Physical extraction is a snapshot of the file system showing what the file system wants you to see.


  • Q24:

    2G and 3G phones are closest in architecture and design to a PC.

  • Q25:

    A digital forensic investigation depends upon timelines for its success. When overlaid on the timelines of a physical crime, the timelines from mobile devices and computers provide an excellent yardstick by which to measure the play of events surrounding the crime itself.

  • Q26:

    Logical extractions are useful only when the physical option is not available because of the device itself.

  • Q27:

    Each SIM card has an international mobile subscriber identity number that associates the phone with the subscriber's mobile network.

  • Q28:

    From a forensic perspective it is a toss-up as to how much data you may be able to extract from a 2G device.

  • Q30:

    Some tools, such as Cellebrite's UFED Touch, are quite clear about which devices support physical extraction.

  • Q31:

    An integrated circuit identification (ICCID)number is located on each SIM.

  • Q32:

    All mobile devices use SIM cards.

  • Q33:

    By cloning the SIM card, the investigator retains a perfect copy for evidentiary purposes.

  • Q34:

    Blackberry is the only mobile device that can be recovered directly.

What is a file system extraction?

A File System extraction is an extension of the logical extraction that allows the examiner to examine the file system as a whole, rather than just snippets of data. This can include some hidden and deleted data if the method of storing such data was chosen to be a database or logs within the file system.

What is a logical extraction?

In digital forensics, the term logical extraction is typically used to refer to extractions that do not recover deleted data, or do not include a full bit-by-bit copy of the evidence.

What techniques can extract data from an encrypted device?

3.1. Manual/logical extraction. ... .
3.2. File system extraction. ... .
3.3. Cloud data acquisition. ... .
3.4. Bypassing device lock/extracting lock-related information. ... .
3.5. Physical data extraction. ... .
3.6. Data acquisition with custom boot loaders..

What type of evidence can be extracted from a mobile device?

Since mobile devices are popular platforms for various applications, they can offer imperative evidence in forensic investigations. These devices often serve as a source of digital evidence in crimes and contain personal information about an individual, such as photographs, passwords and other useful data.