Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user’s password and gain access to the contents of the device.
Rainbowboy: How the Mobile IT-Forensic Laboratory Helps German Police Solve Their Cases Faster
Detective Lee Bieber on Digital Forensics Tools for Complex Cases
Binalyze AIR 3.0 Cloud Forensics
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.