Pin, Gesture And Password Analysis
The use of the PIN access is probably the most extended method to protect the phone from unauthorized access, but it can be used to protect access to the filesystem. It is commonly provided by the manufacturer, and includes the possibility of change if the user wants. As security feature, in order to protect the mobile device against brute …show more content…
Phone catalog and contacts.
. Incoming, outcoming, and missed calls.
. Incoming, outcoming text messages and MMS.
. Sounds recording, vocal notes, and calling sounds.
. Pictures, images, video.
. Calendar, alarm clocks, and reminders.
. E-mails saved at the phone, notes.
. Web history browsing, cookies, internet temporary files (if the mobile phone has the internet navigation option).
. Any type of documentation in the next formats: Word, PDF, Excel, etc.
. User identifiers such as PIN, personal information, etc.
. Device identifiers such as IMEI.
. Network´s used such as home wifi connection, work place wifi, free networks, etc.
. Geo-location information.
. Predictive words added. (Androulidakis. …show more content…
It is necessary in order to carry out a professional research, the digital forensic investigator will need to follow strict and specific techniques for data acquisition, maintenance of evidences to avoid data alteration/destruction, information analysis, and final presentation of the results obtained. (Androulidakis. 2012).
Taking into account that the device selected for a digital forensic research was used for a criminal activity, how can the researcher find relevant information to be used as evidence?. If the mobile device was found in the crime scene, can the investigator determine who was the user (the mobile phone owner or a third person) at the crime moment?. The mobile phone could be abandoned deliberately at the crime scene?. The information contained at the mobile phone, could be altered intentionally? (Androulidakis. 2012).
Other circumstances apart of digital environment should be considered in order to preserve every evidences such as fingerprints, DNA (if blood was found), drugs and guns at the crime scene, etc. Simply data acquisition is not enough, therefore, a digital forensic researcher should be follow some steps before to acquire valid and relevant information. (Androulidakis.