Mobile Forensics

Describe the steps involved in seizing evidence from a mobile device.
Describe the information a mobile device reveals about the owner.
Assignment Requirements

You are an experienced employee of the DigiFirm Investigation Company. DigiFirm is conducting an employee training activity in which employees describe the process of how they would look for evidence on their own mobile devices.

For this assignment, write a report that:

Details the properties of one of your own mobile devices
Outlines the steps you would take to seize evidence from your device, including device storage, system data, and so on
Describes a few legal issues related to mobile device forensic activities in general
Lists the general information that your device reveals about your life

Full Answer Section

     
  1. Physical Securement: Secure the device in a tamper-evident bag to prevent unauthorized access and physical tampering.
  2. Documentation: Document the condition of the device, including any existing cracks, scratches, or signs of tampering. Note the make, model, IMEI number (unique identifier), and any relevant settings (airplane mode on/off).
  3. Data Acquisition: This is a complex step typically performed by a forensics specialist using specialized tools. There are two main methods: logical acquisition (copying data) and physical acquisition (creating a complete image of the device storage).
  • Logical acquisition captures user data like contacts, messages, call logs, photos, and app data.
  • Physical acquisition creates a forensic image, a complete copy of the device's storage, including deleted data and system files. This is a more complex and time-consuming process but offers a more thorough investigation.
  1. Chain of Custody:Maintain a meticulous chain of custody document, recording every individual who handles the device and the date/time of each transfer.
Legal Considerations: Walking the Digital Line Mobile device forensics involve legal gray areas. Here are a few key points to remember:
  • Warrants:Law enforcement typically requires a warrant to seize a device and access its data.
  • Consent:With informed consent, investigators can acquire data. However, consent can be ambiguous, so documented procedures are essential.
  • Employer vs. Employee:Employers may have stricter policies regarding data access on company-issued devices.
Your Digital Persona: A Story Your Phone Tells Mobile devices hold a wealth of information revealing our digital personas. Here are some examples:
  • Location Data:GPS data can track your movements, revealing frequent locations like home, work, or favorite hangouts.
  • Communication History:Call logs, text messages, and emails paint a picture of your social and professional network.
  • App Usage:The apps you use and how often you use them can reveal your interests, hobbies, and health habits.
  • Search History:Web and app search history provides insights into your online activities and thought processes.
  • Photos and Videos:Captured moments can reveal your social circle, travel destinations, and even purchasing habits.
Conclusion Mobile devices are treasure troves of personal information. Understanding how evidence is seized and the legal implications surrounding it is crucial. By being mindful of your digital footprint, you can protect your privacy and ensure responsible data management. Note: This report simulates a self-examination and does not involve actual data acquisition or forensic procedures.  

Sample Answer

     

Mobile Device Forensics: A Self-Examination

My Device:

This report details the data acquisition process for a Samsung Galaxy S21 Ultra smartphone. It runs the Android 13 operating system and has 256GB of internal storage.

Seizing Evidence: Preserving the Digital Footprint

The following steps outline how to seize evidence from a mobile device while maintaining a chain of custody, crucial for legal proceedings:

  1. Power Down: The first step is to power down the device to prevent further data modification. Modern smartphones can encrypt data upon power down, offering an extra layer of security for sensitive information.