Mobile Device Artifacts: Exploring Geolocation, Communication, Application and Media Evidence
Mobile device artifacts are digital breadcrumbs: forensically valuable data created by a mobile device that help investigators better understand a case.
Mobile device artifacts are digital breadcrumbs: forensically valuable data created by a mobile device that help investigators better understand a case.
Media artifacts on a device – both captured with the device’s on-board cameras and transmitted to the device through various methods – can be another area of interest during an investigation.
If you spend even a little time working with video files, you may be familiar with terms like MP4, MOV, AVI, AVC, and a dozen other three-letter abbreviations. Often, playing these types of video files requires downloading a codec to get this video to play. Have you ever found yourself wondering which player you should … Continued
Join our webinar as we introduce one of our latest features – Media Descriptions! Now also available in Magnet Griffeye.
Public evidence submission portals are a game changer for frontline police officers and investigators. Officers and detectives no longer need to deal with the challenge of obtaining individual video files from cellphones or other digital devices, only to face the additional challenges of storing and sharing video evidence. Citizens can now receive a link from … Continued
Cellebrite images are quite popular, as the tool supports many different devices and extraction types. Because of this, you may get several different image types depending on the device and the type of extraction done. Often, I will get questions on how to load Cellebrite images into Magnet AXIOM and while it’s quite easy, it’s not always straightforward.
Investigations that center around media review and analysis often require additional examination time as lab personnel have to examine images and video found on devices.
Digital investigators and examiners creating forensic images for DVR analysis utilize two main file formats to store bit-for-bit copies of hard drives used in their examinations. E01 forensic image file format is the default imaging option for many computer forensics tools and has become a de-facto standard of sorts. While somewhat lesser known, the raw … Continued
Join Kim Bradley as she showcases how to acquire and analyze public facing social media data in AXIOM from Facebook, Twitter, and Instagram. Plus, she’ll highlight some tips and tricks to show how these data sources become more valuable together. When your POI won’t cooperate, the more OSINT the better!
We take a look at extracting images from iOS devices using Magnet AXIOM, including full file images, and how they can impact investigations.