Forensic investigations on a wireless device is an emerging field in forensic science and law enforcement. Particularly, through mobile forensics, digital evidence can be extracted by recovering, gathering and analyzing data stored in wireless devices. Examples of data that can be collected from wireless devices include emails, text messages, transactions, computer documents, and images. Notably, most of these devices use backup systems that are online-based such as cloud, which allows forensic investigators to access the information during an investigation.
Investigators use mobile forensic because in the age of technology, crimes occur within technological tendencies. The process of conducting a forensic investigation on a wireless device entails various steps as outlined below. The three primary steps include seizure, acquisition, and examination and analysis (Agarwal et al., 2011). Forensic investigators are required to seize a wireless device once they have proved that it contains evidence that can be used in an investigation. Noteworthy, individuals and their properties are protected under the Fourth Amendment, and the seizure of the device can only be conducted once a warrant is obtained.
The evidence is the critical element in the operation of digital forensic and as such, once the device has been seized, it is confiscated and handled in a way that the evidence is preserved (Agarwal et al., 2011). The second step in the forensic investigation process is an acquisition, where data is retrieved from the device. Forensic investigators are then required to identify data sources and gather all the information. Once information has been collected, it gets to the examination and analysis stage. Numerous forensic tools are used in the examination and analysis of data due to the diversity of mobile devices. The analyzed information is then documented in readiness for presentation in court.
Unlike investigation on a traditional computer, it is difficult to control data on wireless devices because the data is mobile. Any information or file send from a wireless device could change within a short time making it difficult for forensic investigators to retrieve and store information. Specialized equipment required at the beginning of the process includes a Faraday cage/bag and external power supply. A Faraday cage is a container designed to isolate wireless devices from network communication while ensuring safe transportation of evidence (Agarwal et al., 2011). The external power supply is usually embedded inside the Faraday cage, and it ensures the device retains power for evidence to be preserved.