- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 293字
- 2021-06-24 16:38:56
The evidence intake phase
The evidence intake phase is the starting phase and involves paperwork that captures ownership information and the type of incident the mobile device was involved in, and outlines the kind of data the requester is seeking. Developing specific objectives for each examination is the critical part of this phase. It serves to clarify your goals. Before the physical seizure process begins, you should be familiar with federal, state, and local laws pertaining to an individual's rights. If the right procedures are not followed, the investigation may be considered illegal in a court of law. The procedure and the legality may vary based on whether you are a government agent or a private party. For example, in the US, fourth amendment rights prevent any searching or seizure by a government agent without having a proper search warrant. The search warrant should clearly authorize the seizure of the mobile device as well as the kind of data that needs to be collected. After a successful seizure, care should be taken to ensure that a chain of custody is established not only for the device but also for the data collected.
Also, while seizing the device, care should be taken not to modify any data present on the device. At the same time, any opportunity to help the investigation should not be missed. For example, at the time of seizing the device, if the device is unlocked, then try to disable the passcode.
- Node Security
- 黑客大曝光:無線網絡安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- Learning Python for Forensics
- 開發者的Web安全戒律:真實威脅與防御實踐
- 功能型密碼算法設計與分析
- 聯邦學習原理與算法
- Web代碼安全漏洞深度剖析
- 社會工程:防范釣魚欺詐(卷3)
- Kali Linux無線網絡滲透測試詳解
- 黑客攻防從入門到精通:實戰篇(第2版)
- Hands-On Spring Security 5 for Reactive Applications
- 防火墻和VPN技術與實踐
- 精通Veeam Backup&Replication(原書第2版)
- 計算機病毒技術及其防御