

What about services on the device that are not really an app, but are just a digital breadcrumb of a service? This data in the cloud can be a treasure trove of evidence. When you uninstall an app or switch out a phone, you simply have to download the app and re-authenticate, and magically the app populates the data. From backups to the storage of app data, a user’s cloud can be massive. The data stored within the cloud for each individual using a mobile device can be many times larger than that of the mobile device. With these limitations investigators will need additional sources of data.

This is often fruitful using digital examination tools and training, but what if the necessary data is not stored on the device? What if the device is locked with a passcode, wiped, unavailable, or destroyed? This has been, and will more often be, a problem with investigations into digital data on mobile devices. However, many times this captured location information from an individual’s mobile device is overlooked by the agent.ĭigital forensic investigators often rely on the data at hand on the physical device (e.g., parsed applications on the device, chat messages, media) to make a determination of location at a particular date and time. Today, there are almost 8 billion beacons around the world carried in the pockets of humans, offering investigators a wealth of information about individuals’ whereabouts. Back then, location data might have come from a witness statement, surveillance video, audio capture, or another archaic source. Using this type of data we were often able to tie a party involved in an investigation to a particular place and time. As a former law enforcement officer, I am cognizant of the importance of location information.
