SlideShare a Scribd company logo
Mobile Forensics
Importance and motivation
In the recent years, mobile devices are spread widely. We can say
every person has a mobile device without considering to the type
and the model of this device.
sometimes, we must note that several people use mobile phones
to do evil purposes like the crimes. Therefore, these mobile
phones can act as main witnesses of these purposes. This leads to
the need to recover data from mobile phones for use it as evidence
of these crimes. Hence, the implementation of mobile forensic
becomes very important. And the research in this area is very
interesting.
1.Mobile Forensics Background
Mobile forensics is a branch of digital forensics. Simply, it is a
science of recovering different kinds of evidence from mobile
phones. It helps investigators significantly to reach to the criminal.
1.1.What is Mobile Forensics?
-Contact numbers.
-Record of calls, SMS, MMS and details about them.
-Sounds.
-Photographs.
-Email messages.
-Notes.
-Calendar.
1.2.Data types that could be available
on mobile devices
1.Mobile Forensics Background
4.Guidelines
Several procedures must be done when the scene of crime is
cordoned:
1-Make all people far from the crime scene.
2-Drawing or take photograph of the scene.
3-Record the status and location of each device exist in the
scene.
4-Avoid any activity that could affect the origin of the evidence.
5-The evidences in the crimes not only mobile devices, any
other forensics evidences should be collected such as
fingerprints or firearms, papers, PC, cables or any else.
6-The person who carrying any things related to the crime must
be guided by the officer in order to protect what he carried.
2.Mobile Forensics Steps
2.1.The major steps of mobile
forensics?
1-Preservation.
2-Acquisition.
3-Examination.
4-Analysis.
5-Reporting.
This step is the first and includes cordon off the scene of
crime and seizing the devices of suspect without altering
the contents of it (i.e. securing the device).
2.1.1. Preservation
2. Mobile Forensics Steps
It means take all information about mobile devices existing
in this scene.
•Identification of the device.
•Selecting the tool that would be use.
2.1.2. Acquisition
2. Mobile Forensics Steps
This step is to get the digital evidence from mobile phones
whether the evidences are exist clearly or hidden by using
scientific methods.
2.1.3. Examination
2. Mobile Forensics Steps
The analysis process looks to the results of the previous
process (i.e. the results of examination process). Then
analysis them.
2.1.4. Analysis
2. Mobile Forensics Steps
It is the last step in the mobile forensics process. It is
summarized in the preparation of a report that contains all
results, procedures or steps that have been done.
2.1.5. Reporting
2. Mobile Forensics Steps
3.1.Techniques used to insulating a mobile device from
communications:
When the mobile phone is seized, it should insulated from the
communication.
1-Isolate the entire crime scene from the network.
2-Use a shielded containers.
3-using substitute SIM: put another SIM rather than the
original to make the device outside the coverage.
3.Security of mobile devices
3.Security of mobile devices
3.2.Procedures to ensure the security of mobile devices
when they transported to the laboratory:
When you do packaging and transfer of mobile phones to the
laboratory, you should put them is a hard containers to keep
them secure from damage in case the container facing the
collision. Also in order to preserve the possibility of non-
pressure buttons of the mobile phone.
4.Challenges
Challenges related to mobile devices
1-Find mobile device as immersed in a liquid.
In this case, battery should be removed and put the
device in appropriate container.
2-Find mobile device in a damaged state.
This case may doesn’t prevent extraction data from the
device. The device should brings to the lab in order to
examine it carefully.
3-Devices which closed by the secret numbers.
Can solved by either investigative, Software or hardware
Methods.
6.Recommendations to deal
with the Chinese mobile devices
Identification of Chinese phone is very difficult because the types of
them are not well known. In addition, they are don't have any label
which clarifying the manufacturer of these devices. Most of these
mobile phones are a clone of the current known cell phones such
as SCIPhone which is a clone of apple IPhone or the clone of Nokia
N95.
In order to make the investigator knows whether these mobile
devices are original or Chinese, Investigator can observe the
following:
●A clone may be thinner or fatter than the original phone.
●It may be doesn't have any label or manufacturer logo.
●When the device looks like another known device existing in the
market; investigator could go to the internet then search about the
clone of the known device
●Remove the battery from the cavity of mobile phone to take the full
information about the device which written on the battery.
Conclusion
After the research in the field of mobile forensics, it is clear to me
the high importance of this science. I think it should be more work
to develop tools related to this science to be can cover all types of
mobile devices especially the newest of them.
Findings
I suggested that the responsible for the establishment of the tools
used in mobile forensic is an international institution. This institution
could force that the manufacturers should give it detailed file for
each new release of mobile device will be produce it in order to
studying this file and work on the development of the current tool to
be able to deal with this new version of mobile phone.
Finish
Thank you

More Related Content

What's hot

Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
Applied Forensic Research Sciences
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 

What's hot (20)

Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

Similar to Mobile forensics

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
INFOGAIN PUBLICATION
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
richardnorman90310
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
IJCNCJournal
 
Android forensics
Android forensicsAndroid forensics
Android forensics
Infosys
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
Ashish Sutar
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic science
ICFECI
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
Paraben Corporation
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
Sabidur Rahman
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
IJECEIAES
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiFay M.
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
CSCJournals
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
AASTHA76
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET Journal
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptx
Bloomlady
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdf
Bloomlady
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
FORnSECSolutions
 

Similar to Mobile forensics (20)

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic science
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdi
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptx
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdf
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 

Recently uploaded

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 

Recently uploaded (20)

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 

Mobile forensics

  • 2. Importance and motivation In the recent years, mobile devices are spread widely. We can say every person has a mobile device without considering to the type and the model of this device. sometimes, we must note that several people use mobile phones to do evil purposes like the crimes. Therefore, these mobile phones can act as main witnesses of these purposes. This leads to the need to recover data from mobile phones for use it as evidence of these crimes. Hence, the implementation of mobile forensic becomes very important. And the research in this area is very interesting.
  • 3. 1.Mobile Forensics Background Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal. 1.1.What is Mobile Forensics?
  • 4. -Contact numbers. -Record of calls, SMS, MMS and details about them. -Sounds. -Photographs. -Email messages. -Notes. -Calendar. 1.2.Data types that could be available on mobile devices 1.Mobile Forensics Background
  • 5. 4.Guidelines Several procedures must be done when the scene of crime is cordoned: 1-Make all people far from the crime scene. 2-Drawing or take photograph of the scene. 3-Record the status and location of each device exist in the scene. 4-Avoid any activity that could affect the origin of the evidence. 5-The evidences in the crimes not only mobile devices, any other forensics evidences should be collected such as fingerprints or firearms, papers, PC, cables or any else. 6-The person who carrying any things related to the crime must be guided by the officer in order to protect what he carried.
  • 6. 2.Mobile Forensics Steps 2.1.The major steps of mobile forensics? 1-Preservation. 2-Acquisition. 3-Examination. 4-Analysis. 5-Reporting.
  • 7. This step is the first and includes cordon off the scene of crime and seizing the devices of suspect without altering the contents of it (i.e. securing the device). 2.1.1. Preservation 2. Mobile Forensics Steps
  • 8. It means take all information about mobile devices existing in this scene. •Identification of the device. •Selecting the tool that would be use. 2.1.2. Acquisition 2. Mobile Forensics Steps
  • 9. This step is to get the digital evidence from mobile phones whether the evidences are exist clearly or hidden by using scientific methods. 2.1.3. Examination 2. Mobile Forensics Steps
  • 10. The analysis process looks to the results of the previous process (i.e. the results of examination process). Then analysis them. 2.1.4. Analysis 2. Mobile Forensics Steps
  • 11. It is the last step in the mobile forensics process. It is summarized in the preparation of a report that contains all results, procedures or steps that have been done. 2.1.5. Reporting 2. Mobile Forensics Steps
  • 12. 3.1.Techniques used to insulating a mobile device from communications: When the mobile phone is seized, it should insulated from the communication. 1-Isolate the entire crime scene from the network. 2-Use a shielded containers. 3-using substitute SIM: put another SIM rather than the original to make the device outside the coverage. 3.Security of mobile devices
  • 13. 3.Security of mobile devices 3.2.Procedures to ensure the security of mobile devices when they transported to the laboratory: When you do packaging and transfer of mobile phones to the laboratory, you should put them is a hard containers to keep them secure from damage in case the container facing the collision. Also in order to preserve the possibility of non- pressure buttons of the mobile phone.
  • 14. 4.Challenges Challenges related to mobile devices 1-Find mobile device as immersed in a liquid. In this case, battery should be removed and put the device in appropriate container. 2-Find mobile device in a damaged state. This case may doesn’t prevent extraction data from the device. The device should brings to the lab in order to examine it carefully. 3-Devices which closed by the secret numbers. Can solved by either investigative, Software or hardware Methods.
  • 15. 6.Recommendations to deal with the Chinese mobile devices Identification of Chinese phone is very difficult because the types of them are not well known. In addition, they are don't have any label which clarifying the manufacturer of these devices. Most of these mobile phones are a clone of the current known cell phones such as SCIPhone which is a clone of apple IPhone or the clone of Nokia N95. In order to make the investigator knows whether these mobile devices are original or Chinese, Investigator can observe the following: ●A clone may be thinner or fatter than the original phone. ●It may be doesn't have any label or manufacturer logo.
  • 16. ●When the device looks like another known device existing in the market; investigator could go to the internet then search about the clone of the known device ●Remove the battery from the cavity of mobile phone to take the full information about the device which written on the battery.
  • 17. Conclusion After the research in the field of mobile forensics, it is clear to me the high importance of this science. I think it should be more work to develop tools related to this science to be can cover all types of mobile devices especially the newest of them.
  • 18. Findings I suggested that the responsible for the establishment of the tools used in mobile forensic is an international institution. This institution could force that the manufacturers should give it detailed file for each new release of mobile device will be produce it in order to studying this file and work on the development of the current tool to be able to deal with this new version of mobile phone.