New and modern capabilities in cellular know-how are always rising. Individuals have turn out to be depending on their cellphones for these capabilities. Individuals use their smartphones for voice communications, resembling to ship and obtain messages. Additionally they use smartphones to speak, file share, and ship emails. Additionally they use cellular know-how for on-line banking, in addition to different cost strategies. Crimes have elevated attributable to our dependence on cell telephones. Cybercriminals use viruses, for instance, to commit fraud and steal. Hackers use malware to contaminate folks’s smartphones with malware, which permits them entry to delicate knowledge they will then exploit to additional their very own egocentric ends. Notably, criminals might be suspected although they’re protected by the Fourth Modification. This prohibits legislation enforcement from unnecessarily looking or seizing objects. Nonetheless, cellphones are seized and analyzed. This course of contains 4 steps: the system being seized, an evaluation of collected knowledge, duplicate onerous drive, data acquisition and presentation of findings. This course of will not be with out its challenges. The forensic specialists face many challenges, together with {hardware} variations, lack of instruments for assessing sure units and anti-forensic methods that may hinder knowledge extraction.