Mobile Phone Forensics Paper

1248 Words3 Pages

Mobile Phone Forensics Paper
Introduction
Mobile phones and electronic devices are dispersed all over the world assisting in our everyday life. These mobile devices are occasionally involved in crime incidents and assist in building cases against cyber criminals. Mobile phones have various challenges when attempting to extract data from them and limitations that could hinder an investigation. This paper will identify some of these limitations and challenges that cyber forensic teams have when conducting analysis on these devices.
Flash Memory Processes Flash drives are a common type of drive found in mobile devices and are different from common memory processes. Flash drives only have a limited number of memories and can they are rewritten …show more content…

These devices have several hard pieces of evidence that can be extracted such as subscriber Identity Module (SIM), memory cards, and internal/external memory. A lot of these items need to be carefully analyzed for data contacts or text messages. When data is deleted from a memory cards it needs to accessed directly so that it can gain access to those deleted files. Other evidence can be found from external sources such as call data records. However, inside the sim a location area identity (LAI) or Integrated Circuit Card Identifier (ICCID) can be found. If the phone can be opened the contacts could serve as a list of possible suspects to the individual in question. Images if stored on the phone could hold incriminating evidence as well as web browser history or emails. This information takes time to analyze because manufactures lack standardization of this type of data storing. Cyber forensic teams consistently need new tools and methods to analyze mobile phones at a pace that technology keeps coming out with new …show more content…

As discussed previously, technology has developed various makes and models of mobile devices and is a challenge to overcome the obstacle of obtaining data from these different devices. However; obtaining the critical information from these devices can be extremely beneficial to law enforcement. Mobile device extraction has many different methods and some are more reliable, expensive, technical or may require more time. In addition, to extracting this data having an informational security policy within your Cyber forensic is critical in the safe guarding of electronic data. Despite the limitations and challenges of these mobile devices they are still considered one of the most critical pieces of evidences when at a crime scene and should be carefully

Open Document