Mobile Phone Forensics Challenges

Jun 15, 2012

This feature article is all about how the fast growth of the number and variety of mobile phones demands new skills from the digital forensic examiner.  There are several common obstacles that lie before any mobile forensic expert.  There are more operating systems for smartphones than for desktop computers.  The digital forensics examiner must be able to recognize a phone's make/model and know what connections to make and what data acquisition methods can be applied to the device.  It is important to be fully aware what an acquisition tool does and what can and cannot be extracted from the phone.  Lastly, there is currently no single software tool capable of extracting all of the data from any mobile phone available on the market.

Having identified the problems, this article will attempt to offer some advice on how some of these problems may be overcome in a practical sense.

INTRODUCTION
A great number of the mobile phones used worldwide require special knowledge and skills from forensic experts.  More often, it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and difficulties of mobile forensics.  This article describes technical problems encountered by specialists in mobile forensics.

Operating systems and manufacturers
Market share of the end user desktop systems is divided between three major vendors: MS Windows, OS X from Apple Inc., and Linux OS variations.  That is the opposite for the OS's of mobile devices.  Each year brings to life a new top....


Subscribe
Notify of
guest

6 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Johnny joshua
Johnny joshua
5 years ago

Nowadays, Mobile users increasing day by day and Cybercrime also. So it keeps some important instructions before installing any applications on your mobile. Digital Forensic is one of the develop Technology in the World and there are many tricks to find out the strongest evidence through Forensics Expert. Institute of Computer Forensics and Criminal Investigations to find out Digital Forensic Investigation Tools and work accordingly to catch frauds.

Arthur Morrison
5 years ago

I do like that you go over the two different kinds of data extraction when it comes to cell phone forensics. After all, there are many people who do not understand how this process even works in the first place. However, dividing it up into two main procedures can really help to break things down.

Syed Abdul Jabbar
9 years ago

Respected Sir,

I would like to seek Trick of protecting the Mobile Phone( 3 G or 4 G Sets) from being tampered by sending remote option of deletion or Corruption.
Would you please provide me a justified way of resolving the said issue of mobile phone data Protection.
Thanks.
S.A Jabbar

Lawrence Dinga
9 years ago

1. Use faraday bag/box
2. Turn off the phone and remove the battery
3. put the phone on airplane mode (not 100% effective)

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023