Network & Mobile Network Forensic
Network & Mobile Network Forensic
•3. Cloud Services & Backup Platforms:- iCloud, Google Drive backups,
Contacts, calendars, and notes,Photos, emails, and app data, App-specific
backups (WhatsApp, Telegram cloud, etc.)
4. Internet Service Providers (ISPs) and VPN Logs:-IP addresses used by the
device, Timestamps and session durations, Proxy/VPN access records
5. SIM Card and Subscriber Information:-IMSI (International Mobile
Subscriber Identity),SMS stored on SIM,Last used phone numbers, Contacts
saved on SIM.
6.Wi-Fi Networks and Hotspot Logs:-SSIDs of connected networks,
Timestamps of connections, MAC address logs (from routers or access points)
Interpretation of Digital Evidence on Mobile Network
Once digital evidence has been collected from mobile networks, devices,
and related systems, the interpretation phase begins. This involves
analyzing the raw data to extract meaningful insights, patterns, timelines,
and potentially incriminating or exculpatory evidence.
Interpretation in mobile network forensics means:
Making sense of collected data by connecting technical information to
human actions, behaviors, or events relevant to the investigation.
Behavioral and Pattern Analysis:-
• Frequent contacts → Identify inner circle of communication.
• Unusual spikes in data usage → May signal use of secure apps or file
transfers.
• Night-time activities → May point to suspicious behavior patterns.
• SIM changes or tower hopping → Evasion tactics or use of multiple
Unit 5:- Software Reverse Engineering