SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Mobile Forensics
Importance and motivation
In the recent years, mobile devices are spread widely. We can say
every person has a mobile device without considering to the type
and the model of this device.
sometimes, we must note that several people use mobile phones
to do evil purposes like the crimes. Therefore, these mobile
phones can act as main witnesses of these purposes. This leads to
the need to recover data from mobile phones for use it as evidence
of these crimes. Hence, the implementation of mobile forensic
becomes very important. And the research in this area is very
interesting.
1.Mobile Forensics Background
Mobile forensics is a branch of digital forensics. Simply, it is a
science of recovering different kinds of evidence from mobile
phones. It helps investigators significantly to reach to the criminal.
1.1.What is Mobile Forensics?
-Contact numbers.
-Record of calls, SMS, MMS and details about them.
-Sounds.
-Photographs.
-Email messages.
-Notes.
-Calendar.
1.2.Data types that could be available
on mobile devices
1.Mobile Forensics Background
4.Guidelines
Several procedures must be done when the scene of crime is
cordoned:
1-Make all people far from the crime scene.
2-Drawing or take photograph of the scene.
3-Record the status and location of each device exist in the
scene.
4-Avoid any activity that could affect the origin of the evidence.
5-The evidences in the crimes not only mobile devices, any
other forensics evidences should be collected such as
fingerprints or firearms, papers, PC, cables or any else.
6-The person who carrying any things related to the crime must
be guided by the officer in order to protect what he carried.
2.Mobile Forensics Steps
2.1.The major steps of mobile
forensics?
1-Preservation.
2-Acquisition.
3-Examination.
4-Analysis.
5-Reporting.
This step is the first and includes cordon off the scene of
crime and seizing the devices of suspect without altering
the contents of it (i.e. securing the device).
2.1.1. Preservation
2. Mobile Forensics Steps
It means take all information about mobile devices existing
in this scene.
•Identification of the device.
•Selecting the tool that would be use.
2.1.2. Acquisition
2. Mobile Forensics Steps
This step is to get the digital evidence from mobile phones
whether the evidences are exist clearly or hidden by using
scientific methods.
2.1.3. Examination
2. Mobile Forensics Steps
The analysis process looks to the results of the previous
process (i.e. the results of examination process). Then
analysis them.
2.1.4. Analysis
2. Mobile Forensics Steps
It is the last step in the mobile forensics process. It is
summarized in the preparation of a report that contains all
results, procedures or steps that have been done.
2.1.5. Reporting
2. Mobile Forensics Steps
3.1.Techniques used to insulating a mobile device from
communications:
When the mobile phone is seized, it should insulated from the
communication.
1-Isolate the entire crime scene from the network.
2-Use a shielded containers.
3-using substitute SIM: put another SIM rather than the
original to make the device outside the coverage.
3.Security of mobile devices
3.Security of mobile devices
3.2.Procedures to ensure the security of mobile devices
when they transported to the laboratory:
When you do packaging and transfer of mobile phones to the
laboratory, you should put them is a hard containers to keep
them secure from damage in case the container facing the
collision. Also in order to preserve the possibility of non-
pressure buttons of the mobile phone.
4.Challenges
Challenges related to mobile devices
1-Find mobile device as immersed in a liquid.
In this case, battery should be removed and put the
device in appropriate container.
2-Find mobile device in a damaged state.
This case may doesn’t prevent extraction data from the
device. The device should brings to the lab in order to
examine it carefully.
3-Devices which closed by the secret numbers.
Can solved by either investigative, Software or hardware
Methods.
6.Recommendations to deal
with the Chinese mobile devices
Identification of Chinese phone is very difficult because the types of
them are not well known. In addition, they are don't have any label
which clarifying the manufacturer of these devices. Most of these
mobile phones are a clone of the current known cell phones such
as SCIPhone which is a clone of apple IPhone or the clone of Nokia
N95.
In order to make the investigator knows whether these mobile
devices are original or Chinese, Investigator can observe the
following:
●A clone may be thinner or fatter than the original phone.
●It may be doesn't have any label or manufacturer logo.
●When the device looks like another known device existing in the
market; investigator could go to the internet then search about the
clone of the known device
●Remove the battery from the cavity of mobile phone to take the full
information about the device which written on the battery.
Conclusion
After the research in the field of mobile forensics, it is clear to me
the high importance of this science. I think it should be more work
to develop tools related to this science to be can cover all types of
mobile devices especially the newest of them.
Findings
I suggested that the responsible for the establishment of the tools
used in mobile forensic is an international institution. This institution
could force that the manufacturers should give it detailed file for
each new release of mobile device will be produce it in order to
studying this file and work on the development of the current tool to
be able to deal with this new version of mobile phone.
Finish
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsNeilg42
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 

Was ist angesagt? (20)

Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 

Ähnlich wie Mobile forensics

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area ofIJCNCJournal
 
Android forensics
Android forensicsAndroid forensics
Android forensicsInfosys
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic scienceICFECI
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...IJECEIAES
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiFay M.
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesCSCJournals
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxAASTHA76
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptxBloomlady
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdfBloomlady
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 

Ähnlich wie Mobile forensics (20)

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic science
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdi
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptx
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdf
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 

Kürzlich hochgeladen

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 

Kürzlich hochgeladen (20)

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 

Mobile forensics

  • 2. Importance and motivation In the recent years, mobile devices are spread widely. We can say every person has a mobile device without considering to the type and the model of this device. sometimes, we must note that several people use mobile phones to do evil purposes like the crimes. Therefore, these mobile phones can act as main witnesses of these purposes. This leads to the need to recover data from mobile phones for use it as evidence of these crimes. Hence, the implementation of mobile forensic becomes very important. And the research in this area is very interesting.
  • 3. 1.Mobile Forensics Background Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal. 1.1.What is Mobile Forensics?
  • 4. -Contact numbers. -Record of calls, SMS, MMS and details about them. -Sounds. -Photographs. -Email messages. -Notes. -Calendar. 1.2.Data types that could be available on mobile devices 1.Mobile Forensics Background
  • 5. 4.Guidelines Several procedures must be done when the scene of crime is cordoned: 1-Make all people far from the crime scene. 2-Drawing or take photograph of the scene. 3-Record the status and location of each device exist in the scene. 4-Avoid any activity that could affect the origin of the evidence. 5-The evidences in the crimes not only mobile devices, any other forensics evidences should be collected such as fingerprints or firearms, papers, PC, cables or any else. 6-The person who carrying any things related to the crime must be guided by the officer in order to protect what he carried.
  • 6. 2.Mobile Forensics Steps 2.1.The major steps of mobile forensics? 1-Preservation. 2-Acquisition. 3-Examination. 4-Analysis. 5-Reporting.
  • 7. This step is the first and includes cordon off the scene of crime and seizing the devices of suspect without altering the contents of it (i.e. securing the device). 2.1.1. Preservation 2. Mobile Forensics Steps
  • 8. It means take all information about mobile devices existing in this scene. •Identification of the device. •Selecting the tool that would be use. 2.1.2. Acquisition 2. Mobile Forensics Steps
  • 9. This step is to get the digital evidence from mobile phones whether the evidences are exist clearly or hidden by using scientific methods. 2.1.3. Examination 2. Mobile Forensics Steps
  • 10. The analysis process looks to the results of the previous process (i.e. the results of examination process). Then analysis them. 2.1.4. Analysis 2. Mobile Forensics Steps
  • 11. It is the last step in the mobile forensics process. It is summarized in the preparation of a report that contains all results, procedures or steps that have been done. 2.1.5. Reporting 2. Mobile Forensics Steps
  • 12. 3.1.Techniques used to insulating a mobile device from communications: When the mobile phone is seized, it should insulated from the communication. 1-Isolate the entire crime scene from the network. 2-Use a shielded containers. 3-using substitute SIM: put another SIM rather than the original to make the device outside the coverage. 3.Security of mobile devices
  • 13. 3.Security of mobile devices 3.2.Procedures to ensure the security of mobile devices when they transported to the laboratory: When you do packaging and transfer of mobile phones to the laboratory, you should put them is a hard containers to keep them secure from damage in case the container facing the collision. Also in order to preserve the possibility of non- pressure buttons of the mobile phone.
  • 14. 4.Challenges Challenges related to mobile devices 1-Find mobile device as immersed in a liquid. In this case, battery should be removed and put the device in appropriate container. 2-Find mobile device in a damaged state. This case may doesn’t prevent extraction data from the device. The device should brings to the lab in order to examine it carefully. 3-Devices which closed by the secret numbers. Can solved by either investigative, Software or hardware Methods.
  • 15. 6.Recommendations to deal with the Chinese mobile devices Identification of Chinese phone is very difficult because the types of them are not well known. In addition, they are don't have any label which clarifying the manufacturer of these devices. Most of these mobile phones are a clone of the current known cell phones such as SCIPhone which is a clone of apple IPhone or the clone of Nokia N95. In order to make the investigator knows whether these mobile devices are original or Chinese, Investigator can observe the following: ●A clone may be thinner or fatter than the original phone. ●It may be doesn't have any label or manufacturer logo.
  • 16. ●When the device looks like another known device existing in the market; investigator could go to the internet then search about the clone of the known device ●Remove the battery from the cavity of mobile phone to take the full information about the device which written on the battery.
  • 17. Conclusion After the research in the field of mobile forensics, it is clear to me the high importance of this science. I think it should be more work to develop tools related to this science to be can cover all types of mobile devices especially the newest of them.
  • 18. Findings I suggested that the responsible for the establishment of the tools used in mobile forensic is an international institution. This institution could force that the manufacturers should give it detailed file for each new release of mobile device will be produce it in order to studying this file and work on the development of the current tool to be able to deal with this new version of mobile phone.