FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Bypassing Locked Smartphones - Are you really locked out?
- Tuesday, November 12th, 2013 at 3:00 PM EST (20:00:00 UTC)
- Heather Mahalik
You can now attend the webcast using your mobile device!
Today's smartphone forensic examinations can be halted by a simple lock on a smartphone. The question is - are you really locked out? Directly from our new course material from "FOR585 Advanced Smartphone and Mobile Device Forensics" we will discuss issues pertaining to locked smartphones. What data is accessible on locked smartphones? What if the data is encrypted? How can you forensically access the data? Will the decoding and parsing be affected by the type of lock the smartphone is using?
This webcast will highlight the various locks used on smartphones and will answer the underlying questions on what capabilities currently exist and how to get inside a locked smartphone. The upcoming FOR585 breaks down the issues such as locks and encryption on each smartphone, this webcast simply provides an overview of what you will learn in the course.
To say that digital forensics is central to Heather Mahalik's life is quite the understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to Osama Bin Laden's media. She has helped law enforcement, eDiscovery firms, and the federal government extract and manually decode artifacts used in solving investigations around the world.
All told she has more than 14 years of experience in digital forensics, including eight years focused on mobile forensics - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used. Heather's background in digital forensics and e-discovery covers smartphone, mobile device, and Windows forensics, including acquisition, analysis, advanced exploitation, vulnerability discovery, malware analysis, application reverse-engineering, and manual decoding, as well as instruction on mobile devices, smartphones, and computers covering Windows, Linux and Macintosh operating systems.
Heather previously led the mobile device team for Basis Technology, where she focused on mobile device exploitation in support of the federal government. She also worked as a forensic examiner at Stroz Friedberg and the U.S. State Department Computer Investigations and Forensics Lab, where she handled a number of high-profile cases. She has also developed and implemented forensic training programs and standard operating procedures.