The future of mobile computing forensics analysts

Click For Summary

Discussion Overview

The discussion centers on the future of mobile computing forensics analysis, particularly in the context of computer science education and the challenges faced in the field. Participants explore various aspects of mobile forensics, including its relationship to traditional computer forensics and the implications of privacy and law enforcement debates.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant expresses a desire to write a paper on mobile computing forensics analysis, seeking information and resources.
  • Another participant suggests that mobile forensics includes techniques used in traditional computer forensics, while also questioning what unique features of mobile platforms need to be considered.
  • There is a mention of the ongoing debates regarding privacy versus law enforcement, particularly concerning access to encrypted cellphones, which may be relevant to the participant's research.
  • Participants share links to articles and resources, although some technical issues with URL sharing are noted.

Areas of Agreement / Disagreement

Participants generally agree on the relevance of traditional computer forensics techniques to mobile platforms, but there is an acknowledgment of the unique challenges posed by mobile devices, particularly regarding privacy and law enforcement access. The discussion remains open-ended without a consensus on specific future directions or solutions.

Contextual Notes

There are limitations in the discussion regarding the depth of information available on mobile computing forensics and the specific challenges that may arise from privacy concerns and encryption issues. The technical issues with sharing resources may also affect the flow of information.

Who May Find This Useful

This discussion may be useful for students and professionals interested in mobile computing forensics, computer science education, and the intersection of technology with legal and ethical considerations.

jordynchapin
Messages
2
Reaction score
0
TL;DR
Looking for some info to write a paper(:
Hi there! I am a student in my first semester of undergrad studies for computer science. The first assignment in my CSC class is to write a paper on the future of computer science, which can be broad or niche. My end goal is to get a job in mobile computing forensics analysis, so this is what I want to write it on, but there is not a lot on information I have been able to find online.. is there anyone out there that might have some valuable and interesting info for me? Thanks in advance!
 
Technology news on Phys.org
Welcome to PF!

Mobile computer forensics would include basic computer forensics ie everything you'd do to look at a computer for evidence would likely be used on a mobile platform.

Next what additional features do mobile platforms have that may need to be captured?

This article discusses computer forensics and a little bit of mobile to get you started. Start researching various forensic tasks to understand them better.

https://www.techtarget.com/searchsecurity/definition/computer-forensics
 
  • Like
Likes   Reactions: jordynchapin
jordynchapin said:
My end goal is to get a job in mobile computing forensics analysis,
By "mobile computing", do you mean cellphones? If so, have you read much about the debates over privacy versus law enforcement with respect to gaining access to encrypted cellphones? This link has a number of nice articles on the general subject, with hopefully some links out to other resources for you to read:

1662570833390.png

1662570862028.png

(Looks like you will need to type that URL in by hand in your browser. For some reason when I try pasting it in here, it changes the URL to one of the media items on that page. Sheesh.)
 
Last edited:
  • Like
Likes   Reactions: jordynchapin
berkeman said:
(Looks like you will need to type that URL in by hand in your browser. For some reason when I try pasting it in here, it changes the URL to one of the media items on that page. Sheesh.)
You can paste it with code tags: [ICODE]...[/ICODE]
 
  • Informative
  • Like
Likes   Reactions: jordynchapin and berkeman
berkeman said:
By "mobile computing", do you cellphones? If so, have you read much about the debates over privacy versus law enforcement with respect to gaining access to encrypted cellphones? This link has a number of nice articles on the general subject, with hopefully some links out to other resources for you to read:

View attachment 313878
View attachment 313879
(Looks like you will need to type that URL in by hand in your browser. For some reason when I try pasting it in here, it changes the URL to one of the media items on that page. Sheesh.)
Yes, cellphones! Thank you!
 

Similar threads

  • · Replies 6 ·
Replies
6
Views
3K
  • · Replies 11 ·
Replies
11
Views
3K
Replies
29
Views
5K
  • · Replies 17 ·
Replies
17
Views
4K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 9 ·
Replies
9
Views
4K
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 7 ·
Replies
7
Views
2K
  • · Replies 4 ·
Replies
4
Views
5K