Cargando…
Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments
This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505885/ https://www.ncbi.nlm.nih.gov/pubmed/36146443 http://dx.doi.org/10.3390/s22187096 |
_version_ | 1784796584978939904 |
---|---|
author | Cuomo, Raffaele D’Agostino, Davide Ianulardo, Mario |
author_facet | Cuomo, Raffaele D’Agostino, Davide Ianulardo, Mario |
author_sort | Cuomo, Raffaele |
collection | PubMed |
description | This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many real court cases. The results show that mobile forensics, digital analysis of smartphone Android or iOS can be obtained in two ways: on the one hand, data extraction must follow the best practice of the repeatability procedure; on the other hand, the extraction of the data must follow the best practice of the non-repeatability procedure. The laboratory study of the two methods for extracting digital data from mobile phones, for use as evidence in court trials, has shown that the same evidence can be obtained even when the procedure of unavailability of file mining activities has been adopted. Indeed, thanks to laboratory tests, the existence of multiple files frequently and continuously subjected to changes generated by the presence of several hashes found at forensic extractions conducted in very short moments of time (sometimes not exceeding 15 min) has been proven. If, on the other hand, the examination of a device is entrusted to a judicial police officer in order to conduct a forensic analysis to acquire data produced and managed by the user (such as images, audio, video, documents, SMS, MMS, chat conversations, address book content, etc.) we have sufficient grounds to believe that such examination can be organized according to the system of repeatable technical assessments. |
format | Online Article Text |
id | pubmed-9505885 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95058852022-09-24 Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments Cuomo, Raffaele D’Agostino, Davide Ianulardo, Mario Sensors (Basel) Article This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many real court cases. The results show that mobile forensics, digital analysis of smartphone Android or iOS can be obtained in two ways: on the one hand, data extraction must follow the best practice of the repeatability procedure; on the other hand, the extraction of the data must follow the best practice of the non-repeatability procedure. The laboratory study of the two methods for extracting digital data from mobile phones, for use as evidence in court trials, has shown that the same evidence can be obtained even when the procedure of unavailability of file mining activities has been adopted. Indeed, thanks to laboratory tests, the existence of multiple files frequently and continuously subjected to changes generated by the presence of several hashes found at forensic extractions conducted in very short moments of time (sometimes not exceeding 15 min) has been proven. If, on the other hand, the examination of a device is entrusted to a judicial police officer in order to conduct a forensic analysis to acquire data produced and managed by the user (such as images, audio, video, documents, SMS, MMS, chat conversations, address book content, etc.) we have sufficient grounds to believe that such examination can be organized according to the system of repeatable technical assessments. MDPI 2022-09-19 /pmc/articles/PMC9505885/ /pubmed/36146443 http://dx.doi.org/10.3390/s22187096 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Cuomo, Raffaele D’Agostino, Davide Ianulardo, Mario Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title | Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title_full | Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title_fullStr | Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title_full_unstemmed | Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title_short | Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments |
title_sort | mobile forensics: repeatable and non-repeatable technical assessments |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505885/ https://www.ncbi.nlm.nih.gov/pubmed/36146443 http://dx.doi.org/10.3390/s22187096 |
work_keys_str_mv | AT cuomoraffaele mobileforensicsrepeatableandnonrepeatabletechnicalassessments AT dagostinodavide mobileforensicsrepeatableandnonrepeatabletechnicalassessments AT ianulardomario mobileforensicsrepeatableandnonrepeatabletechnicalassessments |