This causes many Android phones to be running older versions of the operating systems which means various forms of extraction are viable. Whilst forensics experts, hackers and those selling spyware may be able to access and extract data, we look at a number of the most well-known commercial companies who sell their products to law enforcement, such as Cellebrite, Oxygen Forensic Detective, and MSAB.Īn important differentiator between iOS and Android in terms of forensics capabilities is that whilst Apple can push updates directly to their users, patching vulnerabilities and exploits, Android users are predominantly reliant on the manufacturer and carrier to provide update. The test experiment were conducted either on windows server 2012 or Ubuntu 14.1 operating systems environments. The implementation forensic tools used included Autopsy Browser, Oxygen Forensic Suite Analyst 2014 and Android Debug Bridge. Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, analyses and presents the data contained on the phone. The study will use three smartphones running Android as test cases. In an interesting article, editors by Privacy International examines some aspects of digital forensics on mobile phones, from the acquisition process to the data analysis phase.Īll the topics in the article has been discussed in detail in the attached paper.