![]() ![]() Some forensic examiners found that they could retrieve even deleted data using "flasher" or "twister" boxes, tools developed by OEMs to "flash" a phone's memory for debugging or updating. However, this type of software could write to the phone as well as reading it, and could not retrieve deleted data. Enterprising mobile forensic examiners sometimes used cell phone or PDA synchronization software to "back up" device data to a forensic computer for imaging, or sometimes, simply performed computer forensics on the hard drive of a suspect computer where data had been synchronized. However, this proved to be a time-consuming process, and as the number of mobile devices began to increase, investigators called for more efficient means of extracting data. Įarly efforts to examine mobile devices used similar techniques to the first computer forensics investigations: analysing phone contents directly via the screen and photographing important content. email, web browsing) demand for forensic examination grew. With the increased availability of such devices on the consumer market and the wider array of communication platforms they support (e.g. The role of mobile phones in crime had long been recognised by law enforcement. It is therefore recommended that forensic examiners, especially those wishing to qualify as expert witnesses in court, undergo extensive training in order to understand how each tool and method acquires evidence how it maintains standards for forensic soundness and how it meets legal requirements such as the Daubert standard or Frye standard.Īs a field of study forensic examination of mobile devices dates from the late 1990s and early 2000s.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |