The purpose of this work is to be able to break down techniques that are used to
carry out forensic analysis of mobile devices, to be more specific in those that use the
Android operating system.
On the other hand, it has the purpose of being able to make a comparison between
the Spanish expert system which was learned in class and the Chilean expert system.
In the same way, a chain of custody is proposed for computer evidence of mobile
devices, since, as we can see, the analysis of the evidence does not start with the delivery of the device to the analyst, but starts from when the device is seized and if care is not taken with such evidence in its treatment from the ning, the results will not always be as expected.
Knowing that the challenge is great, is not an excuse to start working on the future
and present of cybersecurity and thinking that the growth of the mobile device market
is higher than computers, is that I do this work, as we will see, we will have to get used to the use of this type of device and the way in which the information is ed and d is not always the same, so it seems to me entirely appropriate to understand this analysis.