{"id":2694,"date":"2017-04-25T06:22:04","date_gmt":"2017-04-25T10:22:04","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2694"},"modified":"2024-12-11T18:37:27","modified_gmt":"2024-12-11T18:37:27","slug":"who-is-the-owner-of-the-mobile-device","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/","title":{"rendered":"Who is the owner of the mobile device?"},"content":{"rendered":"<p>Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this:<\/p>\n<p>\u2018We need Software to identify the owner of smartphone &amp; tablets regarding to the data on the phone to avoid deception. We are working for insurances that send us phones from customers who would like to recover their data. We would like to avoid with your software the customer who sends us the phone of someone else. If you have any ideas how I can do this.\u2019<\/p>\n<p>&nbsp;<\/p>\n<p>This article will tell how to identify the owner of a mobile device.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Who is the owner of the iOS device?<\/strong><\/em><\/p>\n<p>Before you know who the owner of the iPhone you should extract data from it. This can be done by following the instruction &#8216;Acquisition and forensic analysis of apple devices&#8217;.<\/p>\n<p>After extracting the data from the iOS device, go to the &#8216;File System&#8217; tab. Follow the way &#8216;SystemPreferenceDomain&#8217; &#8211; &#8216;SytemConfiguration &#8230;&#8217;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2685 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001.png\" alt=\"\" width=\"382\" height=\"652\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001.png 382w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-176x300.png 176w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-9x16.png 9w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-19x32.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-16x28.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-33x56.png 33w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig001-37x64.png 37w\" sizes=\"auto, (max-width: 382px) 100vw, 382px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 1. The &#8216;File System&#8217; tab of Belkasoft Evidence Center.<\/p>\n<p>In this section there will be several .plist files, some of which contain the device owner\u2019s name (this name is set by the device owner). Click on the preferences.plist file. At the bottom of Belkasoft Evidence Center, click on the &#8216;plist&#8217; tab, go to the subkey &#8216;ComputerName&#8217;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2686 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002.png\" alt=\"\" width=\"779\" height=\"391\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002.png 779w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-300x151.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-768x385.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-512x257.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-56x28.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig002-64x32.png 64w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 2. The contents of the preferences.plist file.<\/p>\n<p>Click on the file com.apple.mobilegestalt.plist. At the bottom of Belkasoft Evidence Center, click on the &#8216;plist&#8217; tab, go to the subkey &#8216;UserAssignedDeviceName&#8217;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2687 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003.png\" alt=\"\" width=\"802\" height=\"242\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003.png 802w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-300x91.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-768x232.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-512x154.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-16x5.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-32x10.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-28x8.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-56x17.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig003-64x19.png 64w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\">Figure 3. The contents of the com.apple.mobilegestalt.plist file.<\/p>\n<p>As you can see in Figures 2 and 3, the owner of this iOS device is &#8216;iPhone User&#8217;.<\/p>\n<p>Also, you can extract the data from iOS devices using iTunes.<\/p>\n<p>&nbsp;<\/p>\n<p>ITunes backups can be found in the following way:<\/p>\n<p>Windows XP: C:\\Documents and Settings\\%User Name%\\Application Data\\Apple Computer\\MobileSync\\Backup\\<\/p>\n<p>Windows 7,Vista, 8, 10: C:\\Users\\%User Name%\\AppData\\Roaming\\Apple Computer\\MobileSync\\Backup\\<\/p>\n<p>MacOS: ~\\%User Name%\\Library\\Application Support\\MobileSync\\Backup<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>ITunes backups look like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2688 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004.png\" alt=\"\" width=\"592\" height=\"462\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004.png 592w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-300x234.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-512x400.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-16x12.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-32x25.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-56x44.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig004-64x50.png 64w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\">Figure 4. iTunes Backup device with iOS 10 and higher.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2689 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005.png\" alt=\"\" width=\"587\" height=\"464\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005.png 587w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-300x237.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-512x405.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-32x25.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-56x44.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig005-64x51.png 64w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 5. iTunes Backup device with iOS below 10.<\/p>\n<p>There is an info.plist file in iTunes backup. It contains the following information [1]:<\/p>\n<p><em>Device name and display name<\/em>: This is the name of the device \u00a0which typically includes the owner&#8217;s name.<\/p>\n<p><em>ICCID<\/em>: This is the Integrated Circuit Card Identifier, which is the serial number of the SIM.<\/p>\n<p><em>Last backup date<\/em>: This is the timestamp of the last successful backup.<\/p>\n<p><em>IMEI<\/em>: This is the International Mobile Equipment Identity, which is used to identify the mobile phone.<\/p>\n<p><em>Phone Number<\/em>: This is the phone number of the device at the time of backup.<\/p>\n<p><em>Installed applications<\/em>: This is the list of application identifiers on the device.<\/p>\n<p><em>Product type and production version<\/em>: This is the device&#8217;s model and firmware version.<\/p>\n<p><em>Serial number<\/em>: This is the serial number of the device.<\/p>\n<p><em>iTunes version<\/em>: This is the version of iTunes that generated the backup.<\/p>\n<p><em>Target Identifier and Unique Identifier<\/em>: This is the UDID of the device<\/p>\n<p>&nbsp;<\/p>\n<p>This file can be opened by any plist viewer. In extreme cases, its contents can be viewed by Notepad or Internet Explorer.<\/p>\n<p>&nbsp;<\/p>\n<p>Open the info.plist file in Notepad or Internet Explorer and find the subkeys &#8216;&lt;key&gt; Device Name &lt;\/ key&gt;&#8217; and &#8216;&lt;key&gt; Display Name &lt;\/ key&gt;&#8217;. These subkeys will indicate the device owner.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2690 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006.png\" alt=\"\" width=\"272\" height=\"73\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006.png 272w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006-32x9.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006-28x8.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006-56x15.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig006-64x17.png 64w\" sizes=\"auto, (max-width: 272px) 100vw, 272px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 6. Fragment of the contents of the info.plist file.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><strong>Who is the owner of the Android device?<\/strong><\/em><\/p>\n<p>The best source of information about the Android device is its physical dump. Much less useful information can be extracted from the backup of this device.<\/p>\n<p>&nbsp;<\/p>\n<p>There are a lot of ways to get physical dumps and backups of Android devices. Another article will tell how \u00a0to do physical dumps and backups of Android devices . Unfortunately, there is no file like info.plist for Android devices. But the information about the owner of the phone can be partially found in many files. Here are some of them [2]:<\/p>\n<p>&nbsp;<\/p>\n<p><em>\\system\\accounts.db (or\u00a0 \\data\\system\\users\\0\\accounts.db)<\/em> : This SQLite database lists all of the accounts that are used on the Android device. The app username and password can be found in this file. As of version 2.3, the password value is no longer plain text but a base64 encrypted value. For an expert, this can be useful information for identifying usernames for specific Android accounts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2691 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007.png\" alt=\"\" width=\"565\" height=\"201\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007.png 565w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-300x107.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-512x182.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-32x11.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-56x20.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig007-64x23.png 64w\" sizes=\"auto, (max-width: 565px) 100vw, 565px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 7. The contents of the file \\ data \\ system \\ users \\ 0 \\ accounts.db. From this file, live records and deleted records can be extracted.<\/p>\n<p><em>\\system\\sync\\accounts.xml<\/em> : Android devices give the user the possibility to sync all data across accounts. For an expert, this can create recoverable evidence because the account usernames for apps are listed in this file. The expert can connect the username with the associated app with the help of the information found in the accounts.xml file.<\/p>\n<p>&nbsp;<\/p>\n<p><em>\\data\\com.android.browser\\databases\\autofill.db<\/em> : This SQLite database stores user saved information such as name and address information to complete the \u00a0forms stored within the browser history.<\/p>\n<p>&nbsp;<\/p>\n<p><em>\\data\\com.google.android.apps.plus\\shared_prefs\\accounts.xml<\/em> : This XML file includes the account information for the Google+ account.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2692 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008.png\" alt=\"\" width=\"667\" height=\"271\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008.png 667w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-300x122.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-512x208.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-32x13.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-28x11.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-56x23.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/Fig008-64x26.png 64w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 8. Fragment of the file \\ data \\ com.google.android.apps.plus \\ shared_prefs \\ accounts.xml<\/p>\n<p><em>\\data\\com.google.android.talk\\shared_prefs\\accounts.xml<\/em> \u00a0: This Google Hangout XML file gives the main information to the Hangout owner and preferences for the account.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The article has described how to extract information about the device owner from iOS and Android mobile devices. Most devices contain its owner\u2019s first and last name or at least the first name as &#8216;Steve&#8217;s iPhone&#8217;. Very rarely there are records like &#8216;iPhone user&#8217;, &#8216;Mom&#8217;s phone&#8217;.<\/p>\n<p>&nbsp;<\/p>\n<p>A deeper search for the owner of the phone includes an analysis of the phone owner&#8217;s accounts in social networks, forums that can be detected using phone numbers and email addresses, browser history, etc., extracted from the mobile device.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Sources:<\/p>\n<ol>\n<li>Practical Mobile Forensics. Second Edition by Heather Mahalik and Rohit Tamma<\/li>\n<li>Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation by Lee Reiber<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Authors:<\/p>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this: \u2018We need&hellip;","protected":false},"author":126,"featured_media":2693,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2694","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Who is the owner of the mobile device?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who is the owner of the mobile device?\" \/>\n<meta property=\"og:description\" content=\"Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this: \u2018We need&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-25T10:22:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:37:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Who is the owner of the mobile device?\",\"datePublished\":\"2017-04-25T10:22:04+00:00\",\"dateModified\":\"2024-12-11T18:37:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/\"},\"wordCount\":1048,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/smartphone-593320_960_720.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/\",\"name\":\"Who is the owner of the mobile device?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/smartphone-593320_960_720.jpg\",\"datePublished\":\"2017-04-25T10:22:04+00:00\",\"dateModified\":\"2024-12-11T18:37:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/smartphone-593320_960_720.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/smartphone-593320_960_720.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/who-is-the-owner-of-the-mobile-device\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Who is the owner of the mobile device?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Who is the owner of the mobile device?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/","og_locale":"en_US","og_type":"article","og_title":"Who is the owner of the mobile device?","og_description":"Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this: \u2018We need&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-04-25T10:22:04+00:00","article_modified_time":"2024-12-11T18:37:27+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Who is the owner of the mobile device?","datePublished":"2017-04-25T10:22:04+00:00","dateModified":"2024-12-11T18:37:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/"},"wordCount":1048,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/","name":"Who is the owner of the mobile device?","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg","datePublished":"2017-04-25T10:22:04+00:00","dateModified":"2024-12-11T18:37:27+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/smartphone-593320_960_720.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/who-is-the-owner-of-the-mobile-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Who is the owner of the mobile device?"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2694"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2694\/revisions"}],"predecessor-version":[{"id":12985,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2694\/revisions\/12985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2693"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}