This HTML5 document contains 184 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n15https://www.mobiledit.com/
n26http://www.fernico.com/
dcthttp://purl.org/dc/terms/
yago-reshttp://yago-knowledge.org/resource/
n17https://www.qccglobal.com/case-studies/mobile-phone-forensics/
dbohttp://dbpedia.org/ontology/
n28http://dbpedia.org/resource/File:
foafhttp://xmlns.com/foaf/0.1/
n13http://www.projectaphone.com/
n29https://www.elcomsoft.com/emfb.html/
n31https://global.dbpedia.org/id/
n25http://www.mobileforensicsworld.org/
yagohttp://dbpedia.org/class/yago/
n14https://www.oxygen-forensic.com/
n22https://belkasoft.com/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
n30https://web.archive.org/web/20190809051646/http:/forensicswiki.org/wiki/
n8http://
n21http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
dbpedia-arhttp://ar.dbpedia.org/resource/
owlhttp://www.w3.org/2002/07/owl#
n32http://dbpedia.org/resource/Jo_Pil-ho:
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
goldhttp://purl.org/linguistics/gold/
n33http://www.edecdf.com/product-category/eclipse-capture/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Cellebrite
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Forensic_Files_II
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Digital_forensic_process
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Digital_forensics
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Forensic_science
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
n32:_The_Dawning_Rage
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Mobile_phone_tracking
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:XRY_(software)
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Mobile_device_forensics
rdf:type
yago:Machine103699975 yago:Whole100003553 dbo:Organisation yago:PhysicalEntity100001930 yago:Object100002684 yago:Instrumentality103575240 yago:Computer103082979 yago:WikicatMobileComputers yago:Artifact100021939 yago:Device103183080
rdfs:label
الأدلة الجنائية للأجهزة المحمولة Mobile device forensics
rdfs:comment
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers. There is growing need for mobile forensics due to several reasons and some of the prominent reasons are: Mobile device forensics can be particularly challenging on a number of levels: الأدلة الجنائية للأجهزة المحمولة (بالإنجليزية: Mobile device forensics)‏ هي فرع من العلوم الجنائية الرقمية التي تتعلق باستعادة الأصول المعلوماتية أو أي أدلة رقمية أو بيانات من جهاز محمول تحت نطاق ظروف ومعايير العمل الجنائي الرقمي. عادةً تُستخدم كلمة «أجهزة محمولة» للتعريف بالجهاز أو الهاتف النقال، ولكن أيضا يمكن تعريفها على سبيل المثال كأي جهاز رقمي يحتوي على ذاكرة داخلية أو له المقدرة العامة للتواصل مثل أجهزة الحاسوب الكفي، أجهزة نظام التموضع العالمي أو أجهزة الحاسوب اللوحي.
foaf:depiction
n21:Hard_disk.jpg n21:PopcornBGA.jpg n21:RTL_Aceso_with_iPhone_attached.jpg n21:RF_bag_with_iPhone.jpg
dct:subject
dbc:Information_technology_audit dbc:Computer_security_procedures dbc:Mobile_computers dbc:Digital_forensics
dbo:wikiPageID
23739365
dbo:wikiPageRevisionID
1118085601
dbo:wikiPageWikiLink
dbr:Forensic_Toolkit dbr:SMS dbr:BitPim dbr:Electronic_discovery dbr:Multimedia_messaging_service dbr:Acquisition_(forensic_process) dbr:Smartphone dbr:Hayes_command_set dbr:Network_share dbc:Information_technology_audit dbr:List_of_digital_forensics_tools dbr:Social_networking_service dbr:Mobile_network_operator dbr:MediaTek dbr:Personal_digital_assistant dbr:Card_reader dbr:Search_warrant dbr:Flash_memory dbr:Frye_standard dbr:EnCase dbr:Solder_ball dbr:Military_intelligence dbr:MultiMediaCard dbr:SQLite dbr:Dd_(Unix) dbr:Application_programming_interface dbr:Geotagging dbr:Geolocation dbr:Spreadtrum dbr:Airplane_mode dbr:Mobile_device dbr:Mobile_phone dbr:Location-based_service dbr:Defense_(legal) dbr:Phone_cloning dbr:Modem dbr:Faraday_cage dbr:Forensic dbr:Multimedia_Messaging_Service dbr:Telecommunication dbr:Mobile_phone_tracking dbr:Non-volatile_memory dbr:IMEI dbr:Kilobyte dbr:Ball_grid_array dbr:Integrated_circuit dbr:EEPROM dbc:Computer_security_procedures dbr:Database dbr:Electronic_Serial_Number dbr:XRY_(software) dbr:Joint_Test_Action_Group dbr:Personal_computer dbr:Original_equipment_manufacturer dbr:Tablet_computers dbr:IOS dbr:Secure_Digital dbr:Cellebrite_UFED dbr:Pogo_pin dbr:GPS dbr:Sleuthkit dbr:Boundary_scan dbr:Volatile_memory dbr:National_Marine_Electronics_Association dbr:GPS_navigation_device dbr:GrayShift dbr:Compact_Disc dbr:Global_Positioning_System dbr:Digital_evidence dbr:Motorola_phone_AT_commands dbr:Cellebrite n28:PopcornBGA.jpg dbr:Central_processing_unit n28:RTL_Aceso_with_iPhone_attached.jpg dbr:Private_investigator dbr:Closed-circuit_television dbr:Desoldering dbr:Rugged_computer dbr:Memory_Stick n28:RF_bag_with_iPhone.jpg dbr:Digital_forensics dbr:Call_detail_record dbr:Mobile_phone_form_factors dbr:Dead_man's_switch dbc:Mobile_computers dbr:Computer_forensics dbr:.XRY dbr:Wireless_LAN dbc:Digital_forensics dbr:Daubert_standard dbr:USB_flash_drive dbr:Subscriber_Identity_Module dbr:Cell_site dbr:File_system dbr:MStar_Semiconductor dbr:Bytes dbr:Telecommunications_data_retention dbr:File_Allocation_Table dbr:Binary_blob dbr:SIM_card dbr:Printed_circuit_board dbr:Operating_system dbr:CompactFlash dbr:Anti-computer_forensics dbr:Hex_editor dbr:Boot_loader dbr:Block_(data_storage) dbr:Android_(operating_system) dbr:Metadata dbr:User_interface
dbo:wikiPageExternalLink
n8:secureview.us n13: n14: n15: n17: n22:ec n25: n26:ZRT3.aspx n29: n30:Chip-Off_Forensics n30:JTAG_Forensics n33:
owl:sameAs
wikidata:Q6887097 freebase:m.06zp3tp dbpedia-ar:الأدلة_الجنائية_للأجهزة_المحمولة yago-res:Mobile_device_forensics n31:4sATt
dbp:wikiPageUsesTemplate
dbt:Reflist dbt:Short_description dbt:ForensicScience dbt:Portal-inline dbt:Digital_forensics dbt:More_citations_needed dbt:Main
dbo:thumbnail
n21:Hard_disk.jpg?width=300
dbo:abstract
الأدلة الجنائية للأجهزة المحمولة (بالإنجليزية: Mobile device forensics)‏ هي فرع من العلوم الجنائية الرقمية التي تتعلق باستعادة الأصول المعلوماتية أو أي أدلة رقمية أو بيانات من جهاز محمول تحت نطاق ظروف ومعايير العمل الجنائي الرقمي. عادةً تُستخدم كلمة «أجهزة محمولة» للتعريف بالجهاز أو الهاتف النقال، ولكن أيضا يمكن تعريفها على سبيل المثال كأي جهاز رقمي يحتوي على ذاكرة داخلية أو له المقدرة العامة للتواصل مثل أجهزة الحاسوب الكفي، أجهزة نظام التموضع العالمي أو أجهزة الحاسوب اللوحي. Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers. Some of the mobile companies had tried to duplicate the model of the phones which is illegal. So, We see so many new models arriving every year which is the forward step to the further generations. The Process of cloning the mobile phones/devices in crime was widely recognised for some years, but the forensic study of mobile devices is a relatively new field, dating from the late 1990s and early 2000s. A proliferation of phones (particularly smartphones) and other digital devices on the consumer market caused a demand for forensic examination of the devices, which could not be met by existing computer forensics techniques. Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS and MMS messages. Smartphones may additionally contain video, email, web browsing information, location information, and social networking messages and contacts. There is growing need for mobile forensics due to several reasons and some of the prominent reasons are: * Use of mobile phones to store and transmit personal and corporate information * Use of mobile phones in online transactions * Law enforcement, criminals and mobile phone devices Mobile device forensics can be particularly challenging on a number of levels: Evidential and technical challenges exist. For example, cell site analysis following from the use of a mobile phone usage coverage, is not an exact science. Consequently, whilst it is possible to determine roughly the cell site zone from which a call was made or received, it is not yet possible to say with any degree of certainty, that a mobile phone call emanated from a specific location e.g. a residential address. * To remain competitive, original equipment manufacturers frequently change mobile phone form factors, operating system file structures, data storage, services, peripherals, and even pin connectors and cables. As a result, forensic examiners must use a different forensic process compared to computer forensics. * Storage capacity continues to grow thanks to demand for more powerful "mini computer" type devices. * Not only the types of data but also the way mobile devices are used constantly evolve. * Hibernation behavior in which processes are suspended when the device is powered off or idle but at the same time, remaining active. As a result of these challenges, a wide variety of tools exist to extract evidence from mobile devices; no one tool or method can acquire all the evidence from all devices. It is therefore recommended that forensic examiners, especially those wishing to qualify as expert witnesses in court, undergo extensive training in order to understand how each tool and method acquires evidence; how it maintains standards for forensic soundness; and how it meets legal requirements such as the Daubert standard or Frye standard.
gold:hypernym
dbr:Branch
prov:wasDerivedFrom
wikipedia-en:Mobile_device_forensics?oldid=1118085601&ns=0
dbo:wikiPageLength
41933
foaf:isPrimaryTopicOf
wikipedia-en:Mobile_device_forensics
Subject Item
dbr:Bootloader_unlocking
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Grayshift
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Refugees_as_weapons
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:SecureDataRecovery
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Outline_of_forensic_science
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Popcorn_effect
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
Subject Item
dbr:Mobile_Device_Forensic
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
dbo:wikiPageRedirects
dbr:Mobile_device_forensics
Subject Item
dbr:Mobile_forensics
dbo:wikiPageWikiLink
dbr:Mobile_device_forensics
dbo:wikiPageRedirects
dbr:Mobile_device_forensics
Subject Item
wikipedia-en:Mobile_device_forensics
foaf:primaryTopic
dbr:Mobile_device_forensics