Watch this video on YouTube
What technique should be applied first when analyzing a mobile device to ensure data integrity during a forensic investigation?