Verify, Then Trust: A Smarter Approach to Mobile Forensics

In digital forensics, we always here the phrase "trust but verify." While this sounds good, it fundamentally misses the mark for examiners handling real-world cases. The phrase implies you should initially accept a tool's output or methodology as accurate, then confirm it afterward. This approach can create cognitive bias and puts your investigations at risk.

The problem I see with "trust but verify" is that trust comes first. Once you've accepted a result as true on face value, confirmation bias can kick in and you're more likely to overlook things that contradict your initial assumption of the "thing" that occured on the device. Now I'm not here saying that you can't trust results from your tools. What I am saying is you shouldn't trust anything you havent' personally verified as being the truth first.

A more "forensically sound" approach to digital forensics seems like these words should be flipped: "Verify, and then trust".

Understanding Validation vs. Verification

Validation and verification are often spoken by examiners as if they are the same thing. My thought process has always been, you validate the PROCESS and you verify the RESULTS. Those are two separate things.

Validation: Proving Your Process Works

Validation answers a fundamental question: Does the tool or method actually do what it claims to do?

This isn't just about the software/hardware, it's about your entire process. Whether you're using commercial acquistition tools such as Cellebrite, Magnet or UFDAE or open-source parsing tools such as ArtEX or any of the wonderful LEAPPS, validation is a MUST:

Think of validation as stress-testing your foundation. You wouldn't build a house without first confirming your concrete can bear the load. Similarly, you shouldn't present forensic findings without first proving your methodology is sound.

Verification: Confirming What You're Seeing

Verification addresses a different question: Is this action or thing actually what I think it is?

Here's where many examiners make mistakes. For example, an examiner sees the red "X" next to a text message in their commerical tool of choice and concludes that message was marked for deletion by the user. Another example, an examiner notices a timestamp and assumes it represents when an event occurred and that the timestamp is stored in the database in UTC. The examiner then converts the timestamp to their timezone. Lets say the examiner changed the timestamp to UTC-4. But, what if the artifact was actually stored in the database in local time? With the conversion to UTC-4, that timestamp is no longer accurate. That examienr is making an interpretation without understanding how the data is stored on the device. Your forensic tool is making interpretations, and interpretations can be wrong.

Real-World Application: The Deleted Message Example

Let's examine this common scenario further that illustrates why verification matters:

Your tool shows a text message with a red deletion indicator. Most examiners would document this as "deleted message recovered." But what if that's not accurate?

The verification process should look like this:

  1. Locate the source data - Find the actual database or file containing this message
  2. Examine the raw data - Open the SQLite database or binary file outside the commerical tool and make sure you see the entire picture. Commerical tools don't parse everything in a database or other data struture.
  3. Understand the schema and flags of the database - Learn how the messaging app stores data.
  4. Cross reference with test data - Create your own messages on a test device. Now, delete them and run various other scenarios, document and compare.

You might discover that the "X" actually indicates something entirely different. What if the artifact is actually from the Write Ahead Log (-Wal) and was just not written to the main database yet? Without verification, you could be presenting evidence incorrectly.

Building Your Verification Toolbox

Test Devices: A HUGE part of the process

One of the most valuable resources for the verification process is a collection of test devices. Here's how to build your inventory:

Sources for test devices:

  • Evidence and property rooms (devices past their retention period)
  • Local jails(phones that were confiscated)
  • Department upgrades (older agency phones)
  • Your old phone

Setting up your test environment:

  • Use devices running the same OS versions as your cases IF you can.
  • Install the same apps you commonly see on devices you examine. Install apps that you are interested in seeing how it stores data.
  • Create controlled scenarios (send messages, make calls, install/delete stuff)
  • Document everything meticulously

The Reverse Engineering Approach

When you encounter unfamiliar data structures/flags or surprising results, have a reverse engineering mindset:

  1. Repeat the action - Perform the same behavior on your test device as what you expect the evidence device did.
  2. Extract and compare - Extract the data using the same acquistition tools you use everyday in your lab. Dont' deviate initially from what you normally do.
  3. Examine at the hex level - Look at the raw data in a hex viewer of choice when necessary
  4. Map the relationships/joins - Understand how different artifacts connect or join in the data structure

This process transforms you from someone who just reports what the tool outputs, to someone who truly understands the evidence.

Courtroom Confidence: Why This Matters

When you testify, you're not just presenting what your tool reported, you're staking your professional reputation on the accuracy of your findings. Defense attorneys are increasingly sophisticated about digital evidence, and they will challenge your methodology. And guess what, THEY SHOULD!!! The results you provide have the ability to change a lot of lives. Our job is to get it right, so the attorneys, judge and jury can form their own opinions based on fact. We are not in the business of "forensically guessing" or "assuming".

Questions you need to answer confidently:

  • How do you know this timestamp is accurate?
  • What does this flag actually mean in the app's database?
  • Could there be another explanation for this artifact?
  • Have you tested this interpretation on other devices?

Examiners who follow the "verify, and then trust" approach can answer these questions because they've done the work to understand their evidence at a fundamental level.

Practical Implementation: A Verification Checklist

For every significant finding in your cases, ask yourself:

  • Do I understand the underlying data structure?
  • Have I examined the source files directly?
  • Can I repeat this result on a test device?
  • Am I clear about what this artifact actually represents or how it got there?
  • Could there be alternative explanations for what I'm seeing?
  • Have I documented my verification process?

If you can't check all these boxes, you're not ready to trust that finding.

Here is a checklist created by the wonderful Jessica Hyde (Founder & Owner of Hexorida.com) and myself to start you thinking about this critical process. Peer Review Checklist

The Bottom Line: Your Job is Discovering TRUTH Through Data!

Remember this fundamental truth also: Your tools don't testify, you do.

When you take the witness stand, you're not just representing the output of a Cellebrite or Magnet report, you're presenting your professional analysis of digital evidence. That analysis must be built on a foundation of verified understanding, not assumed trust.

The "verify, and then trust" approach demands more work upfront, but it pays dividends in case quality, courtroom confidence, and professional credibility. In a field where the stakes are often someone's freedom or justice for victims, that extra effort isn't just worthwhile, it's an absolute MUST.

Validate your process. Verify your results. Then and only then, trust what you're presenting. Your cases, your testimony, and your professional reputation depend on getting this order right. Ask anyone on my forensics team at RCSD (Caitlin, Michael, Jordan, Brian or Trevor), and they'll tell you, this way is the only way!

Beyond Vendor Tools: Understanding Data Structures First

Commercial tools are a great starting point, but they can only take you so far. Last month I had the opportunity to take the Advanced Mobile Device Forensics (AMDF) training through IACIS (International Association of Computer Investigative Specialists). I was reminded why taking advanced training like the AMDF course is critical for any examiner who wants to do more than click buttons and trust what the software says.

This course pushes you to understand what your tools are doing behind the scenes, and more importantly, what they may be missing entirely. It's a shift in mindset. You're not just using a tool, you are the tool.

IACIS Training Photo

At IACIS's 35th anniversary training event in Orlando, FL, I had the chance to attend one of the most resourceful classes I’ve taken in a while. The AMDF course dives deep into mobile data structures and teaches you how to extract, examine, and interpret core data structre files directly, without relying on commercial tools at all.

We explored XML and binary Plists, ABX files, REALM databases, LevelDB, JSON, SEGB, and Protobuf. These are formats that store critical evidence in modern smartphones, but are often ignored or note fully supported by your commerical tools. Some some, we used Python to parse and extract data manually, building a real understanding of what the device is telling us through the individual data sources.

Why Go Beyond the GUI?

Many tools don’t support all (or even most) app data, especially when app developers use varying storage structures. Knowing how to go beyond the GUI isn’t just helpful, it’s essential. Too much evidence goes unnoticed simply because examiners didn’t know what to look for or where to look. Much of the "smoking gun" evidence is found in unsupported apps or unsupported data structures.

IACIS Training Photo

Critical Takeaways

  • Understand the storage structure before trusting the tool’s interpretation.
  • Use open source tools and scripts to verify and confirm your findings.
  • Never assume the tool is parsing every relevant data store. Check for yourself. Every case is different. What if there's exculpatory evidence in the data that you miss?

Courses like AMDF are a reminder that no tool can replace examiner knowledge. It’s not just about acquisition, it’s about comprehension. If you're relying solely on automated parsing, you’re doing yourself and your cases a disservice.

Level Up with Purpose

This course, and others like it (Data Structures course through Hexorida is also GREAT), should be part of every serious examiner’s training path in the beginning. They force you to get hands-on with the data, to ask questions, to test, and to verify. That’s how you move from being a user of tools to becoming a true forensic examiner.

If you’re serious about mastering mobile forensics, push yourself. Courses like these are how you grow beyond the basics and learn to uncover the story the device is truly telling.