Contaminating Evidence ONE

The theoretical question highlighted below was originally posted
on a forum to provide work material for students. Recently the same question
was resurrected again by a student seeking a response to the question for a
test paper?


“What would you do if presented with an exhibit
bag containing a mobile phone (which cannot be fully accessed without a SIM
Card) and a SIM Card (which was not

Comments

Popular posts from this blog

IM Telegram Replay Attack - Android

Appeal case - Boardman - phone evidence/cell site

WhatsApp network forensics