This feature article is all about how the fast growth of the number and variety of mobile phones demands new skills from the digital forensic examiner. There are several common obstacles that lie before any mobile forensic expert. There are more operating systems for smartphones than for desktop computers. The digital forensics examiner must be able to recognize a phone's make/model and know what connections to make and what data acquisition methods can be applied to the device. It is important to be fully aware what an acquisition tool does and what can and cannot be extracted from the phone. Lastly, there is currently no single software tool capable of extracting all of the data from any mobile phone available on the market.
Having identified the problems, this article will attempt to offer some advice on how some of these problems may be overcome in a practical sense.
INTRODUCTION
A great number of the mobile phones used worldwide require special knowledge and skills from forensic experts. More often, it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and difficulties of mobile forensics. This article describes technical problems encountered by specialists in mobile forensics.
Operating systems and manufacturers
Market share of the end user desktop systems is divided between three major vendors: MS Windows, OS X from Apple Inc., and Linux OS variations. That is the opposite for the OS's of mobile devices. Each year brings to life a new top....
Author
Latest Articles
- Our AuthorsFebruary 19, 2018Meet our expert - Cordny Nederkoorn
- BlogJuly 11, 2017For the Love of The Game by Jessica Gulick
- BlogJune 29, 2016Finding Advanced Malware Using Volatility
- BlogJuly 3, 2015Banana Pi Pro - Review
Nowadays, Mobile users increasing day by day and Cybercrime also. So it keeps some important instructions before installing any applications on your mobile. Digital Forensic is one of the develop Technology in the World and there are many tricks to find out the strongest evidence through Forensics Expert. Institute of Computer Forensics and Criminal Investigations to find out Digital Forensic Investigation Tools and work accordingly to catch frauds.
I do like that you go over the two different kinds of data extraction when it comes to cell phone forensics. After all, there are many people who do not understand how this process even works in the first place. However, dividing it up into two main procedures can really help to break things down.
Respected Sir,
I would like to seek Trick of protecting the Mobile Phone( 3 G or 4 G Sets) from being tampered by sending remote option of deletion or Corruption.
Would you please provide me a justified way of resolving the said issue of mobile phone data Protection.
Thanks.
S.A Jabbar
1. Use faraday bag/box
2. Turn off the phone and remove the battery
3. put the phone on airplane mode (not 100% effective)