Collecting and analysing mobile evidence
Kritika Singh Rajawat
ASSISTANT PROFESSOR KRMU | Director @Beyondevidence | MEMBER SECRETARY UBA' MOE'24 | CYBER FORENSIC | NFSU - MHA'22 | NCFL- DELHI POLICE'24 | MALWARE ANALYSIS | DIGITAL FORESIC | FORESIC SCIENCE |
Collecting and analysing mobile evidence, often referred to as mobile forensics, is a critical aspect of digital investigations, especially in cases involving cybercrimes, data breaches, or other illegal activities. Mobile devices, such as smartphones and tablets, can contain a wealth of information that can be crucial in solving crimes or understanding digital activities. Here's a general overview of the process:
1. Preservation: The first step is to preserve the mobile device in its current state. This means ensuring that the device is not powered off or altered in any way that could potentially damage or change the data. This is typically done by placing the device in a Faraday bag or box to block external signals.
2. Documentation: Create detailed documentation of the device, its condition, and any physical or environmental factors that could affect the investigation.
3. Chain of Custody: Maintain a strict chain of custody, documenting all individuals who have contact with the device and ensuring that it remains secure at all times.
4. Acquisition: Make a bit-by-bit copy (forensic image) of the device's storage. This includes the device's internal memory, external storage (e.g., SD cards), and SIM cards. Tools like Cellebrite, XRY, and Oxygen Forensic Suite are commonly used for this purpose.
领英推荐
5. Analysis: Once a forensic image is created, the analysis phase begins. During this phase, forensic experts use specialized software to examine the data on the mobile device. They look for a wide range of digital artifacts, including text messages, call logs, emails, photos, videos, social media activities, GPS location data, and more.
6. Data Recovery: Deleted or hidden data may be recovered during this phase. This can be critical in investigations as suspects often attempt to conceal their activities.
7. Extraction of Key Evidence: Investigators identify and extract key evidence relevant to the case, such as communication logs, location history, or incriminating files.