{"title":"DATA EXTRACTION FROM PASSWORD PROTECTED MOBILE PHONE BY USING CHIP-OFF METHOD –A FORENSIC CASE STUDY","authors":"","doi":"10.29121/ijesrt.v10.i3.2021.5","DOIUrl":null,"url":null,"abstract":"The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.","PeriodicalId":11002,"journal":{"name":"Day 1 Tue, March 23, 2021","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Day 1 Tue, March 23, 2021","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29121/ijesrt.v10.i3.2021.5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.