- Bandr Fakiha
Associate Professor, Faculty of Health Sciences, Department of Medical Health Services, Umm Al-Qura University, Saudi Arabia
bsfakiha@uqu.edu.sa 0009-0006-7537-0251
ISSN: 2182-2069 (printed) / ISSN: 2182-2077 (online)
Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis
We live in a digital era where communication has become easier than ever, thanks to the emergence of computer technologies. With the improvement of these technologies over the last few decades, mobile devices have evolved and advanced, offering users fast and affordable ways to interact virtually. Forensic investigators have learned to take advantage of mobile device technologies to unveil digital evidence. This paper delves into the challenges and techniques involved in conducting forensic analysis on mobile devices. It also explores the logical extraction and analysis of data from mobile devices. Although it can be limited by the device's safety features or encryption, logical extraction entails connecting the mobile device to computers and using software programs to gain entry to and copy files stored in the gadget's file system. It highlights crucial advancements and the secrets surrounding this field with the primary objective of establishing more facts on the modern world of digital forensic investigation. Device heterogeneity, data fragmentation, cloud and synchronization, privacy, and legal considerations were found to be the most common challenges in forensic analysis. Device heterogeneity is where the computers run separate operating systems or the devices are manufactured by different companies. You are probably familiar with both the Internet and cell phone networks, which are two typical instances of heterogeneous networks. The Internet and cell phone networks are two popular instances of heterogeneous networks that you are probably already familiar with. Device exploitation, password cracking, file carving, database reconstruction, leveraging APIs, and obtaining legal cooperation were the preferred techniques involved in the analysis. On the other hand, decryption, advanced data carving, keyword searching, and data filtering are some of the crucial advancements in mobile device forensic tools. The results imply a dire need for a complex landscape to preserve data integrity throughout digital forensic investigations. The researcher uses this study's findings to recommend future action plans for stakeholders, including digital forensic investigators and the general public.