Module 5.1 (1)
Module 5.1 (1)
7. Physical Security
● Tampering and device integrity: Mobile devices can be physically damaged, and
forensic experts may have to deal with devices that have been tampered with or altered
(e.g., hardware modifications or damage to storage components).
● Bypassing security mechanisms: Certain devices may have specialized security
mechanisms that make it difficult or impossible to bypass security measures, such as
secure boot systems or biometric locks.
8. Data Volatility
● Mobile devices are prone to data volatility. Data may be erased, overwritten, or corrupted
due to the volatile nature of flash memory or the device being reset or wiped.
● RAM: Evidence from volatile memory (RAM) can be lost quickly once the device is
powered off, making it important to act swiftly in acquiring data.
5. Data Preservation
Preserving the acquired data is crucial to maintaining its integrity:
● Creating a Forensic Image: After the data has been acquired, a forensic image (a
bit-by-bit copy of the data) should be created. This preserves the data for analysis and
ensures that the original device remains unchanged.
● Hashing: Forensic examiners calculate hash values (e.g., SHA-1, MD5) of the original
device and the acquired image. This is used to verify the integrity of the data to ensure no
alterations have been made during the acquisition process.
7. Documentation
Every step of the process, including seizure, acquisition, and preservation, must be thoroughly
documented:
● Chain of Custody: This is a crucial part of the evidence process, detailing every person
who handles the device and the actions performed on it. This ensures the evidence
remains admissible in court.
● Logs and Reports: Forensic examiners should generate logs of the acquisition process,
including timestamps, the tools used, and any challenges encountered during the process.
These reports should be clear and comprehensible to be used in legal settings.
Mobile forensics is a meticulous and complex process, requiring careful planning and the use of
specialized tools to ensure that evidence is collected and preserved properly. Evidence collection
and acquisition need to be performed with caution to maintain the integrity of the data, follow
legal protocols, and ensure the chain of custody is preserved for future analysis and use in court.