{"id":14,"date":"2026-05-01T00:27:49","date_gmt":"2026-05-01T00:27:49","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cgala002\/?p=14"},"modified":"2026-05-01T00:41:18","modified_gmt":"2026-05-01T00:41:18","slug":"case-study-for-digital-forensics","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cgala002\/2026\/05\/01\/case-study-for-digital-forensics\/","title":{"rendered":"Case Study for Digital Forensics"},"content":{"rendered":"\n<p>Case Identifier: CASE-2003-16732<\/p>\n\n\n\n<p>Case Investigator: Christiane Joy Galang<\/p>\n\n\n\n<p>Identity of the submitter: Richard Smith<\/p>\n\n\n\n<p>Date of Receipt: 2\/15\/2025<\/p>\n\n\n\n<p><strong>Items for Examination:<\/strong><\/p>\n\n\n\n<p>iPhone 16 Pro<\/p>\n\n\n\n<ul>\n<li>128 GB<\/li>\n\n\n\n<li>Model Number: MYMC3LL\/A<\/li>\n\n\n\n<li>Serial Number: HQM56HX5XV<\/li>\n\n\n\n<li>iOS 26.1<\/li>\n<\/ul>\n\n\n\n<p>MacBook Air M2<\/p>\n\n\n\n<ul>\n<li>8GB<\/li>\n\n\n\n<li>Serial Number: GK1JYKGVQM<\/li>\n\n\n\n<li>macOS Sequoia Version 15.6.1<\/li>\n<\/ul>\n\n\n\n<p><strong>Procedures<\/strong><\/p>\n\n\n\n<ul>\n<li>U.S. official Richard Smith has been raising suspicion in and out of the office. They suspect him of contacting Russian officials.&nbsp;<\/li>\n\n\n\n<li>Judge Evan Waters issued a search warrant that allows us to collect an iPhone and a MacBook from the suspect to gather evidence for our investigation.<\/li>\n<\/ul>\n\n\n\n<p><strong>Softwares Used for iPhone:<\/strong><\/p>\n\n\n\n<ul>\n<li>Cellebrite UFED: used for file-system extractions and analyzing messages, contacts, and call logs. It can also generate reports for the courts.&nbsp;<\/li>\n\n\n\n<li>Magnet AXIOM: data acquisition<\/li>\n\n\n\n<li>Autopsy:&nbsp; keyword search for \u201cRed Ralph.\u201d<\/li>\n<\/ul>\n\n\n\n<p>Steps:<\/p>\n\n\n\n<ul>\n<li>Once the search warrant was granted, the phone and the laptop were taken to the digital forensics lab for examination.&nbsp;<\/li>\n\n\n\n<li>The phone was connected to Cellebrite UFED. We created a new case to run the extraction. We navigated to contacts to locate \u201cRed Ralph\u201d and noted the phone number associated with it. We then navigated to messages to find the text confirming the lunch meeting on 2\/15\/2025. We also checked call logs for calls to and from \u201cRed Ralph.\u201d<\/li>\n\n\n\n<li>Magnet AXIOM was used as a second tool to confirm the number and messages from \u201cRed Ralph.\u201d<\/li>\n\n\n\n<li>Autopsy is used for hash lookup and keyword search for \u201cRed Ralph,\u201d phone number variants, and keywords such as \u201clunch\u201d and \u201cmeeting.\u201d<\/li>\n\n\n\n<li>Documented evidence:\n<ul>\n<li>Phone number: +7 (997-376-4414)<\/li>\n\n\n\n<li>Contact name: Red Ralph<\/li>\n\n\n\n<li>Message: Meet me at the restaurant at 1900 on 2\/15\/2025 to further discuss this topic.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Softwares used for MacBook:<\/strong><\/p>\n\n\n\n<ul>\n<li>FTK Imager<\/li>\n<\/ul>\n\n\n\n<p>Using FTK Imager, we were able to search the MacBook\u2019s data files. We analyzed emails between Mr. Smith and Red Ralph. We also ensured that a forensic image was created to avoid altered data in the MacBook. We discovered emails between Mr. Smith and redralph@gmail.com.&nbsp;<\/p>\n\n\n\n<p>Email showed:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"1024\" src=\"https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-576x1024.jpeg\" alt=\"\" class=\"wp-image-15\" srcset=\"https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-576x1024.jpeg 576w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-169x300.jpeg 169w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-768x1365.jpeg 768w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-864x1536.jpeg 864w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-600x1067.jpeg 600w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image-945x1680.jpeg 945w, https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/image.jpeg 1152w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/figure>\n\n\n\n<p><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p>After conducting a deep investigation of these two devices, we found evidence that Richard Smith and a Russian official were in contact about serious government secrets. Using the iPhone 16 Pro and the MacBook Air 2, we were able to find a Russian phone number linked to \u201cRed Ralph\u201d revealing conversations about secrets. There were also Emails concerning packages or letters sent between parties. The tools used for the investigation were Cellebrite UFED, Magnet AXIOM, Autopsy, and FTK Imager for the laptop. These tools helped confirm the interaction between Smith and \u201cRed Ralph.\u201d<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/Final-Exam.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Final-Exam.\"><\/object><a id=\"wp-block-file--media-e6786d31-3654-45b9-9395-14ca89ed6b7c\" href=\"https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/Final-Exam.pdf\">Final-Exam<\/a><a href=\"https:\/\/student.wp.odu.edu\/cgala002\/wp-content\/uploads\/sites\/41160\/2026\/05\/Final-Exam.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e6786d31-3654-45b9-9395-14ca89ed6b7c\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Case Identifier: CASE-2003-16732 Case Investigator: Christiane Joy Galang Identity of the submitter: Richard Smith Date of Receipt: 2\/15\/2025 Items for Examination: iPhone 16 Pro MacBook Air M2 Procedures Softwares Used for iPhone: Steps: Softwares used for MacBook: Using FTK Imager,&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/cgala002\/2026\/05\/01\/case-study-for-digital-forensics\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29875,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[2,1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/posts\/14"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/users\/29875"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/posts\/14\/revisions"}],"predecessor-version":[{"id":17,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/posts\/14\/revisions\/17"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/media?parent=14"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/categories?post=14"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cgala002\/wp-json\/wp\/v2\/tags?post=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}