Skip to main content
Skip table of contents

Mobile Device Assessment and Identification

The identification phase in mobile forensics is the initial step in the forensic process, where the user/investigator identifies the mobile device and its potential value to an investigation.

This phase is crucial because it helps determine the scope of the extraction and analysis and the specific types of evidence that may be available on the device.

MOBILedit Forensic

With a connected device that is unlocked, you will be able to access some information that is described on this page by using the following features:

  • “i” (information) button - Gives an overview of the device details and properties.

  • Browse content > File manager >Extra (applications1) > getprop.txt

    • These are just a few examples of what can be found in the getprop.txt document: [ro.crypto.state] = encrypted or not, [ro.crypto.type] = FDE, FBE, etc., [ro.hw.oemName] = model, [ro.hardware] = chipset.

Key elements to identify during the identification phase:

1. Mobile Device Type, Model and Chipset

  • Identify the make, model, chipset, and manufacturer. This is an important step because different devices have different operating systems (iOS, Android, etc.) and might require different methods for extraction and analysis.

ANDROID

There are various ways through which you can determine the make, model, chipset, and manufacturer of the mobile device:

Label

Sometimes there is a small information sticker on the back of the mobile phone that provides information like make, model, IMEI and manufacturer.

phone-with-imei-1707905781-20250423-060325.jpg
Engraving

Some smartphones have an engraving on the back of the mobile phone detailing the make, model and manufacturer.

img_0326-ad 1-20250423-055046.jpg
SIM card tray

Some manufacturers imprint the IMEI number on the SIM card tray. It is always best to cross-check the number with one of the other methods, as the tray could be a replacement from another device.

Settings

If you can unlock the phone, head to Settings>About Phone and note down the details like make, model and manufacturer and corroborate against physical identifiers and those in MOBILedit Forensic.

image-20250423-055504.png

Google Lens

Sometimes, when the phone cannot be unlocked and when the above methods are not applicable, you can always use Google Lens to approximately identify the phone you have in question. This method requires a lot of human intervention and patience, as finding the exact make and model of the mobile phone can take time.

The majority of times, it has been found that to maximise accuracy in results, you need to scan or take a picture of the back panel of the mobile phone, as most of the time it is the differentiating factor between mobiles.

IMG_6609-20250423-061640.JPG

iPHONES

Engraving

The older generation of iPhones used to have engraving on the back of the mobile phone detailing the make, model and manufacturer.

image-20250423-053242.png
Google Lens

Sometimes, when the phone cannot be unlocked and when the above methods do not apply to the device you have, you can use Google Lens to approximately identify the phone you have in question. This method requires a lot of human intervention and patience, as finding the exact make and model of the mobile phone in question can be tiring.

It has been found that the majority of the time, to maximise accurate results, you need to scan/click the picture of the back panel of the mobile phone, as it is most of the time the differentiating factor between mobiles.

IMG_6606-20250423-052508.JPG
Connection Ports

Newer generations of iPhone do not include engraving on the back of the phone anymore instead, the model of the mobile phone can be found using the following:

iPhone 8 to iPhone 13
-Inside the SIM card tray slot

image-20250423-053642.png

iPhone 14 to current
-Within the Charging port

image-20250423-053707.png

2. IMEI (International Mobile Equipment Identity)

  • The IMEI number is a unique identifier for mobile devices, especially in GSM networks and is generally 15 digits long. Usually, the numbers are placed as follows: WW-XXXXXX-YYYYYY-Z, where:

Structure: AA-BBBBBB-CCCCCC-D

Type Allocation Code aka TAC: This code, which identifies the make and type of the device, is represented by the first eight digits (AA-BBBBBB).

Serial Number aka SNR: The unique serial number is represented by the following six digits (CCCCCC).

Check Digit aka CD: To confirm the integrity of the IMEI, the last digit (D) is the check digit. This last digit is calculated by an algorithm known as Luhn's Algorithm. Link: https://www.imei.info/luhn-algorithm/

The IMEI can be used for identification if the make & model cannot be determined by other methods. One device can have more than one IMEI number, and the number of IMEI’s found on a device is directly proportional to the number of SIM cards (whether Physical or an embedded [eSIM]). For example, a device described as dual-sim means 2 SIM cards can be inserted in the phone or you might see SIM + eSIM, both examples will have 2 IMEI numbers.

IMEI check

Find the device IMEI number, then visit the website www.imei.info and enter the IMEI number to get the information required.

Note: IMEI can be a great source of identification of a mobile phone, but the user/investigator should validate the information found using the IMEI number, as the IMEI number can be spoofed by a malicious actor, which can be misleading.

3. Internet research

Once you have utilised the above methods to get a hold of the make, model and manufacturer of the device, it is then better to go to reliable websites such as GSMArena, OEM Website, or imei.info to find out the chipset found within the device in question, especially for cases where logical extraction is not possible due to any reason. You can then apply chipset security bypassing methods within MOBILedit Forensic PRO & ULTRA.

Image from iOS-20250423-055254.jpg

Specifically for Apple devices, there are two useful websites: everymac.com and appledb.dev, which can be used for further model identification and also give information about what devices and iOS versions can be jailbroken.

4. Operating System (OS), Version and other important information

Determine the operating system and its version. This impacts the tools and techniques used during extraction and analysis. Different OS versions might deploy different file systems and security mechanisms.

Android
  • You can get an idea about the current OS version and other information by going to Settings>About Phone. You should note down information like OS Version, Security Patch Level, Kernel Version, OS Skin version (E.g., MIUI Version, HyperOS Version, OxygenOS version).

Screenshot_20250423_113653_Settings-20250423-060752.jpg
iPhone
  • Settings > General > About

5. SIM Card Identification

  • If a SIM card is present, it is important to identify the SIM card’s unique identifier (ICCID) and the associated phone number. The SIM card may also hold valuable information like call logs, text messages, and contacts.

  • Keep SIM cards inserted during initial extraction.

  • Removing may trigger SIM PIN requests or lock access.

  • ICCID and phone number may provide key evidence and lead to further enquiries with mobile network operators.

For Apple devices, removing the SIM card will trigger the iPhone to ask for the passcode to unlock, even if the device has Face ID enabled and is in AFU mode.

image-20250423-062453.png

6. SD Card Storage Media

  • Check whether the device uses removable/external memory (e.g., SD cards).

    • Use visual inspection or reference sources like GSMArena.

    • When the SIM/SD tray is removed, reinserting the SIM can trigger a PIN request.

  • The type, size, and presence of an SD card can:

    • Influence the extraction method used.

    • Affect the amount of data available for analysis.

  • Best practice: Leave the SD card inserted in the device for extraction.

    • SD cards are “adoptable storage”, meaning they can either be left as simple storage media or adopt the Android filesystem and become part of the internal filesystem.

    • Removed SD cards may be encrypted and unreadable outside the device.

    • The SD card often inherits the device’s encryption, making external access difficult.

  • During a logical extraction:

    • The SD card is treated as part of the device's file system.

    • Data from the SD card is typically included in the extraction.

  • During a physical image acquisition (if supported):

    • The SD card is not included in the physical dump.

    • It sits outside the internal flash memory and must be acquired separately.

7. Security Features

  • Identify any security features such as passwords, PINs, biometrics (fingerprint or facial recognition), or encryption that may restrict access to the data. Knowing the security setup will help plan the next steps in data acquisition, as these factors may require bypassing or unlocking techniques.

  • Encryption & security

8. Potential Evidence Sources

  • Identify potential sources of evidence within the device that will support your investigation, such as call logs, text messages, emails, GPS data, social media apps, photos, videos, browser history, and other application data.

  • Research the device on the internet to see what type of artefacts the device is capable of generating.

  • Understanding what types of evidence may be present will inform the extraction and analysis process.

9. Physical Condition

  • Assess the physical condition of the mobile device, including any damage, water exposure, or other issues that may affect data extraction. This also involves identifying if the device is powered on, off, or locked.

  • Are the connection ports functional, and does the device have Wi-Fi and/or Bluetooth capability?

    • This should be considered for the extraction and the isolation of the device from the network.

  • You may have to find procedural workarounds or carry out hardware repairs.

The investigator can proceed to data collection and analysis when these components have been discovered. Proper identification guarantees that the evidence collected is legitimate, pertinent, and acquired following the correct forensic procedures.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.