123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Legal >> View Article

Mobile Phone Forensics Explained

Profile Picture
By Author: Gemma Freeman
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer forensics and mobile phone forensics is not about processing data; but about investigating people and their actions in relation to a computer or other electronic data processing or storage device. Therefore looking to find and use information about what has happened to data as evidence to pinpoint fraudulent, dishonest or deceptive behaviour in individuals

The forensic investigation of data held on mobile telephones, PDAs, laptops, PCs and other data processing and storage devices provides a valuable resource in litigation, and dispute resolution, in many cases the recovery of deleted e-mails, and ‘hidden' data, of which the computer user may be, and probably is completely unaware. For example, information embedded in the computer file or cached to disk about the sequence of access and editing of a document, when and who by. This delivers new evidence that is often sufficiently compelling to short-circuit the whole dispute.

There is a prevailing misconception in the minds of many that retrieving deleted data involves no more that restoring what is in the recycle bin or trash can. Analysis through computer forensics ...
... and mobile phone forensics requires far more than just copying files and folders from targeted computers or devices. Data from computers needs to be specially imaged to produce an exact copy showing the data stored within.

Three key points to ALWAYS remember with all electronic data storage devices, including computers and mobile phones

1. Computer evidence must be SECURED quickly to reduce the risk that it might be destroyed, accidentally or deliberately
2. If the device to be investigated is discovered powered off, DO NOT SWITCH IT ON
3. If the device to be investigated is discovered powered on, DO NOT SWITCH IT OFF

Recovering deleted or partially overwritten data is technically challenging if the resulting evidence is to be relied upon in litigation. Most IT departments have not had the training or investment in appropriate hardware and software to undertake this without compromising the data.

Total Views: 163Word Count: 323See All articles From Author

Add Comment

Legal Articles

1. Your Guide To Family Reunion In The Uk: The Uk Dependent Visa
Author: The SmartMove2UK

2. Mofa Attestation In Uae: Everything You Need To Know
Author: dayam

3. Crown Law Solicitors Llp Expands Trusted Legal Services Across Surrey And London
Author: Probate Solicitors

4. London-based Crown Law Solicitors Empowers Clients With Expert Will And Residential Property Legal Services
Author: Will Solicitors

5. Advocate In Andheri | Best Lawyer In Mumbai
Author: ADVOCATE AZIZ

6. A Complete Guide To Online Food License Registration In Pune
Author: Startupporta Business Services

7. Why Smart Sellers Choose Virtual Offices: Thegstco’s Gst-ready Solution For E-commerce Growth
Author: shrutika

8. How Human Error Causes Most Train Accidents
Author: Law Offices of Eslamboly Hakim

9. A Guide To Divorce Proceedings In Singapore
Author: Singapore Sole Parent

10. What Is The Role Of Lawyers In Abu Dhabi’s Real Estate Market?
Author: Dr. Hassan Elhais

11. Self-sponsorship Visa Uk: Establishing Your Family Business In The Uk
Author: The SmartMove2UK

12. Trusted Guidance From Family Lawyers In Saskatoon
Author: John Smith

13. The Art Of Cross Examination In Commercial Arbitration
Author: Anna Paquin

14. Step-by-step Guide To Securing 12a Registration For Ngos And Trusts In India
Author: Ishita Ramani

15. Top Packers And Movers In Lahore: Your Ultimate Moving Solution
Author: paker

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: