This event is currently being hosted on a separate registration page. Click here to be redirected to the appropriate page.
Forensic Examination of Mobile Device Data
December 09, 2025
Date
Time
Registration Deadline
Wednesday, December 10, 2025Early Bird Discount Deadline
Tuesday, December 09, 2025CLE Easy Pass Eligible?
Y, 1.00 credit(s)Much of our lives is enabled by mobile devices and the online services delivered through them. Devices and services have become rich sources of information when the data they contain are correctly collected and interpreted. Whether assessing the loss of intellectual property, location of a person, or alleged online conduct, the right records can bring answers to critical questions.
This seminar looks at sources for electronic records, how records can be analyzed, and what questions may be answered. We conclude with a case study showing how mobile device information can be used in employment litigation.
- Use of electronic information in litigation
- Native format documents
- Electronic versions of static documents
- Application: analysis for backdated documents
- Email
- Application: the “smoking gun” email
- Electronic versions of static documents
- More complex discovery
- Reconciliation of in-file metadata with filesystem metadata
- Application: when data were copied to a machine
- Photographic images
- Application: a closer look shows in-file metadata in a JPEG image
- Databases, e.g., electronic medical records
- Application: when was an entry made?
- Reconciliation of in-file metadata with filesystem metadata
- Native format documents
- Data on Mobile Devices
- Mobile storage—reading timestamps
- Personal Digital Assistants and apps—proprietary data types
- Phones—call logs, short message service (SMS) data
- Backup and synchronization—phone data on other systems, including Google, Apple, etc.
- Data About Mobile Devices
- Records from cell service providers
- Records from cloud services
- Finding Mobile Devices
- Asking in interrogatories and deposition
- Looking at other available data sources
- Using Mobile Device Data
- Preservation
- Backups and Cloud Copies
- Extraction
- “Full filesystem extraction”
- On-board storage
- External storage
- Analysis of data
- SMS conversations
- Proprietary databases
- Digital photographs, movies, and other attachments
- Proprietary datasets of unknown type
- Review of data
- Production of data, including Cellebrite
- Preservation
- Case Study: Employment Litigation
- “Are we missing text messages?”
- Identifying “text messages”
- Analysis of the matching database
- Establishing timeline of activity
- Establishing gaps in sequence
- Interpreting gaps—deleted?
Presenter:
C. Matthew Curtin, CISSP, Founder, Interhack Corporation
Matthew, Founder of Interhack Corporation, is a computer expert with wide experience in Cybersecurity and Forensic Computing. Experienced expert witness in civil, criminal, administrative, and military proceedings, from the perspective of those bringing and defending actions. Author of technical books and research papers used by universities and standards bodies, and frequent lecturer on cybersecurity and electronic evidence.
1.0 CLE Hours
This CLE will be offered as a live interactive webinar held via Zoom. Login to the website and click the "Register" button to register. You will receive a confirmation email from Zoom containing information about joining the CLE.
You must use your unique link on a desktop/laptop in order to receive CLE credit.
Add-Ons
Speakers
| Name | Organization |
|---|