Summary

In this chapter, we've covered the basics of mobile forensics. We discussed the amount of evidence available in today's mobile devices and covered the general steps of mobile forensics. We also discussed how to seize, handle, and store mobile devices, and looked at how criminals can use technology to prevent forensic access. We provided a general overview of the acquisition and analysis steps. In the next chapter, we'll discuss acquisition methods in more detail. We'll overview different acquisition methods and techniques, and look at their applicability in different situations.