This project focuses on the forensic investigation of an Android mobile device to identify, collect, analyze, and report digital evidence related to cyber crime activities. The study is conducted in a simulated academic environment and aligns with IFSO (International Forensic Sciences Organisation) learning objectives.
Android smartphones store critical digital artifacts such as call logs, SMS messages, browser history, and application data, which are often crucial in cyber crime investigations including fraud, phishing, and social engineering attacks.
- To understand Android mobile forensic investigation procedures
- To identify potential digital evidence stored on Android devices
- To analyze mobile artifacts related to cyber crime incidents
- To study forensic tools and investigation methodologies
- To understand legal and procedural aspects of digital evidence
A simulated cyber crime case is considered in which a user device receives suspicious calls, phishing-style messages, and visits potentially malicious websites. The Android device is examined to identify forensic artifacts that may indicate fraud or social engineering attempts.
⚠️ Note: This case study is purely simulated and used only for academic and training purposes.
- Call logs (suspected fraud, harassment, unknown numbers)
- Blocked and filtered numbers
- SMS and messaging app alerts
- Browser history (suspicious and normal URLs)
- Device information and system settings
- Installed applications
- Network and SIM information
The investigation follows standard digital forensic procedures:
- Identification – Locating potential sources of evidence
- Preservation – Ensuring data integrity and preventing alteration
- Collection – Acquiring logical and accessible mobile data
- Examination – Filtering and extracting relevant artifacts
- Analysis – Correlating evidence and identifying suspicious patterns
- Reporting – Documenting findings in a forensic report
- Android OS
- Autopsy (Digital Forensic Platform)
- FTK Imager
- Android Debug Bridge (ADB)
- SQLite Database Browser
(All tools were used in an academic and simulated environment.)
- Information Technology Act, 2000
- Section 43 – Unauthorized access
- Section 66C – Identity theft
- Section 66D – Cheating by impersonation
- Indian Penal Code (IPC)
- Section 419 – Cheating by personation
- Section 420 – Cheating and dishonestly inducing delivery of property
- Chain of Custody principles
The repository includes screenshots and visual documentation of:
- Call log analysis
- SMS and phishing message examples
- Browser history artifacts
- Device and application information
All screenshots are simulated or sample data and do not contain real victim information.
- Practical understanding of mobile forensics
- Ability to identify and analyze mobile digital evidence
- Knowledge of cyber crime investigation workflows
- Awareness of legal considerations in digital forensics
- Advanced mobile forensic extraction techniques
- Cloud-based mobile evidence analysis
- AI-assisted fraud detection and forensic automation
All data, screenshots, and case scenarios used in this project are simulated or sample data created strictly for academic and training purposes only. No real victim data or sensitive personal information has been used.
Deepanshu Semwal
B.Tech CSE (Cybersecurity)
Academic Project – IFSO Oriented
Feel free to ⭐ star the repository and explore more cybersecurity and digital forensics projects.