{"id":694,"date":"2016-04-26T10:31:31","date_gmt":"2016-04-26T10:31:31","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=694"},"modified":"2024-12-11T19:23:32","modified_gmt":"2024-12-11T19:23:32","slug":"the-future-of-mobile-forensic-hardware","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/","title":{"rendered":"The Future of Mobile Forensic Hardware"},"content":{"rendered":"<p>Nowadays more than 80 % of devices in <a href=\"https:\/\/www.digitalforensics.com\/\">digital forensics<\/a> labs are tablets, smartphones and phones. <!--more-->This is the reason why mobile forensic hardware prices are a very actual problem. An average price for top <a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/cell-phone-forensics\">mobile forensic<\/a> hardware (for example, Cellebrite UFED or Micro Systemation XRY) is in the area of 9\u00a0000 $ (some kits can cost up to 20\u00a0000 $). License renewal for such hardware costs in the area of 3\u00a0000 $. And what do users get for this huge amount of money? Let\u2019s try to find out.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-695\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch.jpg\" alt=\"\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch-300x225.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch-768x576.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch-512x384.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Cellebrite-UFED-Touch-920x690.jpg 920w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. Cellebrite UFED Touch<\/em><\/p>\n<p>All mobile devices coming to digital forensics labs can be divided in three groups: the first two groups are iOS and Android devices, and the third \u2013 some older phones.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Mobile_phones\"><\/span>Mobile phones<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Usually, these are old phones. The main problem is \u2013 these devices are not actual ones for mobile forensic hardware developers. For example, Cellebrite can extract data from some devices on the physical level, but this dump can\u2019t be parsed, and, what is more, due to the fact that these devices are old we\u2019ll barely get the updates for software to be able to parse them.<\/p>\n<p>In such situation MOBILedit! Forensic (Compelson Labs) can be very useful. It supports lots of old mobile phones, which are not supported by other vendors. What is more, the price for this piece of software is quite affordable.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-696\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit.jpg\" alt=\"\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit-300x225.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit-768x576.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit-512x384.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/MobilEdit-920x690.jpg 920w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. MOBILedit! Forensic<\/em><\/p>\n<p>Also, we should mention Chinese phones here. These are phones based on MediaTek, Spreadtrum, Infineon chips. Usually top mobile forensic hardware developers offer support for Chinese phones as an additional option. But for the price of such option you can buy a standalone solution, for example, Tarantula (EDEC). Also some cheaper solutions for Chinese phones can be found, for example, at Ebay.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-697\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula.jpg\" alt=\"\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula-300x225.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula-768x576.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula-512x384.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Tarantula-920x690.jpg 920w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. Tarantula<\/em><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Android_devices\"><\/span>Android devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Top mobile forensic hardware supports devices running 3<sup>rd<\/sup> and 4<sup>th<\/sup> versions of Android OS very well. But data extraction from such devices is not a problem for a mobile forensic examiner, even if he or she doesn\u2019t have this expensive equipment. You can perform physical extraction from such devices even with dd [1].<\/p>\n<p>Due to security issues, it\u2019s very difficult to extract data from devices running 5<sup>th<\/sup> and 6<sup>th<\/sup> versions of Android OS, especially perform a physical extraction.<\/p>\n<p>There was a case in our lab, during which we needed to recover deleted data from HTC One smartphone. The device had a locked bootloader, so it couldn\u2019t be rooted. If we tried to unlock the bootloader, the user data would have been destroyed. Top mobile forensic hardware was not able to solve the problem. To perform physical imaging we used a flasher which cost us just 99 $.<\/p>\n<p>For parsing of the dump you can use both free (FTK Imager [2], SQLite Viewer, NowSecure Forensics CE [3]) and commercial tools (Belkasoft [4], Oxygen Forensic [5]), which cost less.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-698\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software.jpg\" alt=\"\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software-300x225.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software-768x576.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software-512x384.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/04\/Oxigen-Software-920x690.jpg 920w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4. Oxygen Forensic<\/em><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Locked_Android_devices\"><\/span>Locked Android devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Top mobile forensic tools usually offer solutions for locked devices, but for limited models only. Flashers support wider range of mobile devices and allow a mobile forensic examiner to overcome all types of locks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"iOS_devices\"><\/span>iOS devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Of course, developers try to hide this fact, but data from iOS devices is extracted via iTunes backup procedure. There are no other methods of data extraction from modern iOS devices. And, of course, top mobile forensic software and hardware vendors could offer you some \u00abadvanced logical\u00bb method, but only if the examined device is jailbroken \u2013 and you barely get such device for examination. For example, our lab got no such devices in recent 5 years. That\u2019s why the best tool for iOS forensic should be judged not for its extraction capabilities, but for its ability to parse iTunes backups. And there are some very good pieces of software (Belkasoft [4], Oxygen Forensic [5]) which cost less. The thing is \u2013 iTunes backup can be performed by iTunes or some open source tools, for example, libmobiledevice.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Locked_iOS_devices\"><\/span>Locked iOS devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Top mobile forensic tools can help to unlock some devices (there are also advanced solutions available in Cellebrite lab) running iOS 7 or 8, but you can use IP Box for it, for example, and it costs just 100 $ at Ebay.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Discussion\"><\/span>Discussion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ten years ago, when we had to use an individual approach for examination of almost every phone model, having all-in-one expensive forensic tool was reasonable, but not now. Today you can pay 300-400 $ for hardware (a flasher and a few JTAG adapters) and 1000-2000 $ for software and your forensic lab gets more powerful equipment than top mobile forensic hardware. Data from most mobile devices running Android or Windows Mobile can be extracted via JTAG technique, for others you can use chip-off. Of course, adapters for chips are expensive, but its range isn\u2019t very wide \u2013 there are around 6 main chip carrier types.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"References\"><\/span>References:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>1. Physical acquisition of a locked Android device<\/p>\n<p>2. AccessData Current Releases<\/p>\n<p><a href=\"https:\/\/www.nowsecure.com\/resources\/freetools\/\" target=\"_blank\" rel=\"noopener\">3. NowSecure Forensics community edition<\/a><\/p>\n<p><a href=\"https:\/\/belkasoft.com\/ec\" target=\"_blank\" rel=\"noopener\">4. Belkasoft evidence center<\/a><\/p>\n<p>5. Oxygen Forensic<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"Nowadays more than 80 % of devices in digital forensics labs are tablets, smartphones and phones.","protected":false},"author":126,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-694","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Future of Mobile Forensic Hardware<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Future of Mobile Forensic Hardware\" \/>\n<meta property=\"og:description\" content=\"Nowadays more than 80 % of devices in digital forensics labs are tablets, smartphones and phones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T10:31:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:23:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"The Future of Mobile Forensic Hardware\",\"datePublished\":\"2016-04-26T10:31:31+00:00\",\"dateModified\":\"2024-12-11T19:23:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/\"},\"wordCount\":836,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/\",\"name\":\"The Future of Mobile Forensic Hardware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"datePublished\":\"2016-04-26T10:31:31+00:00\",\"dateModified\":\"2024-12-11T19:23:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/the-future-of-mobile-forensic-hardware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Future of Mobile Forensic Hardware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Future of Mobile Forensic Hardware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/","og_locale":"en_US","og_type":"article","og_title":"The Future of Mobile Forensic Hardware","og_description":"Nowadays more than 80 % of devices in digital forensics labs are tablets, smartphones and phones.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-04-26T10:31:31+00:00","article_modified_time":"2024-12-11T19:23:32+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"The Future of Mobile Forensic Hardware","datePublished":"2016-04-26T10:31:31+00:00","dateModified":"2024-12-11T19:23:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/"},"wordCount":836,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/","name":"The Future of Mobile Forensic Hardware","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","datePublished":"2016-04-26T10:31:31+00:00","dateModified":"2024-12-11T19:23:32+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/the-future-of-mobile-forensic-hardware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"The Future of Mobile Forensic Hardware"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=694"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/694\/revisions"}],"predecessor-version":[{"id":14452,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/694\/revisions\/14452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}