Forensic Investigation: Evidence Recovery on an Amazon Kindle Fire HD
VerifiedAdded on 2024/06/28
|2
|551
|345
Case Study
AI Summary
This case study details the forensic investigation of an Amazon Kindle Fire HD (2014 model) for evidence recovery. The process begins with creating an MD5 hash value of the device to ensure data integrity throughout the investigation. The analysis is performed on an image of the device, created using tools like XRY or Oxygen, to preserve the original evidence. The image is then analyzed using Internet Evidence Finder (IEF) to identify artifacts from the device's custom Android Ice Cream Sandwich operating system and Silk web browser. The IEF Report Viewer is used to present the findings, which include URLs with timestamps and data from Facebook, Silk Browser, email, and Amazon Cloud Drive. The investigation highlights the importance of system and event logs in tracking user activity. While tools like Oxygen and IEF are valuable, they have limitations, necessitating the use of multiple tools for comprehensive analysis. The Kindle stores significant user data, making it a valuable source of evidence for investigators, including location data, behavioral patterns, and communication records.
1 out of 2