Chapter

Impediments in Mobile Forensics

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

In this digital era, the usage of mobile phones in daily life has become inextricable due to the facilities and the level of sophistication it offers. Proportionately, the crimes and offenses involving the mobile devices are growing in rapid speed. Whenever a crime occurs in a spot, the forensic team will arrive there to identify and locate the evidence of the criminals. If the crime involves digital equipment like computers and laptop, then digital forensic team will investigate and analyze the devices for digital evidence collection. These days, mobile phones have the capability to offer any kind of information and services digitally on top of the palm of the user. Anything is available on the hands with a single touch on the screen of the mobile devices. It also offers to the adversaries many digital services which are harmful to the societies. The fast-paced advancement in the digital front paves the way for many digital crimes. Hence, a new field, mobile forensics, emerges out to trace the evidence, but it faces many challenges due to the dynamic nature of the digital technologies.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Globally, the extensive use of smartphone devices has led to an increase in storage and transmission of enormous volumes of data that could be potentially be used as digital evidence in a forensic investigation. Digital evidence can sometimes be difficult to extract from these devices given the various versions and models of smartphone devices in the market. Forensic analysis of smartphones to extract digital evidence can be carried out in many ways, however, prior knowledge of smartphone forensic tools is paramount to a successful forensic investigation. In this paper, the authors outline challenges, limitations and reliability issues faced when using smartphone device forensic tools and accompanied forensic techniques. The main objective of this paper is intended to be consciousness-raising than suggesting best practices to these forensic work challenges. (PDF) Smartphone Forensic Challenges. Available from: https://www.researchgate.net/publication/336221775_Smartphone_Forensic_Challenges [accessed Aug 08 2021].
Conference Paper
Full-text available
Legal issues have risen with the changing landscape of computing, especially when the service, data and infrastructure is not owned by the user. With the Cloud, the question arises as to who is in the “possession” of the data. The Cloud provider can be considered as a legal custodian, owner or possessor of the data thereby causing complexities in legal matters around trademark infringement, privacy of users and their data, abuse and security. By introducing Cloud design focusing on privacy, legal as a service on a Cloud and service provider accountability, users can expect the service providers to be accountable for privacy and data in addition to their regular SLAs.
Article
Tejas Karia, Akhil Anand and Bahaar Dhawan consider the change in the law in India and how the Indian courts have developed case law regarding reliance on electronic evidence. Index words: India; Supreme Court; admissibility; electronic evidence
Article
The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following will be necessary in the future: (1) better education/training/certification (opportunities, standardization, and skill-sets); (2) support for cloud and mobile forensics; (3) backing for and improvement of open-source tools (4) research on encryption, malware, and trail obfuscation; (5) revised laws (specific, up-to-date, and which protect user privacy); (6) better communication, especially between/with law enforcement (including establishing new frameworks to mitigate problematic communication); (7) more personnel and funding.
Article
Is Digital Investigation sufficiently different in character from existing academic disciplines such as Computer or Forensic Science to be called a distinct discipline? Is it a profession in its own right? The authors outline why the debate is a significant one in terms of its consequences for professional standards, quality control, academic and personal accreditation. The paper emphasises the differences in the way we teach digital investigations in comparison to computer science covering theory, practice, the education versus training debate, the interdisciplinary nature of the subject, a problem solving and problem based approach, and the need to emphasis professionalism and ethics. The arguments for four alternative positions are proposed: Digital Investigation as a branch of Computer Science, Digital Investigation as a branch of Forensic Science, Digital Investigation as an inter-disciplinary science and Digital Investigation as a distinct discipline. The experience gained in the development and delivery of three typical academic programmes in the area is used to support one position, namely that Digital Investigation is a distinct discipline that merits professional status.
Forensic Examination of Moblie Phones. Digital Investigation.
  • B.Mellars