<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>atd</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Adli Tıp Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1018-5275</issn>
                                        <issn pub-type="epub">2149-0570</issn>
                                                                                            <publisher>
                    <publisher-name>Adli Tıp Kurumu</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.61970/adlitip.1703850</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Forensics</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Adli Bilişim</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Mobil Cihazlarda Son Etkinleştirme Tarihinin Tespit Edilmesi ve Adli Bilişim Açısından Önemi</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>Detecting Last Activation Date on Mobile Devices</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8581-4596</contrib-id>
                                                                <name>
                                    <surname>Keçe</surname>
                                    <given-names>Adnan</given-names>
                                </name>
                                                                    <aff>Adli Tıp Kurumu</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0008-4031-5417</contrib-id>
                                                                <name>
                                    <surname>Pala</surname>
                                    <given-names>Mehmet</given-names>
                                </name>
                                                                    <aff>Adli Tıp Kurumu</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0003-7681-2822</contrib-id>
                                                                <name>
                                    <surname>Damar</surname>
                                    <given-names>Enes</given-names>
                                </name>
                                                                    <aff>Adli Tıp Kurumu</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0006-4402-7987</contrib-id>
                                                                <name>
                                    <surname>Tunay</surname>
                                    <given-names>Hasan</given-names>
                                </name>
                                                                    <aff>Adli Tıp Kurumu</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0009-7125-7181</contrib-id>
                                                                <name>
                                    <surname>Aman</surname>
                                    <given-names>Bilal</given-names>
                                </name>
                                                                    <aff>Adli Tıp Kurumu</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260430">
                    <day>04</day>
                    <month>30</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>40</volume>
                                        <issue>1</issue>
                                        <fpage>45</fpage>
                                        <lpage>50</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250522">
                        <day>05</day>
                        <month>22</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260424">
                        <day>04</day>
                        <month>24</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1985, Adli Tıp Dergisi</copyright-statement>
                    <copyright-year>1985</copyright-year>
                    <copyright-holder>Adli Tıp Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Amaç: Sıfırlama tarihinin önem arzettiği adli vakalarda adli bilişim uzmanlarının tutarlı ve güvenilir raporlar oluşturması gerekmektedir. Bu çalışma, adli bilişim incelemelerinde Android ve iOS işletim sistemine sahip mobil cihazlarda son etkinleştirme tarihinin güvenilir bir şekilde tespit edilmesini amaçlamaktadır.Yöntem: Araştırma kapsamında android ve iOS işletim sistemlerine sahip mobil cihazlar fabrika ayarlarına sıfırlanmış ve sıfırlama işleminden sonra cihazların dijital kopyaları alınarak incelenmiştir. Hem Android hem de iOS platformlarındaki sistem ve kullanıcı veritabanı dosyalarının oluşturulma, değiştirilme ve erişim tarihleri ayrıntılı olarak analiz edilmiştir. Ayrıca bu dosyaların sıfırlama işleminden hemen sonra yeniden oluşturulma süreçleri incelenmiş ve dosyaların zaman damgaları karşılaştırılmıştır.Bulgular: Android cihazlarda özellikle “SetupWizardPrefs.xml”, “Google Service Framework” ve “Google Mobile Service” gibi sistem dosyaları; iOS cihazlarında ise, “sms.db”, “call_history.db” ve “AddressBook.sqlitedb” gibi dosyaların sıfırlama işlemi sonrasında yeniden oluşturulduğu görülmüştür. Bu dosyaların zaman damgaları son etkinleştirme tarihini belirlemede güvenilir bir referans noktası olarak değerlendirilebilmektedir.Sonuç: Android ve iOS cihazlarında, fabrika ayarlarına döndürme işlemi sonrası oluşturulan dosyaların zaman damgaları, adli bilişim incelemelerinde son etkinleştirme tarihinin tespiti için önemli kanıtlar sunmaktadır. Bu çalışmada elde edilen bulgular sıfırlama tarihiyle yüksek oranda (dakika bazında) tutarlılık gösterdiği gözlemlenmiştir. Ayrıca her cihazın ve işletim sisteminin kendine özgü veri yapısının dikkate alınması, inceleme sürecinde hata payını en aza indirmeye yardımcı olacaktır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>Objective: In forensic cases where the reset date is of significant importance, forensic experts need to produce consistent and reliable reports. This study aims to reliably determine the last activation date on mobile devices with Android and iOS operating systems in forensic examinations.Method: In the research, mobile devices with Android and iOS operating systems were reset to factory settings, and digital copies of the devices were taken and examined after the reset process. The creation, modification, and access dates of system and user database files on both Android and iOS platforms were analyzed in detail. Additionally, the processes of re-creation of these files immediately after the reset were examined, and the timestamps of the files were compared.Results: On Android devices, system files such as “SetupWizardPrefs.xml”, “Google Service Framework”, and “Google Mobile Service” were found to be re-created after the reset process; on iOS devices, files such as “sms.db”, “call_history.db”, and “AddressBook.sqlitedb” were similarly re-created. The timestamps of these files can be considered a reliable reference point for determining the last activation date.Conclusion: On Android and iOS devices, the timestamps of files created after the factory reset process provide significant evidence for determining the last activation date in forensic examinations. The findings from this study have observed a high degree of consistency (at the minute level) with the reset date. Additionally, considering the unique data structure of each device and operating system will help minimize the margin of error during the examination process.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Adli Bilişim</kwd>
                                                    <kwd>  Son etkinleştirme tarihi</kwd>
                                                    <kwd>  Android</kwd>
                                                    <kwd>  IOS</kwd>
                                                    <kwd>  Dijital Delil</kwd>
                                                    <kwd>  Zaman Damgaları</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Digital forensics</kwd>
                                                    <kwd>  last activation date</kwd>
                                                    <kwd>  Android</kwd>
                                                    <kwd>  iOS</kwd>
                                                    <kwd>  digital evidence</kwd>
                                                    <kwd>  timestamps</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Kukulska-Hulme A, Pettit J, Bradley L, Carvalho AA, Herrington A, Kennedy DM, et al. Mature students using mobile devices in life and learning. Int J Mob Blended Learn. 2011;3(1):18–52.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Halvey M, Keane MT, Smyth B. Time based patterns in mobile-internet surfing. In: Grinter R, Rodden T, Aoki P, Cutrell E, Jeffries R, Olsen G, editors. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York (NY): ACM; 2006. p. 31–34.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Cameron D. The rocket in your pocket: how mobile phones became the media by stealth. In: Second Joint Journalism Education Association/Journalism Education Association of New Zealand Conference; 2006 Dec; Auckland, New Zealand. p. 4–7.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Laurila JK, Gatica-Perez D, Aad I, Bornet O, Do TMT, Dousse O, et al. The mobile data challenge: big data for mobile computing research. IEEE Pervasive Comput. 2012;11(2):24–31.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Doherty EP. Digital forensics for handheld devices. Boca Raton (FL): CRC Press; 2013.6. Schwamm R. Effectiveness of the factory reset on a mobile device [dissertation]. Monterey (CA): Naval Postgraduate School; 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Felka P, Mihale-Wilson C, Hinz O. Mobile phones and crime: the protective effect of mobile network infrastructures. J Quant Criminol. 2020;36(4):933–956.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Dweikat M, Eleyan D, Eleyan A. Digital forensic tools used in analyzing cybercrime. J Univ Shanghai Sci Technol. 2021;23(3):367–379.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Smith R. Crime in the digital age: controlling telecommunications and cyberspace illegalities. London: Routledge; 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Årnes A, editor. Digital forensics. Hoboken (NJ): John Wiley &amp; Sons; 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Ahmad N, Boota MW, Masoom AH. Comparative analysis of operating system of different smart phones. J Softw Eng Appl. 2015;8(3):114–126.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Nigrini MJ. Forensic analytics: methods and techniques for forensic accounting investigations. Hoboken (NJ): John Wiley &amp; Sons; 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Ayers R, Brothers S, Jansen W. Guidelines on mobile device forensics (draft). NIST Spec Publ. 2013;800-101.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Ambler SW, Sadalage PJ. Refactoring databases: evolutionary database design. Boston (MA): Pearson Education; 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Shukla U, Mandal B, Kiran KVD. Perlustration on mobile forensics tools. In: Proceedings of the Third International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020); 2021; Singapore. p. 845–856</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
