|−|Cell phones are an emerging but rapidly growing area of |+|
are . , are , not .
|−|computer forensics. While cell phones are becoming |+|
|−|more like desktop computers functionally, their |+|
|−|organization and operation are quite different in certain |+|
|−|areas. For example, most cell phones do not contain a |+|
|−|hard drive and rely instead on flash memory for persistent |+|
|−|storage. Cell phones are also designed more as specialpurpose |+|
|−|appliances that perform a set of predefined tasks |+|
|−|using proprietary embedded software, rather than |+|
|−|general-purpose extensible systems that run common |+|
|−|operating system software. Such differences make the |+|
|−|application of classical computer forensic techniques |+|
|−|difficult. Also complicating the situation is the state of the |+|
|−|art of present day cell phone forensic tools themselves |+|
|−|and the way in which tools are applied. This paper |+|
|−|identifies factors that impede cell phone forensics and |+|
|−|describes techniques to address two resulting problems in |+|
|−|particular: the limited coverage of available phone |+|
|−|models by forensic tools, and the inadequate means for |+|
|−|validating the correct functioning of forensic tools. |+|
Latest revision as of 01:41, 16 May 2009
ACLs are Access Control Lists. These might be useful for some forensic analysis, but these days most forensic investigations are concerned with data, not metadata.
Please help to improve this article by expanding it.
Further information might be found on the discussion page.
The following page links to this file: