This document summarizes the state of mobile forensics techniques. It discusses physical, logical, and manual acquisition methods as well as the types of data that can be extracted from mobile devices. It also covers challenges such as password protection, network connectivity during acquisition, and how both dead and live forensic techniques are used to gather evidence from mobile devices. Traditional forensic methods like log and file collection are described along with more modern techniques needed to investigate apps and address encryption. The conclusion emphasizes that mobile forensics is an evolving field where both dead and live approaches have value but new security features require continued innovation in methods.