SlideShare uma empresa Scribd logo
1 de 19
Mobile Forensics
Importance and motivation
In the recent years, mobile devices are spread widely. We can say
every person has a mobile device without considering to the type
and the model of this device.
sometimes, we must note that several people use mobile phones
to do evil purposes like the crimes. Therefore, these mobile
phones can act as main witnesses of these purposes. This leads to
the need to recover data from mobile phones for use it as evidence
of these crimes. Hence, the implementation of mobile forensic
becomes very important. And the research in this area is very
interesting.
1.Mobile Forensics Background
Mobile forensics is a branch of digital forensics. Simply, it is a
science of recovering different kinds of evidence from mobile
phones. It helps investigators significantly to reach to the criminal.
1.1.What is Mobile Forensics?
-Contact numbers.
-Record of calls, SMS, MMS and details about them.
-Sounds.
-Photographs.
-Email messages.
-Notes.
-Calendar.
1.2.Data types that could be available
on mobile devices
1.Mobile Forensics Background
4.Guidelines
Several procedures must be done when the scene of crime is
cordoned:
1-Make all people far from the crime scene.
2-Drawing or take photograph of the scene.
3-Record the status and location of each device exist in the
scene.
4-Avoid any activity that could affect the origin of the evidence.
5-The evidences in the crimes not only mobile devices, any
other forensics evidences should be collected such as
fingerprints or firearms, papers, PC, cables or any else.
6-The person who carrying any things related to the crime must
be guided by the officer in order to protect what he carried.
2.Mobile Forensics Steps
2.1.The major steps of mobile
forensics?
1-Preservation.
2-Acquisition.
3-Examination.
4-Analysis.
5-Reporting.
This step is the first and includes cordon off the scene of
crime and seizing the devices of suspect without altering
the contents of it (i.e. securing the device).
2.1.1. Preservation
2. Mobile Forensics Steps
It means take all information about mobile devices existing
in this scene.
•Identification of the device.
•Selecting the tool that would be use.
2.1.2. Acquisition
2. Mobile Forensics Steps
This step is to get the digital evidence from mobile phones
whether the evidences are exist clearly or hidden by using
scientific methods.
2.1.3. Examination
2. Mobile Forensics Steps
The analysis process looks to the results of the previous
process (i.e. the results of examination process). Then
analysis them.
2.1.4. Analysis
2. Mobile Forensics Steps
It is the last step in the mobile forensics process. It is
summarized in the preparation of a report that contains all
results, procedures or steps that have been done.
2.1.5. Reporting
2. Mobile Forensics Steps
3.1.Techniques used to insulating a mobile device from
communications:
When the mobile phone is seized, it should insulated from the
communication.
1-Isolate the entire crime scene from the network.
2-Use a shielded containers.
3-using substitute SIM: put another SIM rather than the
original to make the device outside the coverage.
3.Security of mobile devices
3.Security of mobile devices
3.2.Procedures to ensure the security of mobile devices
when they transported to the laboratory:
When you do packaging and transfer of mobile phones to the
laboratory, you should put them is a hard containers to keep
them secure from damage in case the container facing the
collision. Also in order to preserve the possibility of non-
pressure buttons of the mobile phone.
4.Challenges
Challenges related to mobile devices
1-Find mobile device as immersed in a liquid.
In this case, battery should be removed and put the
device in appropriate container.
2-Find mobile device in a damaged state.
This case may doesn’t prevent extraction data from the
device. The device should brings to the lab in order to
examine it carefully.
3-Devices which closed by the secret numbers.
Can solved by either investigative, Software or hardware
Methods.
6.Recommendations to deal
with the Chinese mobile devices
Identification of Chinese phone is very difficult because the types of
them are not well known. In addition, they are don't have any label
which clarifying the manufacturer of these devices. Most of these
mobile phones are a clone of the current known cell phones such
as SCIPhone which is a clone of apple IPhone or the clone of Nokia
N95.
In order to make the investigator knows whether these mobile
devices are original or Chinese, Investigator can observe the
following:
●A clone may be thinner or fatter than the original phone.
●It may be doesn't have any label or manufacturer logo.
●When the device looks like another known device existing in the
market; investigator could go to the internet then search about the
clone of the known device
●Remove the battery from the cavity of mobile phone to take the full
information about the device which written on the battery.
Conclusion
After the research in the field of mobile forensics, it is clear to me
the high importance of this science. I think it should be more work
to develop tools related to this science to be can cover all types of
mobile devices especially the newest of them.
Findings
I suggested that the responsible for the establishment of the tools
used in mobile forensic is an international institution. This institution
could force that the manufacturers should give it detailed file for
each new release of mobile device will be produce it in order to
studying this file and work on the development of the current tool to
be able to deal with this new version of mobile phone.
Finish
Thank you

Mais conteúdo relacionado

Mais procurados

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 

Mais procurados (20)

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 

Semelhante a Mobile forensics

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area ofIJCNCJournal
 
Android forensics
Android forensicsAndroid forensics
Android forensicsInfosys
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic scienceICFECI
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...IJECEIAES
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiFay M.
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesCSCJournals
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxAASTHA76
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptxBloomlady
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdfBloomlady
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 

Semelhante a Mobile forensics (20)

digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
What is the importance of forensic science
What is the importance of forensic scienceWhat is the importance of forensic science
What is the importance of forensic science
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdi
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptx
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdf
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 

Último

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 

Último (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 

Mobile forensics

  • 2. Importance and motivation In the recent years, mobile devices are spread widely. We can say every person has a mobile device without considering to the type and the model of this device. sometimes, we must note that several people use mobile phones to do evil purposes like the crimes. Therefore, these mobile phones can act as main witnesses of these purposes. This leads to the need to recover data from mobile phones for use it as evidence of these crimes. Hence, the implementation of mobile forensic becomes very important. And the research in this area is very interesting.
  • 3. 1.Mobile Forensics Background Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal. 1.1.What is Mobile Forensics?
  • 4. -Contact numbers. -Record of calls, SMS, MMS and details about them. -Sounds. -Photographs. -Email messages. -Notes. -Calendar. 1.2.Data types that could be available on mobile devices 1.Mobile Forensics Background
  • 5. 4.Guidelines Several procedures must be done when the scene of crime is cordoned: 1-Make all people far from the crime scene. 2-Drawing or take photograph of the scene. 3-Record the status and location of each device exist in the scene. 4-Avoid any activity that could affect the origin of the evidence. 5-The evidences in the crimes not only mobile devices, any other forensics evidences should be collected such as fingerprints or firearms, papers, PC, cables or any else. 6-The person who carrying any things related to the crime must be guided by the officer in order to protect what he carried.
  • 6. 2.Mobile Forensics Steps 2.1.The major steps of mobile forensics? 1-Preservation. 2-Acquisition. 3-Examination. 4-Analysis. 5-Reporting.
  • 7. This step is the first and includes cordon off the scene of crime and seizing the devices of suspect without altering the contents of it (i.e. securing the device). 2.1.1. Preservation 2. Mobile Forensics Steps
  • 8. It means take all information about mobile devices existing in this scene. •Identification of the device. •Selecting the tool that would be use. 2.1.2. Acquisition 2. Mobile Forensics Steps
  • 9. This step is to get the digital evidence from mobile phones whether the evidences are exist clearly or hidden by using scientific methods. 2.1.3. Examination 2. Mobile Forensics Steps
  • 10. The analysis process looks to the results of the previous process (i.e. the results of examination process). Then analysis them. 2.1.4. Analysis 2. Mobile Forensics Steps
  • 11. It is the last step in the mobile forensics process. It is summarized in the preparation of a report that contains all results, procedures or steps that have been done. 2.1.5. Reporting 2. Mobile Forensics Steps
  • 12. 3.1.Techniques used to insulating a mobile device from communications: When the mobile phone is seized, it should insulated from the communication. 1-Isolate the entire crime scene from the network. 2-Use a shielded containers. 3-using substitute SIM: put another SIM rather than the original to make the device outside the coverage. 3.Security of mobile devices
  • 13. 3.Security of mobile devices 3.2.Procedures to ensure the security of mobile devices when they transported to the laboratory: When you do packaging and transfer of mobile phones to the laboratory, you should put them is a hard containers to keep them secure from damage in case the container facing the collision. Also in order to preserve the possibility of non- pressure buttons of the mobile phone.
  • 14. 4.Challenges Challenges related to mobile devices 1-Find mobile device as immersed in a liquid. In this case, battery should be removed and put the device in appropriate container. 2-Find mobile device in a damaged state. This case may doesn’t prevent extraction data from the device. The device should brings to the lab in order to examine it carefully. 3-Devices which closed by the secret numbers. Can solved by either investigative, Software or hardware Methods.
  • 15. 6.Recommendations to deal with the Chinese mobile devices Identification of Chinese phone is very difficult because the types of them are not well known. In addition, they are don't have any label which clarifying the manufacturer of these devices. Most of these mobile phones are a clone of the current known cell phones such as SCIPhone which is a clone of apple IPhone or the clone of Nokia N95. In order to make the investigator knows whether these mobile devices are original or Chinese, Investigator can observe the following: ●A clone may be thinner or fatter than the original phone. ●It may be doesn't have any label or manufacturer logo.
  • 16. ●When the device looks like another known device existing in the market; investigator could go to the internet then search about the clone of the known device ●Remove the battery from the cavity of mobile phone to take the full information about the device which written on the battery.
  • 17. Conclusion After the research in the field of mobile forensics, it is clear to me the high importance of this science. I think it should be more work to develop tools related to this science to be can cover all types of mobile devices especially the newest of them.
  • 18. Findings I suggested that the responsible for the establishment of the tools used in mobile forensic is an international institution. This institution could force that the manufacturers should give it detailed file for each new release of mobile device will be produce it in order to studying this file and work on the development of the current tool to be able to deal with this new version of mobile phone.