{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:09:51Z","timestamp":1760231391083,"version":"build-2065373602"},"reference-count":12,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many real court cases. The results show that mobile forensics, digital analysis of smartphone Android or iOS can be obtained in two ways: on the one hand, data extraction must follow the best practice of the repeatability procedure; on the other hand, the extraction of the data must follow the best practice of the non-repeatability procedure. The laboratory study of the two methods for extracting digital data from mobile phones, for use as evidence in court trials, has shown that the same evidence can be obtained even when the procedure of unavailability of file mining activities has been adopted. Indeed, thanks to laboratory tests, the existence of multiple files frequently and continuously subjected to changes generated by the presence of several hashes found at forensic extractions conducted in very short moments of time (sometimes not exceeding 15 min) has been proven. If, on the other hand, the examination of a device is entrusted to a judicial police officer in order to conduct a forensic analysis to acquire data produced and managed by the user (such as images, audio, video, documents, SMS, MMS, chat conversations, address book content, etc.) we have sufficient grounds to believe that such examination can be organized according to the system of repeatable technical assessments.<\/jats:p>","DOI":"10.3390\/s22187096","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T04:28:55Z","timestamp":1663648135000},"page":"7096","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments"],"prefix":"10.3390","volume":"22","author":[{"given":"Raffaele","family":"Cuomo","sequence":"first","affiliation":[{"name":"Guardia di Finanza di Milano, 20159 Milan, Italy"}]},{"given":"Davide","family":"D\u2019Agostino","sequence":"additional","affiliation":[{"name":"Guardia di Finanza di Milano, 20159 Milan, Italy"}]},{"given":"Mario","family":"Ianulardo","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 degli Studi di Salerno, Via Giovanni Paolo II, 132, 84084 Fisciano, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"ref_1","unstructured":"(2022, June 24). Ripetibilit\u00e0 e Irripetibilit\u00e0 Delle Acquisizioni Forensi In: Studio d\u2019Informatica Forense. Available online: https:\/\/www.dalchecco.it\/ripetibilita-irripetibilita-acquisizioni-forensi\/."},{"key":"ref_2","unstructured":"(2022, June 24). I Nuovi Mezzi di Ricerca Della Prova Fra Informatica Forense e L.48\/2008. Available online: http:\/\/www.altalex.com\/documents\/news\/2012\/05\/03\/i-nuovi-mezzi-di-ricerca-della-prova-frainformatica-forense-e-l-48-2008."},{"key":"ref_3","unstructured":"(2022, June 24). Legge n.48\/2008. Convenzione di Budapest. Available online: https:\/\/www.gazzettaufficiale.it\/eli\/id\/2008\/04\/04\/008G0070\/sg."},{"key":"ref_4","unstructured":"(2022, June 24). Article 360. Accertamenti Tecnici Non Ripetibili. Codice di Procedura Penale. Available online: brocardi.it\/codice-di-procedura-penale\/libro-quinto\/titolo-v\/art360.html."},{"key":"ref_5","unstructured":"(2022, June 24). Article 359. Consulenti Tecnici del Pubblico Ministero. Codice di Procedura Penale. Available online: https:\/\/www.brocardi.it\/codice-di-procedura-penale\/libro-quinto\/titolo-v\/art359.html."},{"key":"ref_6","unstructured":"(2022, June 24). Consulenze Legali Relative all\u2019Articolo 360 Codice di Procedura Penale. Available online: https:\/\/www.brocardi.it\/codice-di-procedura-penale\/libro-quinto\/titolo-v\/art360.html#commento21319."},{"key":"ref_7","unstructured":"(2022, June 24). Accertamenti Tecnici Informatici: Atti Ripetibili o Irripetibili?. Available online: http:\/\/www.medialaws.eu\/accertamenti-tecnici-informatici-atti-ripetibili-o-irripetibili\/."},{"key":"ref_8","unstructured":"(2022, June 24). Digital Forensics: Ripetibilit\u00e0 e Irripetibilit\u00e0. Available online: https:\/\/www.linkedin.com\/pulse\/digital-forensics-ripetibilit%C3%A0-e-irripetibilit%C3%A0-trinchera-cissp."},{"key":"ref_9","unstructured":"Torre, M. (2016). Indagini Informatiche e Processo Penale. [Master Thesis, Universit\u00e0 degli studi di Firenze]. Available online: http:\/\/hdl.handle.net\/2158\/1028650."},{"key":"ref_10","unstructured":"Cinti, M. (2014). Metodologie e Tecniche per l\u2019Analisi Forense di Dispositivi di Telefonia Mobile. [Master Thesis, Universit\u00e0 degli Studi di Bologna]. Available online: http:\/\/amslaurea.unibo.it\/6677\/."},{"key":"ref_11","unstructured":"Epifani, M. (2016). Corso di Perfezionamento Universitario in Esperto di Digital Forensics, University of Milan."},{"key":"ref_12","unstructured":"(2022, June 24). Article 354. Accertamenti Urgenti Sui Luoghi. Sulle Cose e Sulle Persone. Sequestro. Codice di Procedura Penale. Available online: https:\/\/www.brocardi.it\/codice-di-procedura-penale\/libro-quinto\/titolo-iv\/art354.html."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/7096\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:34:36Z","timestamp":1760142876000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/7096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":12,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22187096"],"URL":"https:\/\/doi.org\/10.3390\/s22187096","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,9,19]]}}}