This document discusses using open source tools for Android mobile device forensics. It will analyze recovered data from 10 Android devices using free tools like Caine, Cofee, Oxygen Forensic suits, Mobil edit, FTK, DFET, Bulk Extractor, Sq lite, Encase, Volatility, and SANS SIFT. The objectives are to forensically recover and analyze data from Android devices, including deleted data, IMEI, OS, contacts, call logs, and browser history. The methodology will involve acquisition, examination, analysis, and reporting of findings.