All You Need To Know Is Your Mobile Safe?

All You Need To Know Is Your Mobile Safe?

All You Need To Know Is Your Mobile Safe? Something You Should Know About Mobile Forensic

Mobile device forensics is a category of digital forensics relating to retrieval of digital evidence or data from a mobile device under forensically sound circumstances. The phrase mobile device usually denotes mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices, and tablet computers.

The use of mobile phones/devices in delinquency was widely recognized for some years, but the forensic study of mobile devices is a relatively new field, dating from the early 2000s and late 1990s.

There is a mounting need for mobile forensics owing to several reasons and some of the protuberant reasons are:
  • Use of mobile phones to store and transmit personal and corporate information
  • Use of mobile phones in online transactions
  • Law enforcement, criminals and mobile phone devices.
How It’s Used

We habitually ponder of mobile forensics in the context of law enforcement, but they are not the only folks who might rely on evidence from a mobile appliance.

The armed use mobile devices to collect intelligence when forecasting military operations or counterterrorism efforts. Commercials may turn to mobile evidence in they believe their intellectual property is being stolen or an employee is engaged in fraudulent activity. Heck, businesses have even been known to witness employees’ personal usage of business devices to prove unauthorized use. But, of course, it’s law enforcement that may make the most use of mobile forensics, using electronic discovery to pleat evidence on a host of crimes from identity theft to homicide.

The Mobile Forensics Process

Regardless of who uses mobile forensics or how it’s employed, the key to assembling digital evidence is fetching in forensically sound practices. The term ”forensically sound”, according to the Electronic Discovery Reference Model at Duke University, is defined ‘events used for acquiring electronic facts in a manner that ensures it is ”as originally discovered” and is reliable enough to be admitted into evidence’.

With their snowballing functionality and mounting data storage, mobile devices have become pocket-size computers.  With password protection and encryption now the norm for many of these devices, law enforcement unceasing to struggle to find ways to extract and scrutinize information from these devices.  The National Institute for Standards and Technology (NIST) and the Scientific Group on Digital Evidence (SWGDE) provide an in-depth look at mobile forensics outlining the benefits and the challenges these devices present to Law enforcement.

Computer Forensics Tool Testing

The Computer Forensics Tool Testing (CFTT) program is a joint mission of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology Special Program Office (SPO) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defence Cyber Crime Centre, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security’s Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The intention of the CFTT program is to offer measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools across those specifications.

Share This

Leave a Comment

Your email address will not be published. Required fields are marked *