December 13 witnessed an unusual incident in the Parliament when two intruders managed to dodge layers of security in one of the most secure places in India – the Parliament.
There were six intruders in this case including Lalit Mohan Jha who was the mastermind behind this plan.
Action, apprehension, arrest
Four of them were apprehended by police, the fifth, Mahesh couldn’t join this activity due to personal reasons but the sixth culprit, Jha managed to escape from the radar of security with ID cards and phones of all others.
Phones destroyed!
Before returning to Delhi to surrender, Lalit Jha had destroyed all the phones not by breaking but by burning them. Under such circumstances what are the chances of data recovery through those phones?
All six phones can be the strongest evidence to reach the root cause and culprit of this major security breach. Number of calls, conversations, locations, pieces of information, all links should be there in those phones. Joining dots will get easier if phones are recovered. These phones have been burnt by Lalit Mohan Jha. So what next?
How can data be recovered?
While speaking to News24, one of the cyber experts of Delhi Police stated that even if the phone is burnt, data can be recovered if the chip is safe. The soul of a phone is the chip that lies above the motherboard. But if the phone has been burned completely and the chip too is destroyed in burning, then recovering data from the phone is very difficult. There’s only one way that can make data access possible, and that is by accessing the login email address of the device.
The email address usually has data backup and that’s how it can be accessed after the device is completely destroyed.