They concluded that FTK and EnCase are better in recovery than MOBILedit and Oxygen Forensic Suite. conducted an evaluation of mobile forensic tools including AccessData FTK, EnCase, MOBILedit Forensic Express and Oxygen Forensic Suite on two mobile devices named HTC Desire 300 with android v4.1.2 and Samsung Galaxy GT-S5300 android v2.3.5 focusing on the recovery of deleted data. crypt12 encryption using Belkasoft Evidence (Trial version) and WhatsApp Key/DB Extractor in which Whatsapp key/DB Extractor gave better results in extracting text messages while Belkasoft Evidence gave much better results in extracting the media & documents. conducted forensic analysis on the WhatsApp application database having. Much research conducted on techniques of data extraction from different mobile devices using open-source and proprietary mobile forensic tools which are now conclusively implemented in forensic labs for extraction purposes. The investigator must have an idea about the make & model along with the operating system and its security patch level before choosing any tool for smooth evidence collection for the mobile device. The application of these acquisition methods mainly depends on the operating system of Mobile devices and the functionality of the tools. Mainly mobile forensic tools work on Logical, Physical, and File system acquisition. The scientific process of acquisition, extraction, analysis, and presentation of mobile devices and related evidence in a forensically sound condition is known as Mobile forensics. Another challenge in mobile forensics is the Boot loop during data extraction which is the device freezing on the startup screen and does not start further, mostly when using a noncompatible mobile forensic tool or the operating system for extraction and acquisition. This produces a challenge to the forensic investigator to extract useful data from the suspected user’s mobile devices for criminal investigation and trial purposes. Certain Smartphone Industries are looking to mitigate these risks by implementing security patches and updates regularly the Indian smartphone market is pacing upward and reaches 150 Million in 2020 and will increase to 11% with 167 - 168 Million in 2020 with a high prediction of 187 - 190 million market pace in 2022. Moderation techniques and strides to these unavoidable dangers paves a way for steady data assurance. Demographical data manifests 4.62 billion of the total population as dynamic web-based media clients which gauges 58.4% till Jan 2022. Internet activity focus contributes over 5.31 billion and estimates 67.1% of the total population employs smartphones till Jan 2022. As the number of users increases day by day, the amount of data generated from mobile devices is at high-security risk. The proposed study also introduces newly developed utility tools along with their characteristic features which help in successful data extraction from mobile devices.Ĭonsidering the upward trajectory in urbanization results in a remarkable increase in world population crossing 7.91 billion with augmentation of cyberspace to approximately 4.95 billion as per Digital 2022 Global Overview Report. The study aims at extracting comparative and statistical approaches in the analysis of Physical data acquisition utilizing significant versatile mobile criminological proprietary tools. Upgradation and innovation of mobile devices with time imposed a challenge to mobile forensic technology to extract information from such devices. Acquisition, Collection, and Analysis of mobile phones settle the purpose of recovering cumulative and corroborative evidence. Mobile forensics is a developing branch assisting the investigator in criminal trials and investigations. The need to foster techniques and procedures in the field to be able to extract and precisely dissect digital crime cases, providing valuable tactical data about the investigation. To mitigate them, the implementation of security patches, safety fixes, and updates in mobile devices is of high priority for the organization. Marking the rise of criminal activity in recent years sees enormous growth in security breaches and data theft-related cases in mobile phones. The utilization of the Internet and wireless communication reaches its pinnacle from one side of the planet to the other.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |