skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 222012 Find in a Library
Title: Call for Cell Phone Forensics
Corporate Author: National Law Enforcement and Corrections Technology Center (NLECTC)
United States of America
Date Published: 2008
Page Count: 4
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
National Law Enforcement and Corrections Technology Center (NLECTC)
Gaithersburg, MD 20879
Grant Number: 2005-MU-CX-K077
Sale Source: National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
Document: PDF
Type: Report (Technical Assistance)
Format: Document
Language: English
Country: United States of America
Annotation: This paper outlines the types of evidence that may be found on a cell phone and various methods for collecting it.
Abstract: A cell phone may contain a media card. Standard forensic tools can recover this type of evidence. Subscriber Identity Module (SIM) cards are also present in all phones that contain a global system for mobile (GSM) communications. SIM cards can be read fairly easily, since the type of data on these cards and the manner in which they are stored are defined by GSM standards. Cell phone memory chips located inside the handset use the same type of memory found in compact flash cards and thumb drives; however, the storage of the data is typically proprietary, so standard forensic tools will not usually decipher the data. This makes forensic examinations of cellular phones difficult. Network providers and others who keep data on the use of particular cell phones are also useful sources of forensic information on the use and time of cell phone use. When seizing a cellular phone, investigators must be aware that when a phone is turned on and connected to a provider's network, the data on the phone constantly changes; thus, potential evidence could be lost. Officers who first come into possession of a case-related cell phone must immediately sever a phone's connectivity to a provider network, so as to preserve the current data in the phone. Only proper training will enable officers to use the method that is right for a given situation. It is critical that investigators obtain any keyboard lock codes or PIN codes used to access a phone. The type of cell phone, an investigator's training, and an agency's access to computer hardware and software will dictate the best methods for forensic examination of a particular cell phone.
Main Term(s): Science and Technology
Index Term(s): Computer evidence; Evidence collection; NIJ grant-related documents; Telephone communications; Telephone equipment
Note: Reprinted from TechBeat, Winter 2008; downloaded March 20, 2008.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.