Mobile Device Forensics

Mobile Device Forensics

Mobile device forensics is one of the most important area of forensics, if not the most important. The reason is that these devices are ubiquitous.  Everyone goes everywhere with their mobile devices. That means that in any investigation, regardless of the nature of the investigation, you are likely to find relevant evidence on mobile devices.  I have personally seen the importance of mobile device forensics in a wide range of investigations. It has become important in civil litigation related to traffic accidents. Mobile device forensics is critical in criminal investigations with such wide-ranging crimes as murder, burglary, child pornography, and terrorism. In fact, it is difficult to find an investigation type that would not involve some level of mobile device forensics.

Consider these real-world case studies:

  • Adam Howe took a “selfie” photo of himself at the scene of a church burglary. This evidence led to a search of the suspect’s property, which turned up the stolen goods from the church.
  • A Manchester University student, Mikayla Munn, gave birth to a baby in her dorm room bathtub. She immediately drowned her newborn in the bath tub but covered it up stating that she was not aware of her pregnancy and labor pains were felt while taking a bath, followed by the baby’s arrival. On verifying her digital assets, investigators have found that she had searched on Google for “at home abortions” and “ways to cut the umbilical cord of a baby.” Munn pleaded guilty to neglect and was imprisoned for 9 years
  • A cell phone was accidently dropped near the scene and was used to identify the alleged perpetrator. In 2013, cell phone pictures led to an arrest in a burglary of a Jared jewelry store. The alleged thief discarded clothing and accidently dropped his cell phone behind a nearby 7-11. The cell phone photos positively ID’d him


It is going to be difficult for you to be an effective forensic investigator, without a working knowledge of mobile device forensics. Fortunately, EC Council has a new Mobile Forensics course. In the new EC-Council Mobile forensics course I provide you a working knowledge of mobile forensics. This is based on many years of conducting mobile device investigations and teaching mobile device forensics to law enforcement officials around the world.

Know more about Mobile Forensics

About Dr. Chuck Easttom:

Dr. Chuck Easttom is the author of 27 books, including several on computer security, forensics, and cryptography. His books are used at over 60 universities. He has also authored scientific papers (over 60 so far) on digital forensics, cyber warfare, cryptography, and applied mathematics. He is an inventor with 17 computer science patents. He holds a Doctor of Science in cyber security (dissertation topic: a study of lattice-based cryptographic algorithms for post quantum computing) and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is currently working on a second doctorate in a bit different field, bio-engineering and nanotechnology (dissertation topic “The effects of nonlinear dynamics on nanotechnology and bioengineering”), due to complete summer 2020. He is a Senior Member of the IEEE and a Senior Member of the ACM as well as a member of IACR (International Association of Cryptological Research) and INCOSE (International Council on Systems Engineering). He is also a Distinguished Speaker of the ACM (Association of Computing Machinery). and a frequent speaker at conferences. He is a reviewer for six scientific journals and the Editor in Chief for the American Journal of Science and Engineering. He is a Professor of Practice at Capitol Technology University teaching graduate courses in computer science, electrical engineering, cybersecurity, and related areas as well as chairing doctoral dissertation committees. He is also the Director of Capitol Technology University’s Quantum Computing and Cryptography Research Lab. He also currently holds 55 industry certifications (CHFI, CISSP, CASP, CEH, etc.) He frequently serves as an expert witness in computer related court cases. You can get more details at

get certified from ec-council
Write for Us