Utilisateur
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions.
The primary goals are to recover, analyze, and preserve digital evidence from mobile devices to ensure it can be used in legal proceedings.
Call logs, text messages (SMS/MMS), and app data (e.g., WhatsApp, social media).
The first step is to secure the device to prevent any tampering or loss of data.
A Chain of custody refers to the documentation process that tracks the seizure, custody, control, transfer, analysis, and disposition of the evidence.
Airplane Mode disables all wireless communications, preventing remote wiping or data tampering while preserving the evidence on the device.
Logical extraction retrieves active data like contacts and messages, while physical extraction can recover all data on the device, including deleted files.
Cellebrite UFED is a commonly used tool for extracting data from mobile devices.
Encryption can protect data on a mobile device, making it challenging to access without the correct decryption keys or techniques.
A SIM card stores subscriber information, call logs, text messages, and can be a vital source of evidence.
The IMEI (International Mobile Equipment Identity) is a unique identifier for mobile devices, useful for tracking and identifying a device.
A Faraday bag is a container that blocks radio signals, preventing a mobile device from sending or receiving data during forensic analysis.
Artifacts are pieces of digital evidence such as logs, cached files, or remnants of deleted data that provide information about a user’s activity.
Metadata provides information about other data, such as timestamps, GPS locations, and file creation details, which can be crucial in an investigation.
Documentation is critical to ensuring the integrity of the evidence, enabling the forensic process to be replicated or reviewed in legal proceedings.