Please share (3 to 4 paragraphs) on what you learned when you read chapter 11 along with Overview of Mobile Forensics (.PDF file) and identify what makes this different form acquiring computers in the traditional sense.
Please share (3 to 4 paragraphs) on what you learned when you read Developing Processes for Mobile Forensics (.PDF file)
Please share (3 to 4 paragraphs) on what you learned when you read Future of Mobile Foresics (.PDF) file and identify if you thought the author may have missed anything as well as your own thoughts – what did you learn!?


Mobile Forensics: an Overview, Tools, Future trends
and Challenges from Law Enforcement perspective

Rizwan Ahmed1* and Rajiv V. Dharaskar1

Mobile phone proliferation in our societies is on the increase. Advances in
semiconductor technologies related to mobile phones and the increase of computing
power of mobile phones led to an increase of functionality of mobile phones while
keeping the size of such devices small enough to fit in a pocket. This led mobile phones to
become portable data carriers. This in turn increased the potential for data stored on
mobile phone handsets to be used as evidence in civil or criminal cases. This paper
examines the nature of some of the newer pieces of information that can become potential
evidence on mobile phones. It also discusses some of the emerging technologies and their
potential impact on mobile phone based evidence. The paper will also cover some of the
inherent differences between mobile phone forensics and computer forensics. It also
highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the
paper shows the need for more in depth examination of mobile phone evidence.

Keywords: Mobile forensics, cell phone evidence, mobile phone forensic toolkits, digital device forensics

1. Introduction
Mobile phone proliferation is on the increase with the worldwide cellular subscriber base reaching 4 billion
by the year end of 2008 (Doran, 2008). While mobile phones outsell personal computers three to one,
mobile phone forensics still lags behind computer forensics. Even when comparing sales figures of smart
mobile phone devices which have some Personal Digital Assistant (PDA) capabilities, to the sale figures of
the actual PDA devices, smart mobile phones sales continued to grow while the PDA figures continue to
decline (Canalys, 2007). Data acquired from mobile phones continues to be used as evidence in criminal,
civil and even high profile cases (Aljazeera, 2005). However, validated frameworks and techniques to
acquire mobile phone data are virtually non-existent.

1.1 The need for mobile phone handset forensics
The following section of the paper will discuss the need for mobile forensics by highlighting the following:

• Use of mobile phones to store and transmit personal and corporate information
• Use of mobile phones in online transactions
• Law enforcement, criminals and mobile phone devices

1 G. H. Raisoni College of Engineering and Technology, Hingna Roada, Nagpur- 440016, India
* Corresponding Author: (E-mail :, Telephone: +91 9823159796)

Rizwan Ahmed and Rajiv V. Dharaskar / Mobile Forensics: an Overview, Tools, Future trends and …


1.2 Use of mobile phones to store and transmit personal and corporate information
Mobile phones applications are being developed in a rapid pace. Word processors, spreadsheets, and


Developing Process for Mobile Device Forensics
Det. Cynthia A. Murphy

Abstract –
With the growing demand for examination of cellular phones
and other mobile devices, a need has also developed for the
development of process guidelines for the examination of these
devices. While the specific details of the examination of each
device may differ, the adoption of consistent examination
processes will assist the examiner in ensuring that the evidence
extracted from each phone is well documented and that the
results are repeatable and defensible.


Over the past several years, digital forensic examiners
have seen a remarkable increase in requests to examine
data from cellular phones and other mobile devices. The
examination and extraction of data from these devices
presents numerous unique challenges for forensic
examiners. With smart phones and tablets representing an
increasing proportion of mobile devices submitted for
examination, the number unique challenges continue to
grow. Some of those challenges include the following:

Not only are there a large variety of mobile devices
available commercially, those devices use a variety of
proprietary operating systems, embedded file systems,
applications, services, and peripherals. Each of these
unique devices may be supported to different extents by
the available forensic software tools, or may not be
supported at all. There is also generally significant lag
time before newer smart phone devices are supported
sufficiently by mobile forensic tools.

The types of data contained within mobile devices and the
way they are being used are constantly evolving. With
the popularity of smart phones, it is no longer sufficient to
document only the phonebook, call history, text messages,
photos, calendar entries, notes and media storage areas
because these devices are fully functioning mini-
computers and potentially contain much more relevant
data. The data from an ever-growing number of installed
applications can contain a wealth of relevant information
that may not be automatically parsed by available forensic
software solutions. Traditional digital forensic skills are
becoming more and more necessary for mobile device

Cellular phones and other mobile devices are designed to
communicate with cellular and other networks via radio,
Bluetooth, infrared and wireless (WiFi) networking. To
best preserve the data on the phone it is necessary to

isolate the phone from surrounding networks. This may not
always be possible, and isolation methods can be prone to

Mobile devices use a variety of internal, removable and
online data storage capabilities. In many cases, it is
necessary to use more than one tool in order to extract and
document the desired data from the mobile device and its
associated data storage media. In certain cases, the tools
used to process cellular phones may report conflicting or

9/30/2017 The Future of Mobile Forensics 1/16

Wed, 06/24/2015 – 11:18am


The Importance of
Mobile Forensics for
Law Enforcement

Digital Forensics

The Future of Mobile Forensics
by Oleg Afonin, Danil Nikolaev and Yuri


Most would agree that the golden
age of mobile forensics is over.
There is no longer an easy way to
get through the passcode in new
iOS devices running the latest
version of iOS. Chip-off acquisition
is dead for iOS devices due to full-
disk encryption, while physical
acquisition of Apple hardware is
dead since the introduction of 64-
bit devices and versions of iOS 8
that cannot be jailbroken.
Blackberries were highly resistant
to chip-off acquisition from the beginning, and Android is
getting there quickly. In this whitepaper, we will look at the
current state of mobile forensics for the different platforms
and devices, analyze current trends and attempt to predict
how mobile forensics will look in the years ahead.

To gather these predictions, the authors analyzed state-of-the-
art tools, methods and hardware offered by leading
manufacturers, and interviewed experts working for
manufacturers of digital forensic products. Since
manufacturers often specialize in specific areas (e.g.,
producing equipment for breaking iPhone passcodes), we
questioned multiple representatives to be able to see the
whole picture. Today, we are ready to share our findings.

9/30/2017 The Future of Mobile Forensics 2/16

iOS Forensics
Ever since Apple has used full-disk encryption with passcode-
dependent, hardware-based encryption, chip-off acquisition
has not been a possible. The following acquisition methods are
available for Apple devices:

1. Sending the device back to Apple. Generally
available to government agencies and law enforcement.
Only for iOS versions prior to iOS 8.

2. Physical acquisition. A non-destructive acquisition
method that allows one to obtain the full image of the
device via the standard Apple cord.

3. Logical (backup) acquisition. Deals with offline
backup files produced by the device being analyzed.

4. Over-the-air acquisition. Downloads information from
the iCloud.

Let us briefly review the benefits, drawbacks and current
trends for each acquisition method.

Sending to Apple
Sending devices for acquisition directly to Apple used to be a
viable strategy, but not anymore. With the release of iOS 8,
Apple explicitly states in their Privacy Policy that the new
system is so secure that even Apple themselves cannot access

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.