A platform independent and forensically sound method to extract WhatsApp data from mobile phones Online publication date: Tue, 02-May-2023
by Aritro Sengupta; Amit Singh; B.M. Vinjit
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 15, No. 3, 2023
Abstract: With the increasing usage of WhatsApp worldwide, for text and media communication, WhatsApp data artefacts are prioritised by forensic investigators and LEAs to examine and prosecute crimes. Nowadays, the well-known conventional methods of extraction are failing to extract the required WhatsApp data due to updated security patches of the operating system and various other hardware updates. Investigations may end up being intangible due to a lack of production of WhatsApp data as evidence before the court of law. In this paper, a forensically sound method of extracting WhatsApp data is discussed which works irrespective of the hardware and software specifications of the mobile phone. Several parameters which detect the efficiency of WhatsApp data extraction have been discussed which are based on state-of-the-art technologies and recent field experience. In the later section, we have compared the proposed method with the other conventional methods of extraction.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com