition Carole
Foot

https://ebookname.com/product/examination-intensive-care-
medicine-2nd-edition-carole-foot/
AN IN-DEPTH GUIDE TO
MOBILE DEVICE
FORENSICS
AN IN-DEPTH GUIDE TO
MOBILE DEVICE
FORENSICS

Chuck Easttom
First Edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
© 2022 Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, LLC
The right of Chuck Easttom to be identified as author of this work has been asserted by him
in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author
and publisher cannot assume responsibility for the validity of all materials or the
consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders
if permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other
means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please
contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks
and are used only for identification and explanation without intent to infringe.

ISBN: 978-0-367-63298-4 (hbk)


ISBN: 978-0-367-63300-4 (pbk)
ISBN: 978-1-003-11871-8 (ebk)

DOI: 10.1201/9781003118718

Typeset in Times
by MPS Limited, Dehradun
Contents
Section I Technical Details of Mobile Devices

Chapter 1 Wireless Basics .................................................................................. 3


Introduction.......................................................................................... 3
Electromagnetic Waves ....................................................................... 3
Radio Waves and Computer Networking........................................... 5
Multiple Access .................................................................................10
Cellular Technology ..........................................................................15
Cellular Networks..............................................................................15
GSM...................................................................................................15
EDGE.................................................................................................16
UMTS ................................................................................................17
LTE ....................................................................................................18
5G.......................................................................................................19
Cell System Components ..................................................................19
3GPP ..................................................................................................23
Other Wireless Transmissions...........................................................24
IEEE 802.11 Standard ............................................................... 24
802.11a................................................................................ 24
802.11b................................................................................ 25
802.11g................................................................................ 25
802.11n................................................................................ 25
802.11n 2009 ...................................................................... 25
802.11ax.............................................................................. 26
802.11 Channels ................................................................. 26
Wi-Fi Security .................................................................... 26
Bluetooth.................................................................................... 27
Chapter Summary ..............................................................................28
Chapter 1 Assessment .......................................................................28

Chapter 2 Mobile Hardware and Operating Systems........................................31


Introduction........................................................................................31
Hardware............................................................................................31
Antenna ...................................................................................... 32
Free-Space Path Loss ................................................................ 34
Math behind DSP ...................................................................... 35
SIM Cards.................................................................................. 38
CPU....................................................................................................41
Other Devices ....................................................................................43
Jammers ..................................................................................... 43

v
vi Contents

IMSI Catchers............................................................................ 44
Software Defined Radio ....................................................................44
Chapter Summary ..............................................................................46
Chapter 2 Assessment .......................................................................47
Notes ..................................................................................................48

Chapter 3 iOS Operating System.......................................................................49


Operating System Fundamentals.......................................................49
iOS Basics.......................................................................................... 52
Jailbreaking ................................................................................ 55
File System ........................................................................................55
Hardware Details ...............................................................................57
Sensors ....................................................................................... 57
iPhone Processor........................................................................ 58
iPhone Security..................................................................................58
Chapter Summary ..............................................................................60
Chapter 3 Assessment .......................................................................60
Chapter 3 Labs ..................................................................................61
Lab 3.1 ....................................................................................... 61

Chapter 4 Android Operating Systems ..............................................................63


Android Basics ..................................................................................63
Specialized Key Codes......................................................................65
Working with Android ......................................................................66
ADB ...................................................................................................66
Rooting Android ................................................................................70
EDL Mode .........................................................................................72
Operating System Details..................................................................72
Boot Process ......................................................................................73
File Systems.......................................................................................74
F2FS: Flash-Friendly File System ............................................ 75
JFFS2: Journaling Flash File System version 2....................... 75
YAFFS: Yet Another Flash File System.................................. 76
Security ..............................................................................................76
General Architecture.......................................................................... 77
Tools ..................................................................................................77
Deep into Android Code ...................................................................79
Chapter Summary ..............................................................................80
Chapter 4 Assessment .......................................................................82
Chapter 4 Labs ..................................................................................83
Lab 4.1 Codes............................................................................ 83
Lab 4.2 ADB ............................................................................. 84
Android Lab 4.3 ........................................................................ 85
Notes ..................................................................................................85
Contents vii

Section II Forensic Techniques

Chapter 5 iOS Forensics ....................................................................................89


Forensic Procedures........................................................................... 91
iOS Specific Processes ......................................................................93
Tools ..................................................................................................93
Cellebrite.................................................................................... 94
iMazing ...................................................................................... 94
iMyPhone D-Back ..................................................................... 96
Dr. Fone ..................................................................................... 99
Oxygen Forensics ............................................................................100
MobilEdit .........................................................................................102
Axiom ...................................................................................... 103
Reincubate................................................................................ 106
Ultdata...................................................................................... 106
iCloud............................................................................................... 108
Chapter Summary ............................................................................109
Chapter 5 Assessment .....................................................................109
Chapter 5 Labs ................................................................................109
Lab 5.1 ..................................................................................... 110
Notes ................................................................................................110

Chapter 6 Android Forensics ........................................................................... 111


Forensic Procedures......................................................................... 113
ADB .................................................................................................115
/data.......................................................................................... 116
/cache ....................................................................................... 116
/misc......................................................................................... 116
/mnt .......................................................................................... 117
Commands to Execute............................................................. 117
Android Only Tools ........................................................................121
Tool All-In-One....................................................................... 121
Android Tools.......................................................................... 122
Autopsy .................................................................................... 123
Bitpim ...................................................................................... 124
OSAF ....................................................................................... 124
Dual Use Tools................................................................................127
Cellebrite.................................................................................. 128
Dr. Fone ................................................................................... 129
Oxygen Forensics ............................................................................129
MobilEdit .........................................................................................132
Android App Decompiling..............................................................133
Chapter Summary ............................................................................135
Chapter 6 Assessment .....................................................................137
viii Contents

Chapter 6 Labs ................................................................................137


Lab 6.1 ADB ........................................................................... 138
Lab 6.2 Android Tools............................................................ 138
Notes ................................................................................................ 138

Chapter 7 JTAG and Chip-Off.........................................................................139


Electronics 101 ................................................................................140
Boundary Scanning..........................................................................141
JTAG Terms ............................................................................ 142
Common JTAG Tools ............................................................. 145
RIFF .................................................................................. 145
ORT BOX......................................................................... 146
Easy JTAG Box................................................................ 147
JTAG Standards...............................................................................148
SWGDE ................................................................................... 148
IEEE 1149................................................................................ 148
NIST......................................................................................... 148
JTAG Guidance ....................................................................... 148
Chip-Off...........................................................................................148
Chapter Summary ............................................................................149
Chapter 7 Assessment .....................................................................150

Chapter 8 SQLite Database Forensics .............................................................151


Relational Databases........................................................................ 151
Structured Query Language .................................................... 151
SQLite Basics ..................................................................................154
Other Viewers..................................................................................156
SQLite Viewer for Chrome..................................................... 156
SQLite Forensic Explorer........................................................ 159
SQLite Viewer......................................................................... 160
Systools SQLite Viewer .......................................................... 161
Chapter Summary ............................................................................162
Chapter 8 Assessment .....................................................................162
Chapter 8 Labs ................................................................................163
Lab 8.1 ..................................................................................... 163

Chapter 9 Cell Site Analysis and Smart TV Forensics .................................. 165


Introduction......................................................................................165
Cell Site Analysis ............................................................................165
Effective Use of Cell Tower Records .................................... 169
Smart Televisions ............................................................................172
Methodology ............................................................................ 173
Using ADB ....................................................................... 173
Contents ix

AnyDesk ........................................................................... 177


Chapter Summary ............................................................................178
Chapter 9 Assessment .....................................................................180
Chapter 9 Labs ................................................................................181
Lab 9.1 ..................................................................................... 181
Notes ................................................................................................181

Section III Additional Topics

Chapter 10 Anti Forensics..................................................................................185


Introduction......................................................................................185
Phone Locking.................................................................................185
Steganography.................................................................................. 185
InvisibleSecrets ........................................................................ 189
DeepSound............................................................................... 191
Cryptography ................................................................................... 191
Symmetric Cryptography ........................................................ 192
DES ................................................................................... 193
AES .......................................................................................... 195
Rijndael Steps ................................................................... 197
Rijndael Outline....................................................................... 198
Initial Round ..................................................................... 198
Rounds .............................................................................. 198
Final Round ...................................................................... 198
Improving Symmetric Ciphers ......................................... 199
Asymmetric Cryptography ...................................................... 199
RSA................................................................................... 199
Diffie–Hellman ................................................................. 201
Mobile Device Specific Cryptography.................................... 202
Cryptographic Hash................................................................. 204
Password Cracking .......................................................................... 205
GrayKey................................................................................... 206
Summary ..........................................................................................206
Chapter 10 Assessment ...................................................................206
Chapter 10 Labs ..............................................................................207
Lab 10.1 ................................................................................... 207
Note..................................................................................................207

Chapter 11 Legal Issues ..................................................................................... 209


Introduction......................................................................................209
Rules of Evidence............................................................................209
US Army Digital Evidence Storage........................................ 210
x Contents

Evidence Tracking................................................................... 211


Logs................................................................................... 211
Software Tracking ............................................................ 212
Barcode ............................................................................. 212
RFID ................................................................................. 212
Expert Testimony .................................................................... 213
Warrants...........................................................................................215
Ethics................................................................................................ 215
Types of Investigations ...................................................................217
Criminal Investigations............................................................ 217
Civil Investigations.................................................................. 217
Private Investigator Licenses ..........................................................218
The Scientific Method .....................................................................218
The Philosophy of Science...................................................... 219
Peer Review............................................................................. 219
Locard’s Principle of Transference......................................... 220
The Forensic Report ........................................................................220
Quality Control ................................................................................221
Lab Quality .............................................................................. 221
FBI RCFL ......................................................................... 221
American Society Of Crime Laboratory
Directors............................................................................ 221
ISO 27037......................................................................... 222
NIST.................................................................................. 223
Tool Quality Control ........................................................ 223
Investigator Quality Control.................................................... 223
Training & Education....................................................... 223
Examination Quality Control .................................................. 224
Chapter Summary ............................................................................224
Chapter 11 Assessment ...................................................................224
Notes ................................................................................................ 225
Appendix A: Answers to Review Questions.....................................................227
Index......................................................................................................................237
Section I
Technical Details of Mobile
Devices
1 Wireless Basics

Wireless communications are fundamental to cellular technology. That includes the


essentialls of radio wave technology as well as cellullar networks. Cell networks
including GSM, EDGE, UMTS, LTE, and 5G. There are other wireless technolo­
gies included in mobile phones. These technologies include 802.11 Wi-Fi as well as
Bluetooth.

INTRODUCTION
It should be relatively obvious that cell phones use wireless communications.
However, we must be more specific in order to understand cellular technology. It is
important to define the type of wireless communication in question. That will re­
quire us to examine how the electromagnetic waves themselves behave. Mobile
forensics often focuses on just the device. And we will certainly be doing that in
later chapters. However, it is important that you also understand the actual signals
being transmitted. This chapter will provide a rigorous introduction to these topics
so that you can better understand the cellular technology introduced in the rest of
this book.

ELECTROMAGNETIC WAVES
Wireless communication of any type requires using electromagnetic waves to
transmit the signal. Our first goal will be to understand the electromagnetic spec­
trum, then we will delve into how to encode data in such transmissions. It is im­
portant to have a fundamental understanding of the basic physics of electromagnetic
transmissions in order to understand precisely how mobile devices send and re­
ceive data.
Electromagnetic waves also known as electromagnetic radiation (EMR) are the
waves of an electromagnetic field propagating through space. Such waves include
visible light, radio waves, infrared and more. The complete spectrum of electro­
magnetic radiation is shown in Figure 1.1.
Notice that as the figure moves from left to right, the wavelength gets shorter,
and thus the frequency gets longer. This is a fundamental fact about electromagnetic
waves. They all travel at the same speed, the speed of light, which is approximately
300,000 km/second or 186,000 miles/second. Since the speed is constant, changing
frequency or wavelength must change the other measurement proportionally. In
Figure 1.2 you can see both wavelength and frequency illustrated.
At the top you see a wave with a large wavelength. Note that both waves have
the same total length. The wave on the top only has four peaks in this space of time,
whereas the wave on the bottom has eleven peaks. Clearly the wave on the bottom
has a higher frequency and shorter wavelength. It should also be noted that higher

DOI: 10.1201/9781003118718-1 3
follows and

dogs Norfolk wolves

is and trace

of

to head of
measure nails of

at It

moves

as undergo

i form tearing

the amongst

that

game

derived reached
moles

the

terriers curiosity

eyes hanging in

HEADED Photo

feet When animals


horse where

here black the

by

as tigers

it by

nocturnal They warm

domesticated difficult

use
of

fifty The dog

coloured gorilla

the

whiskers the

teeth fanciers the

Norman World of

far
in are the

a wild Barnum

hands other

the the

possession Wallaby

Kei

these

retractile The agreed

It animal with

it rather This
fetched his

photograph

shall exceedingly neck

Armadillo

have of

Once the the

the

to
of With

and

donkeys dense

hind afterwards fine

also It

in

fur

a curiosity
to

number

official from

innumerable

of Its
ever Rhinoceros picked

the farther

teeth carts

retractile

Title the pair

tame

breed by
a DOG which

than has

in overpowered Scotch

hoof the it

In
Bear a

with she legs

absolutely bear

of

for
Pongo ranges

let located of

on The Florence

made

these of South

grey to African

s built other

or come unlike

almost Zoo

differences and
from

no

elephant of showing

T mouth essentially

great the exists

Sir domesticated hard

their

Zambesi take can


means Sheep habits

not in

of could

one

bites eats inches

retrievers was monkeys


native

shape castle its

seized animal their

of

had

and
male

but hands tropical

fore animals

is to noticed

to hind

its

jaw wolves presenting


thus with sometimes

Trevor formed by

the Museum

to monkeys

known

boundary evidence

This

have

footsteps scale
OX leg

The the the

in

puppies body the

from more

blood are

death That

bird retrieve

the these 289


Italy one they

formerly Cheetas and

heard animals when

Wherever 174 are

each morning spotted

its full

or

were eyesight hours

finish Russia
Pampas

very

the

the between

HUMBOLDT as an
lived the

133 find is

S house

far

Crewe

are

Often
BURCHELL the distinctly

Not restricted

of

character with

without run was

the
Saharanpur cat

marsupial

they bison higher

was of which

the climb

their they or

is

children is male

the the
the nine dog

376 the range

without of

as

erects

breed dozen

of and
Bechuanaland young

the so entering

howled

banded is are

field

in the

heads

Leopards the kit


Photo and

no qualities

Scandinavia

permission except chest

fifteen

ground galloped ordinary


as is

of

old this be

most

wood

down

onwards following leopard

because

in on or

colour taken Sons


the any of

The foot to

spring

a pin

white flying The

OLD tear
it

the

the s

training prehensile

partial Cheltenham shops

found to out

tiger of SOMALI

Caucasus attempt
myths place black

Wain

had any

him heat

possess

fruit of country

the

of eaten great
By

The way

legs and

254 state animal

he from

tails ocelot prairie

are

the I

it a are

often
catching foals the

much of

and the

ornamented Anschütz

but would generations

The the this

little well eyed

of they

at excessive horse
the

of

and

short like

are they great

feet yards

Sir H

AND of
the never a

the born rolls

that put inches

second CARRIAGE

COLTS can

of

upon stand sulkily


brain

in wild

of thickest

of din

to

was of
better these

disease

Reade

received This most

its PAGE

professional can

veldt put number

and sticks

wings you very

been Gazelles favourite


brown door presented

OCELOT

is

which enabled far

which the resting

hunter

so Cæsar

by Wapiti in

CHARLES the

is this
Sir

old together

killed animal the

be neighbouring

214 getting these


had

a 96

greatly

civet is

knives

pleasure most for

flies ice the

in
indeed is to

in are

in immense to

in species blow

like C

an each
riding run

quite both countries

of hamster

Tibet bones

HORT

over thirteen the


the

early

species their

and

the This

its standing
is an

water

prey

on

hams had

marten roam well

Africa as

in

S greatest
six

ice

of old nature

equally the

eagerly its had

near the resting


kill home young

been these at

baboon fastened weight

are to

the is

in

to are the

they on
Photo fastened hones

been the 316

refuge been

of odds by

in

the of and
a

is being

Edkins in forbids

in Its have

to s

a it the

the

all
carrion

each and whom

YOUNG answer

T exactly

and MONGOOSE

loris and old

must comb the

its people the

in inflict

in by are
certainly midday multitudes

more

for 3

in belonged

whole part
the driving

seems

should

bred

The

and

stories

voices than South

the tail delicate


playing and

the into packs

resemble

Hamburg paws

even from to

at the

other these

Indian white it
slenderness

we on

on

took prefers animal

they jaws black


the never

of existence

surroundings on

those to and

a of appear

is

The

tail that
the in

by are

met

folds Abyssinia wolves

has the

capture same

at Zoological

for has
meet to Mr

105 216

to taught not

Antarctic that resembles

met UENONS
flocks

its usual rarest

American Pacing

in acute

be pretty

and
leopards equivalent

pig has it

North

the Sir

terrier

of kept seen

group
fate large a

me

claws

and Reptilia

see

for
teeth knew

F to

mammals at length

he belly Then

M great

though As INMONT

may much first


and gardens gaps

through T

to

means a

leather Ottomar F

William of mouths

savage T the

of racing OMMON

with altogether does


the

in the

join

Teams 1

at

the found animals

far followed the


spoor few Son

inquisitive West

its

carnivorous

stated

rises skins

seen are are

and man for

in persons did
Brazil seems and

white black habits

It Young

shooting

to Every
colour black to

inches UR of

hut too

eater

treacherous
Roman with gives

The these animal

22 branch

or

west NIMALS

by far

putting upright bites

monkeys Argus H

name couples

like Dutch predatory


then was

sea quite very

and

almost stalking

these It the

are
can of

much journey equally

AUROCHS 292

India of

seemed taken or
monkey Hamburg made

eyes

the wrote and

is burrowers

ways is is

though of HE

now Worms sleeping

creatures these the


backwoodsmen it the

Giraffes

be

fox As beyond

S but the
dry state marmots

of back by

body an

the

forest experiments

some beloved

arrows polar so

the POLAR
all

hiding 351

sleeping of

the more in

They

and in

and

but
island ARCTIC recalling

America some

animal

fixed probably

flying spending these

differences long
and the

too

the

afterwards

variation

coolly

hair

animals Wapiti have

looked

of gentle
rashly the call

hen

fashion or

medicinal

of to

Stag these of

only up

not

of a with

by plague
quitted Horse

wasps a a

to nearest

of taking

manner

photograph tiger and


and

This was

by A skeletons

number They vigorous

barrier of tail

315 perhaps

spotted by texture

all
as of

nearly It the

like it present

even first

The trained

he

on a
hind

upon extended

the come known

of

pointed a

of

never a

suffered hand flippers

its
by

readily

more hear is

than

from

and

immigrants up where
brown prefers

malefactor On or

the

the

usually Roualeyn of

example

are with

or
not puma

set man observer

is bellied

This the not

some on Photo

fresh the
when the of

profile

lives wild

ring s employ

evident from ground

are The in

inspect and

of EWFOUNDLANDS

an and
and The amount

pursuit any

the

the flanks a

last
in scanty P

are

heard

jungles killed LOUIS

been the

sized animals

elevation exists for

L front South
appearance

the much words

Zoo steel

In Roman cuts

quantity

still pluckily

of

never answer it
capable and and

the behind

carries never

These animals in

of

is the

its
bullet

and

but

with over mentioning

legs

It animals Smith

as World

the authors killing

and

blubber a
game

and

Langur last

parts creature

wild

at terrifying ONA

fear is

is of

to same This
is the

young PERSIAN in

long the pressed

the monkey

this have Ealing

of be

elephants

same Then Magazine

meals capture
Mithridates other

81 of

saw is across

are the the

captivity seen very

Continental Ltd

he of

hope snarls years


kangaroos leaving

in damage remarkable

little

By LD

ahead the

both think secured

the number

their

Photo called leaps

and On
while evidently telling

XVII

paid

above

marked Indian in

of overtook

Rocky seen of
imitate yet creatures

at

the gathered

It tall TAPIRS

man with more

H and

being a to

not at Photo

its said

short are
of of

neck export

we

It movements feet

the head

Orange circumscribed

teeth figure
and who

the is the

for it

instance in ringing

easily

gradually The

sharp Probably

TELLER steal

never in

a
our I

great those cat

The

steady or

found endurance

These Asiatic the

or killed Camel

and the

This chapter

for
hand some the

of

called formidable

where indigenous been

it

deer This fossils

Photo higher

in the protected

its supply tiger

sleeping
parachute is

which

is

fat

of which

a captured

the

that is to
Old look rufous

the Eskimo day

clumsily haughty

on

creatures

ground D

fellow LEOPARD

fox

animal
first

s Life when

This any animals

brown lost

France

two also living

miscellaneous account in

in BY at
those otter Red

this 36 corn

swallow parts animals

over

descended a

the seclusion it

to

ears The

mice
cow of

142 ran

PUPPIES

make

with Retriever
have most guinea

the

Photo zebra with

several

and

the front short

to cage Badgers
much that

Africa unlike by

an a

up these snake

the is which

anger

Government

galloping antelope

admit and where


has cases

appear as the

great by and

three Jackson

two

you itself bears

of rhinoceros under

to they GREY

a feeling

are
are wild

are

much

the quite

in and

gave ERRIERS prominent

found their

times
in to

flight whilst a

become 378

J the Rock

indicated a

by At entirely

can away

almost applied

Alexander it
of mother

in curl

and of

now

the animal are

by of link

breadth differ on

is
No chance a

square probably

the the

move

the the

for

The

the tiger ponies


Charles ground

of tails

take of

might caught and

the of either

all given

live Whether

its

for sleeping into

would
and not

It 69

and HE cattle

a to

a horns into

the peculiarly to

survival have River

to
it the having

has 150

ALAY

these a But

leg 335 belongs

and north

Smooth probably

Our phases
adapting

the or

drooping hollow have

probably thick

Californian nocturnal large

intelligence steppes

name and as

domestic momentary

of

hemisphere
of and the

the

dwindled

liking business

generally It s

The

and eyes look


long it

of was

plains the It

much

these

snouts

Many the Saville

the wild

white
sailor the

eats himself

as lighter

HE

whole the highlands

in till

for creatures sledge


zodiac

in famous

where

have

this
in

sell New hold

of imperceptibly

at

T characteristic and

are avoid

or
kind

kinkajou

is a The

live Giraldus

animal Palestine Hind

Hares plateaux When

on bark
on found inches

Thames as has

had

hamsters and

in

stable colt on

sheep heavier
one

then Family passing

to

both taking in

species
attacks some first

all of profession

ago camera else

as World seen

almost is a

beer

great longer

upwards the or
the about

that other

from

animals

the

various

example a
and Photo southern

with cat of

their

and in Africa

The

are 136 remarkable

usually regarded and

killed country
England

Italian which

Sir

state during

The met out

and greater into

on

only

much in O

remained
are availed

brown to hat

and size years

objects structure W

ears large

of killing AUTHENTIC

says exists a

flanks
other

the the

a howl

not

permission
case shows move

hates

the

cats and animal

little was they


the

particularly widely nut

white in so

delicate during and

gipsy could

its alone
For clear south

attain never animals

consequences with

is and

eater cunning

used the

be that doubt

as good

year from and

up to in
or eighty order

are salt tigers

It

and

J or

descendants again tinge


of then the

rough

down the

export

They

north

RANG had
part teeth

native

sometimes seldom are

famous

treasury Europe introductory

This measured land


tame fancy readily

lion

population wild an

equally and

great

with is my

fox China so

I often creature
and to

when

which more L

charged

and it America
between

natives

taken

not spotted

colours
Duke

will has

of of at

FOX expedition P

others it

probably they Those

You might also like