Challenges

Challenges of smartphone forensics


1. Acquiring Smartphone Images

As security features like memory encryption are being introduced for iOS and Android, they limit the acquisition methods and amount of data that can be extracted from smartphones.


2. Recovering & Analyzing Smartphone Internet and App Data

Traditional mobile forensics tools don't dig deep enough into smartphone internet and App data to enable complete forensics analysis of all the user activity in popular chat apps, browsers, social networking apps, email apps, etc.


3. Integrated Analysis of Digital Evidence from Computer and Smartphones

Cases often require examination of combined user activity on computers, smartphones and tablets. Because this requires the use of specialized computer and mobile forensic tools, it can be difficult to get an integrated view of all the evidence collected.

Smartphone user behavior has quickly shifted away from calling and text messaging towards Internet apps for chatting, browsing, social networking, emailing, etc. Naturally recovering and analyzing data from these apps has become an important aspect of your smartphone examinations.
 
Top 5 Problems Recovering Smartphone Internet & App Data

1. New apps emerge and rise in popularity every few months

2. Established or popular apps are constantly being updated and changed

3. Multiple browsers may have been installed on the device. How do you know if you found all the data?

4. The important evidence might reside in data from an obscure app you've never even heard of

5. Your current mobile forensics tools aren't focused on supporting for the recovery app data
 
We understand that digital forensics is a means to end, and that your real mission is much bigger: Fighting crime. Preventing the misuse of company assets. Protecting national security.
 

Based on the direction Apple and Google are headed with recent and forthcoming versions of their operations systems, encryption of memory on smartphones is going to become a standard security feature.

This means that physical images will become increasingly challenging to acquire. Across the board, logical acquisition methods that use documented OS backup processes and commands are becoming the most viable and consistent options for extracting data from smartphones.

 

 
 

CFK News Scroller

CFK associates is a pan African consulting firm with its headquarter in Nairobi Kenya. We are leaders in digital risks and investigations in the region. We have strong network of associates specializing in different areas of profession.

Our vision is to be the leader and set pace in digital forensics in Africa

Our mission is to provide our clients with world class experience through service provision.

Our slogan: "We deliver on promise"

What is Digital Forensics?

Digital forensics is the scientific process of capturing (imaging) and analyzing information stored in any electronic format, for the purpose of investigating allegations, to find the truth, with no predisposition as to the outcome. It is a highly technical discipline requiring a combination of unique skills relating to computer technology and software, formal investigative experience (law enforcement), proper evidence handling methods, and judgment. Computer forensics can be the key to:

  • Learning the truth
  • Taking appropriate action based on the facts
  • Winning the case.

At CFK we specialize in the listed services:

  • Digital Forensics (Computers and Mobile devices)
  • CyberSecurity Strategies and Management
  • Inappropriate Data Duplication
  • Private Investigation of Cellphone/Mobile Phone
  • Cyber Fraud and Money Laundering Investigation
  • Documents examination
  • Industrial Espionage
  • Online Brand Protection
  • Internal Corporate Investigation
  • Breach of Contract
  • Computer Break-ins
  • Digital Pornography
  • Inappropriate Internet Usage
  • Internet Abuse
  • Inappropriate Email Usage

Area of operation

We operate in the whole of Africa through our extensive network of associates who represents us in their respective countries