Research Techniques in Network and Information Technologies (VIII)Research Techniques in Network and Information Technologies (VIII)

Hi!

We continue with the eighth part of this study on unlocking cell phones in forensic procedures.

In this case, we will present a draft of the study, including the abstract, keywords, and introduction.

ABSTRACT:

Today’s mobile devices are equipped with various security measures such as pattern locks, PINs, passwords, logical jailbreaks and advanced encryption that protect the data stored on them, in principle to safeguard the privacy of their users. These are crucial to safeguarding user privacy, but in turn present significant challenges to forensic investigators who need to access data from all types of devices (including mobile devices) in the course of criminal investigations. Device heterogeneity, data fragmentation, and legal and privacy considerations add additional layers of complexity to the forensic analysis process and so this literature review and analysis process will be undertaken to see the current landscape of mobile device protection and the measures prepared to bypass these protections lawfully, or sea, in the course of criminal investigations. This review aims to describe current mobile device unlocking techniques, discuss the challenges associated with mobile device forensics, evaluate available forensic tools and their effectiveness, and explore recent advances as well as future directions in the field.

KEYWORDS:

Analysis tools, Forensic Investigation, Mobile Phone, Mobile Device, Mobile Forensics, Smartphone.

CORRESPONDING AUTHOR:

Juan Ignacio Oller Aznar

Universitat Oberta de Catalunya, Barcelona, Spain

Email: jolleraz@uoc.edu

INTRODUCTION:

Today, mobile devices have become an unavoidable part of everyday life, with an increasingly omnipresent presence in all our daily tasks, from our daily activities in the company to the most private activities of our day to day, digital devices and mobiles accompany us, storing a large amount of personal and professional information.

This dependence on mobile devices also poses challenges in the field of security and privacy at many levels, including in the context of digital forensic investigations. While the ability to lock mobile phones can help safeguard our data and privacy, it can also be used by criminals to hide crucial information in the context of an investigation, preventing law enforcement (police and government teams) from accessing information that could help prosecute traffickers, terrorists or sex offenders.

For this reason, the ability to unlock mobile devices in order to extract data is crucial for criminal investigations and with this objective in mind, we proceed to carry out a literature review of certain articles that have been identified as interesting in this field, since they study how to break pattern locks and thus bypass encryption.

The objective of this literature review is to explore current mobile device unlocking techniques and analyze the challenges and strategies associated with the forensic analysis of these devices. The reviewed articles provide a comprehensive overview of the methodologies and tools used in the field, as well as recent advances and future directions.

That’s all for today.
We’ll continue in a few days.

Deja una respuesta

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Related Post