SlideShare a Scribd company logo
8
Most read
10
Most read
15
Most read
Mobile Forensics
Importance and motivation
In the recent years, mobile devices are spread widely. We can say
every person has a mobile device without considering to the type
and the model of this device.
sometimes, we must note that several people use mobile phones
to do evil purposes like the crimes. Therefore, these mobile
phones can act as main witnesses of these purposes. This leads to
the need to recover data from mobile phones for use it as evidence
of these crimes. Hence, the implementation of mobile forensic
becomes very important. And the research in this area is very
interesting.
1.Mobile Forensics Background
Mobile forensics is a branch of digital forensics. Simply, it is a
science of recovering different kinds of evidence from mobile
phones. It helps investigators significantly to reach to the criminal.
1.1.What is Mobile Forensics?
-Contact numbers.
-Record of calls, SMS, MMS and details about them.
-Sounds.
-Photographs.
-Email messages.
-Notes.
-Calendar.
1.2.Data types that could be available
on mobile devices
1.Mobile Forensics Background
4.Guidelines
Several procedures must be done when the scene of crime is
cordoned:
1-Make all people far from the crime scene.
2-Drawing or take photograph of the scene.
3-Record the status and location of each device exist in the
scene.
4-Avoid any activity that could affect the origin of the evidence.
5-The evidences in the crimes not only mobile devices, any
other forensics evidences should be collected such as
fingerprints or firearms, papers, PC, cables or any else.
6-The person who carrying any things related to the crime must
be guided by the officer in order to protect what he carried.
2.Mobile Forensics Steps
2.1.The major steps of mobile
forensics?
1-Preservation.
2-Acquisition.
3-Examination.
4-Analysis.
5-Reporting.
This step is the first and includes cordon off the scene of
crime and seizing the devices of suspect without altering
the contents of it (i.e. securing the device).
2.1.1. Preservation
2. Mobile Forensics Steps
It means take all information about mobile devices existing
in this scene.
•Identification of the device.
•Selecting the tool that would be use.
2.1.2. Acquisition
2. Mobile Forensics Steps
This step is to get the digital evidence from mobile phones
whether the evidences are exist clearly or hidden by using
scientific methods.
2.1.3. Examination
2. Mobile Forensics Steps
The analysis process looks to the results of the previous
process (i.e. the results of examination process). Then
analysis them.
2.1.4. Analysis
2. Mobile Forensics Steps
It is the last step in the mobile forensics process. It is
summarized in the preparation of a report that contains all
results, procedures or steps that have been done.
2.1.5. Reporting
2. Mobile Forensics Steps
3.1.Techniques used to insulating a mobile device from
communications:
When the mobile phone is seized, it should insulated from the
communication.
1-Isolate the entire crime scene from the network.
2-Use a shielded containers.
3-using substitute SIM: put another SIM rather than the
original to make the device outside the coverage.
3.Security of mobile devices
3.Security of mobile devices
3.2.Procedures to ensure the security of mobile devices
when they transported to the laboratory:
When you do packaging and transfer of mobile phones to the
laboratory, you should put them is a hard containers to keep
them secure from damage in case the container facing the
collision. Also in order to preserve the possibility of non-
pressure buttons of the mobile phone.
4.Challenges
Challenges related to mobile devices
1-Find mobile device as immersed in a liquid.
In this case, battery should be removed and put the
device in appropriate container.
2-Find mobile device in a damaged state.
This case may doesn’t prevent extraction data from the
device. The device should brings to the lab in order to
examine it carefully.
3-Devices which closed by the secret numbers.
Can solved by either investigative, Software or hardware
Methods.
6.Recommendations to deal
with the Chinese mobile devices
Identification of Chinese phone is very difficult because the types of
them are not well known. In addition, they are don't have any label
which clarifying the manufacturer of these devices. Most of these
mobile phones are a clone of the current known cell phones such
as SCIPhone which is a clone of apple IPhone or the clone of Nokia
N95.
In order to make the investigator knows whether these mobile
devices are original or Chinese, Investigator can observe the
following:
●A clone may be thinner or fatter than the original phone.
●It may be doesn't have any label or manufacturer logo.
●When the device looks like another known device existing in the
market; investigator could go to the internet then search about the
clone of the known device
●Remove the battery from the cavity of mobile phone to take the full
information about the device which written on the battery.
Conclusion
After the research in the field of mobile forensics, it is clear to me
the high importance of this science. I think it should be more work
to develop tools related to this science to be can cover all types of
mobile devices especially the newest of them.
Findings
I suggested that the responsible for the establishment of the tools
used in mobile forensic is an international institution. This institution
could force that the manufacturers should give it detailed file for
each new release of mobile device will be produce it in order to
studying this file and work on the development of the current tool to
be able to deal with this new version of mobile phone.
Finish
Thank you

More Related Content

PPTX
Mobile Forensics
PPTX
Mobile forensic
PPTX
Computer forensics toolkit
PPT
Lecture2 Introduction to Digital Forensics.ppt
PDF
Digital Forensic: Brief Intro & Research Challenge
PPTX
Mobile Phone Seizure Guide by Raghu Khimani
PPTX
Digital forensics
Mobile Forensics
Mobile forensic
Computer forensics toolkit
Lecture2 Introduction to Digital Forensics.ppt
Digital Forensic: Brief Intro & Research Challenge
Mobile Phone Seizure Guide by Raghu Khimani
Digital forensics

What's hot (20)

PPTX
Mobile Forensics
PPTX
Digital forensic tools
PDF
A brief Intro to Digital Forensics
PPTX
Digital Forensic ppt
PPT
Collecting and preserving digital evidence
PPTX
Digital Evidence by Raghu Khimani
PPTX
L6 Digital Forensic Investigation Tools.pptx
PPTX
mobile forensic.pptx
PPTX
Network Forensics
PPT
Introduction to computer forensic
PPTX
Analysis of digital evidence
PPTX
Digital investigation
PPTX
Forensic imaging
PPTX
Email investigation
PPTX
E-mail Investigation
PPTX
Incident response process
PPTX
Computer forensic ppt
PPT
Linux forensics
PPTX
Computer forensics ppt
PPTX
Memory forensics
Mobile Forensics
Digital forensic tools
A brief Intro to Digital Forensics
Digital Forensic ppt
Collecting and preserving digital evidence
Digital Evidence by Raghu Khimani
L6 Digital Forensic Investigation Tools.pptx
mobile forensic.pptx
Network Forensics
Introduction to computer forensic
Analysis of digital evidence
Digital investigation
Forensic imaging
Email investigation
E-mail Investigation
Incident response process
Computer forensic ppt
Linux forensics
Computer forensics ppt
Memory forensics
Ad

Similar to Mobile forensics (20)

PPTX
Mobile_Forensics- General Introduction & Software.pptx
DOCX
ContentsMobile Forensic3Introduction3What It Is3How I.docx
PDF
Conceptual Study of Mobile Forensics
PPT
Computer and Mobile Forensic Analysis
DOCX
Seminar Report on Mobile Forensic By Chirag
PDF
MobileForensicsbyFayMahdi
PDF
digital forensic examination of mobile phone data
PDF
New research directions in the area of
PPT
Cell Phone and Mobile Devices Forensics.ppt
DOCX
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
PPTX
Mobile Forensics challenges and Extraction process
PDF
AN ANALYSIS OF CHALLENGES ENCOUNTERED WHEN PERFORMING MOBILE FORENSICS ON EME...
PDF
Cell Phone and Mobile Devices Forensics
PDF
776 s0005
PPTX
Mobile Forensics and Investigation Android Forensics
PDF
IRJET - Android based Mobile Forensic and Comparison using Various Tools
PPT
Cell Phone and Mobile Devices Forensics.ppt
PPT
Digital forensics Computer and mobile forensic
PDF
SOK:An overview of data extraction techniques from mobile phones
PPTX
811719104102_Tamilmannavan S.pptx
Mobile_Forensics- General Introduction & Software.pptx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
Conceptual Study of Mobile Forensics
Computer and Mobile Forensic Analysis
Seminar Report on Mobile Forensic By Chirag
MobileForensicsbyFayMahdi
digital forensic examination of mobile phone data
New research directions in the area of
Cell Phone and Mobile Devices Forensics.ppt
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Mobile Forensics challenges and Extraction process
AN ANALYSIS OF CHALLENGES ENCOUNTERED WHEN PERFORMING MOBILE FORENSICS ON EME...
Cell Phone and Mobile Devices Forensics
776 s0005
Mobile Forensics and Investigation Android Forensics
IRJET - Android based Mobile Forensic and Comparison using Various Tools
Cell Phone and Mobile Devices Forensics.ppt
Digital forensics Computer and mobile forensic
SOK:An overview of data extraction techniques from mobile phones
811719104102_Tamilmannavan S.pptx
Ad

Recently uploaded (20)

PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPT
Data mining for business intelligence ch04 sharda
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
A Brief Introduction About Julia Allison
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Training And Development of Employee .pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
How to Get Funding for Your Trucking Business
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
WRN_Investor_Presentation_August 2025.pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Data mining for business intelligence ch04 sharda
Lecture (1)-Introduction.pptx business communication
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
MSPs in 10 Words - Created by US MSP Network
A Brief Introduction About Julia Allison
unit 1 COST ACCOUNTING AND COST SHEET
COST SHEET- Tender and Quotation unit 2.pdf
Training And Development of Employee .pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
Roadmap Map-digital Banking feature MB,IB,AB
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
HR Introduction Slide (1).pptx on hr intro
Chapter 5_Foreign Exchange Market in .pdf
How to Get Funding for Your Trucking Business
Euro SEO Services 1st 3 General Updates.docx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
WRN_Investor_Presentation_August 2025.pdf

Mobile forensics

  • 2. Importance and motivation In the recent years, mobile devices are spread widely. We can say every person has a mobile device without considering to the type and the model of this device. sometimes, we must note that several people use mobile phones to do evil purposes like the crimes. Therefore, these mobile phones can act as main witnesses of these purposes. This leads to the need to recover data from mobile phones for use it as evidence of these crimes. Hence, the implementation of mobile forensic becomes very important. And the research in this area is very interesting.
  • 3. 1.Mobile Forensics Background Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal. 1.1.What is Mobile Forensics?
  • 4. -Contact numbers. -Record of calls, SMS, MMS and details about them. -Sounds. -Photographs. -Email messages. -Notes. -Calendar. 1.2.Data types that could be available on mobile devices 1.Mobile Forensics Background
  • 5. 4.Guidelines Several procedures must be done when the scene of crime is cordoned: 1-Make all people far from the crime scene. 2-Drawing or take photograph of the scene. 3-Record the status and location of each device exist in the scene. 4-Avoid any activity that could affect the origin of the evidence. 5-The evidences in the crimes not only mobile devices, any other forensics evidences should be collected such as fingerprints or firearms, papers, PC, cables or any else. 6-The person who carrying any things related to the crime must be guided by the officer in order to protect what he carried.
  • 6. 2.Mobile Forensics Steps 2.1.The major steps of mobile forensics? 1-Preservation. 2-Acquisition. 3-Examination. 4-Analysis. 5-Reporting.
  • 7. This step is the first and includes cordon off the scene of crime and seizing the devices of suspect without altering the contents of it (i.e. securing the device). 2.1.1. Preservation 2. Mobile Forensics Steps
  • 8. It means take all information about mobile devices existing in this scene. •Identification of the device. •Selecting the tool that would be use. 2.1.2. Acquisition 2. Mobile Forensics Steps
  • 9. This step is to get the digital evidence from mobile phones whether the evidences are exist clearly or hidden by using scientific methods. 2.1.3. Examination 2. Mobile Forensics Steps
  • 10. The analysis process looks to the results of the previous process (i.e. the results of examination process). Then analysis them. 2.1.4. Analysis 2. Mobile Forensics Steps
  • 11. It is the last step in the mobile forensics process. It is summarized in the preparation of a report that contains all results, procedures or steps that have been done. 2.1.5. Reporting 2. Mobile Forensics Steps
  • 12. 3.1.Techniques used to insulating a mobile device from communications: When the mobile phone is seized, it should insulated from the communication. 1-Isolate the entire crime scene from the network. 2-Use a shielded containers. 3-using substitute SIM: put another SIM rather than the original to make the device outside the coverage. 3.Security of mobile devices
  • 13. 3.Security of mobile devices 3.2.Procedures to ensure the security of mobile devices when they transported to the laboratory: When you do packaging and transfer of mobile phones to the laboratory, you should put them is a hard containers to keep them secure from damage in case the container facing the collision. Also in order to preserve the possibility of non- pressure buttons of the mobile phone.
  • 14. 4.Challenges Challenges related to mobile devices 1-Find mobile device as immersed in a liquid. In this case, battery should be removed and put the device in appropriate container. 2-Find mobile device in a damaged state. This case may doesn’t prevent extraction data from the device. The device should brings to the lab in order to examine it carefully. 3-Devices which closed by the secret numbers. Can solved by either investigative, Software or hardware Methods.
  • 15. 6.Recommendations to deal with the Chinese mobile devices Identification of Chinese phone is very difficult because the types of them are not well known. In addition, they are don't have any label which clarifying the manufacturer of these devices. Most of these mobile phones are a clone of the current known cell phones such as SCIPhone which is a clone of apple IPhone or the clone of Nokia N95. In order to make the investigator knows whether these mobile devices are original or Chinese, Investigator can observe the following: ●A clone may be thinner or fatter than the original phone. ●It may be doesn't have any label or manufacturer logo.
  • 16. ●When the device looks like another known device existing in the market; investigator could go to the internet then search about the clone of the known device ●Remove the battery from the cavity of mobile phone to take the full information about the device which written on the battery.
  • 17. Conclusion After the research in the field of mobile forensics, it is clear to me the high importance of this science. I think it should be more work to develop tools related to this science to be can cover all types of mobile devices especially the newest of them.
  • 18. Findings I suggested that the responsible for the establishment of the tools used in mobile forensic is an international institution. This institution could force that the manufacturers should give it detailed file for each new release of mobile device will be produce it in order to studying this file and work on the development of the current tool to be able to deal with this new version of mobile phone.