Authors
Preeti Ansari, Ritika Sharma
Abstract
Digital forensic is a scientific study which identify, extract, analyze and present the evidence which was found in digital devices. The WhatsApp, the Signal is a mobile application which allows user to transfer messages, images, audio, videos, location etc. The Smart phones are merely used in criminal activities and can be used for digital evidence as a part of an investigation. The Digital Forensic Tools used by the investigators were not actually designed for the forensic application. Data retrieval tools are generally use as the method of restoring data partially or completely from damaged, failed, corrupted storage media. This paper focuses on data recovery and also comparison of extracted data from the WhatsApp and the Signal application. Keywords: Mobile forensic, WhatsApp, Signal, MSAB XRY, Cellebrite UFED, Data Extraction.
Introduction
The Cyber Forensics has faced major obstacles in the last few years. Cybercrime is rising day by day and the contest in the case of cyber criminals is never-ending since the internet was established. The low cost of digital equipment’s are not only attracting the common man but also criminals to use them and so crimes are swiftly increasing.
The Mobile Forensics is the collecting of digital evidence retrieved from a mobile phone. Here is an immense demand to extract data from smartphones today as the crime rate is rapidly increasing. There are different tools to restore the data. In terms of investigation, smartphones frolic a crucial part as they are routinely found in crime scenes. The capability to access the data relies on the internal memory of the mobile phone while extraction of the evidence (Al Hidaifi, 2018). The personal computers that have a limited number of major operating system vendors, there are countless manufacturers of smartphones and mobile devices with their own proprietary technology and formats (Aziz et al., 2015).
In the modern era, cell phone evidence is playing a vital role in cases of homicides, suicide, sexual assault, human trafficking, narcotics etc. Forensic evidence is recovered from phone memory, sim cards and memory cards using different forensic tools so the data can be extracted, decoded, analyzed and reported. The android cell phone can behave like a small PC and it contained information regarding cell phone, address book, messenger, photo & video camera, GPS navigator, web client and platform for 3rd party applications. Before packing cell phones should be put either in Faraday bags or switched on airplane mode to keep away the cell phone from network signals. In the case where neither the faraday bag nor airplane mode option is available, then the battery of the cell phone can be removed and packed separately in the sample parcel.
References
Al Hidaifi, Saleh. “Mobile Forensics: Android Platforms and WhatsApp Extraction Tools.” International Journal of Computer Applications, vol. 179, no. 47, 2018, pp. 25–29.
Aziz, Normaziah A., et al. “Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone.” 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015.
Khan, Azimuddin, and Zakir Hussain Mansur. “Comparative Study of Various Digital Forensics Logical Acquisition Tools for Android Smartphone’s Internal Memory: A Case Study of Samsung Galaxy S5 and S6.” International Journal of Advanced Research in Computer Science, vol. 9, no. 1, 2018, pp. 357–69.
Sahu, Shubham. “An Analysis of WhatsApp Forensics in Android Smartphones.” International Journal of Engineering Research, vol. 3, no. 5, 2014, pp. 349–50.
How to cite this article?
APA Style | Ansari, P., & Sharma, R. (2022). Retrieved Data Comparison of WhatsApp and Signal Application. Academic Journal of Forensic Sciences, 05(01), 01–07. |
Chicago Style | |
MLA Style | |
DOI | |
URL |