Research Article
BibTex RIS Cite

Mobil Cihazlarda Son Etkinleştirme Tarihinin Tespit Edilmesi ve Adli Bilişim Açısından Önemi

Year 2026, Volume: 40 Issue: 1 , 45 - 50 , 30.04.2026
https://doi.org/10.61970/adlitip.1703850
https://izlik.org/JA22UY22NX

Abstract

Amaç: Sıfırlama tarihinin önem arzettiği adli vakalarda adli bilişim uzmanlarının tutarlı ve güvenilir raporlar oluşturması gerekmektedir. Bu çalışma, adli bilişim incelemelerinde Android ve iOS işletim sistemine sahip mobil cihazlarda son etkinleştirme tarihinin güvenilir bir şekilde tespit edilmesini amaçlamaktadır.
Yöntem: Araştırma kapsamında android ve iOS işletim sistemlerine sahip mobil cihazlar fabrika ayarlarına sıfırlanmış ve sıfırlama işleminden sonra cihazların dijital kopyaları alınarak incelenmiştir. Hem Android hem de iOS platformlarındaki sistem ve kullanıcı veritabanı dosyalarının oluşturulma, değiştirilme ve erişim tarihleri ayrıntılı olarak analiz edilmiştir. Ayrıca bu dosyaların sıfırlama işleminden hemen sonra yeniden oluşturulma süreçleri incelenmiş ve dosyaların zaman damgaları karşılaştırılmıştır.
Bulgular: Android cihazlarda özellikle “SetupWizardPrefs.xml”, “Google Service Framework” ve “Google Mobile Service” gibi sistem dosyaları; iOS cihazlarında ise, “sms.db”, “call_history.db” ve “AddressBook.sqlitedb” gibi dosyaların sıfırlama işlemi sonrasında yeniden oluşturulduğu görülmüştür. Bu dosyaların zaman damgaları son etkinleştirme tarihini belirlemede güvenilir bir referans noktası olarak değerlendirilebilmektedir.
Sonuç: Android ve iOS cihazlarında, fabrika ayarlarına döndürme işlemi sonrası oluşturulan dosyaların zaman damgaları, adli bilişim incelemelerinde son etkinleştirme tarihinin tespiti için önemli kanıtlar sunmaktadır. Bu çalışmada elde edilen bulgular sıfırlama tarihiyle yüksek oranda (dakika bazında) tutarlılık gösterdiği gözlemlenmiştir. Ayrıca her cihazın ve işletim sisteminin kendine özgü veri yapısının dikkate alınması, inceleme sürecinde hata payını en aza indirmeye yardımcı olacaktır.

References

  • Kukulska-Hulme A, Pettit J, Bradley L, Carvalho AA, Herrington A, Kennedy DM, et al. Mature students using mobile devices in life and learning. Int J Mob Blended Learn. 2011;3(1):18–52.
  • Halvey M, Keane MT, Smyth B. Time based patterns in mobile-internet surfing. In: Grinter R, Rodden T, Aoki P, Cutrell E, Jeffries R, Olsen G, editors. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York (NY): ACM; 2006. p. 31–34.
  • Cameron D. The rocket in your pocket: how mobile phones became the media by stealth. In: Second Joint Journalism Education Association/Journalism Education Association of New Zealand Conference; 2006 Dec; Auckland, New Zealand. p. 4–7.
  • Laurila JK, Gatica-Perez D, Aad I, Bornet O, Do TMT, Dousse O, et al. The mobile data challenge: big data for mobile computing research. IEEE Pervasive Comput. 2012;11(2):24–31.
  • Doherty EP. Digital forensics for handheld devices. Boca Raton (FL): CRC Press; 2013.6. Schwamm R. Effectiveness of the factory reset on a mobile device [dissertation]. Monterey (CA): Naval Postgraduate School; 2014.
  • Felka P, Mihale-Wilson C, Hinz O. Mobile phones and crime: the protective effect of mobile network infrastructures. J Quant Criminol. 2020;36(4):933–956.
  • Dweikat M, Eleyan D, Eleyan A. Digital forensic tools used in analyzing cybercrime. J Univ Shanghai Sci Technol. 2021;23(3):367–379.
  • Smith R. Crime in the digital age: controlling telecommunications and cyberspace illegalities. London: Routledge; 2018.
  • Årnes A, editor. Digital forensics. Hoboken (NJ): John Wiley & Sons; 2017.
  • Ahmad N, Boota MW, Masoom AH. Comparative analysis of operating system of different smart phones. J Softw Eng Appl. 2015;8(3):114–126.
  • Nigrini MJ. Forensic analytics: methods and techniques for forensic accounting investigations. Hoboken (NJ): John Wiley & Sons; 2020.
  • Ayers R, Brothers S, Jansen W. Guidelines on mobile device forensics (draft). NIST Spec Publ. 2013;800-101.
  • Ambler SW, Sadalage PJ. Refactoring databases: evolutionary database design. Boston (MA): Pearson Education; 2006.
  • Shukla U, Mandal B, Kiran KVD. Perlustration on mobile forensics tools. In: Proceedings of the Third International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020); 2021; Singapore. p. 845–856

Detecting Last Activation Date on Mobile Devices

Year 2026, Volume: 40 Issue: 1 , 45 - 50 , 30.04.2026
https://doi.org/10.61970/adlitip.1703850
https://izlik.org/JA22UY22NX

Abstract

Objective: In forensic cases where the reset date is of significant importance, forensic experts need to produce consistent and reliable reports. This study aims to reliably determine the last activation date on mobile devices with Android and iOS operating systems in forensic examinations.
Method: In the research, mobile devices with Android and iOS operating systems were reset to factory settings, and digital copies of the devices were taken and examined after the reset process. The creation, modification, and access dates of system and user database files on both Android and iOS platforms were analyzed in detail. Additionally, the processes of re-creation of these files immediately after the reset were examined, and the timestamps of the files were compared.
Results: On Android devices, system files such as “SetupWizardPrefs.xml”, “Google Service Framework”, and “Google Mobile Service” were found to be re-created after the reset process; on iOS devices, files such as “sms.db”, “call_history.db”, and “AddressBook.sqlitedb” were similarly re-created. The timestamps of these files can be considered a reliable reference point for determining the last activation date.
Conclusion: On Android and iOS devices, the timestamps of files created after the factory reset process provide significant evidence for determining the last activation date in forensic examinations. The findings from this study have observed a high degree of consistency (at the minute level) with the reset date. Additionally, considering the unique data structure of each device and operating system will help minimize the margin of error during the examination process.

References

  • Kukulska-Hulme A, Pettit J, Bradley L, Carvalho AA, Herrington A, Kennedy DM, et al. Mature students using mobile devices in life and learning. Int J Mob Blended Learn. 2011;3(1):18–52.
  • Halvey M, Keane MT, Smyth B. Time based patterns in mobile-internet surfing. In: Grinter R, Rodden T, Aoki P, Cutrell E, Jeffries R, Olsen G, editors. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York (NY): ACM; 2006. p. 31–34.
  • Cameron D. The rocket in your pocket: how mobile phones became the media by stealth. In: Second Joint Journalism Education Association/Journalism Education Association of New Zealand Conference; 2006 Dec; Auckland, New Zealand. p. 4–7.
  • Laurila JK, Gatica-Perez D, Aad I, Bornet O, Do TMT, Dousse O, et al. The mobile data challenge: big data for mobile computing research. IEEE Pervasive Comput. 2012;11(2):24–31.
  • Doherty EP. Digital forensics for handheld devices. Boca Raton (FL): CRC Press; 2013.6. Schwamm R. Effectiveness of the factory reset on a mobile device [dissertation]. Monterey (CA): Naval Postgraduate School; 2014.
  • Felka P, Mihale-Wilson C, Hinz O. Mobile phones and crime: the protective effect of mobile network infrastructures. J Quant Criminol. 2020;36(4):933–956.
  • Dweikat M, Eleyan D, Eleyan A. Digital forensic tools used in analyzing cybercrime. J Univ Shanghai Sci Technol. 2021;23(3):367–379.
  • Smith R. Crime in the digital age: controlling telecommunications and cyberspace illegalities. London: Routledge; 2018.
  • Årnes A, editor. Digital forensics. Hoboken (NJ): John Wiley & Sons; 2017.
  • Ahmad N, Boota MW, Masoom AH. Comparative analysis of operating system of different smart phones. J Softw Eng Appl. 2015;8(3):114–126.
  • Nigrini MJ. Forensic analytics: methods and techniques for forensic accounting investigations. Hoboken (NJ): John Wiley & Sons; 2020.
  • Ayers R, Brothers S, Jansen W. Guidelines on mobile device forensics (draft). NIST Spec Publ. 2013;800-101.
  • Ambler SW, Sadalage PJ. Refactoring databases: evolutionary database design. Boston (MA): Pearson Education; 2006.
  • Shukla U, Mandal B, Kiran KVD. Perlustration on mobile forensics tools. In: Proceedings of the Third International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020); 2021; Singapore. p. 845–856
There are 14 citations in total.

Details

Primary Language Turkish
Subjects Computer Forensics
Journal Section Research Article
Authors

Adnan Keçe 0000-0001-8581-4596

Mehmet Pala 0009-0008-4031-5417

Enes Damar 0009-0003-7681-2822

Hasan Tunay 0009-0006-4402-7987

Bilal Aman 0009-0009-7125-7181

Submission Date May 22, 2025
Acceptance Date April 24, 2026
Publication Date April 30, 2026
DOI https://doi.org/10.61970/adlitip.1703850
IZ https://izlik.org/JA22UY22NX
Published in Issue Year 2026 Volume: 40 Issue: 1

Cite

Vancouver 1.Adnan Keçe, Mehmet Pala, Enes Damar, Hasan Tunay, Bilal Aman. Mobil Cihazlarda Son Etkinleştirme Tarihinin Tespit Edilmesi ve Adli Bilişim Açısından Önemi. J For Med. 2026 Apr. 1;40(1):45-50. doi:10.61970/adlitip.1703850
Creative Commons Lisansı

Turkish Journal of Forensic Medicine is licensed under a Creative Commons Attribution 4.0 International License.
Our journal has adopted the Open Access Policy, and no fees will be charged from the authors at any stage of the publication for the articles submitted.