StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reliability of Mobile Phone Forensic Evidence - Essay Example

Cite this document
Summary
From the paper "Reliability of Mobile Phone Forensic Evidence", mobile forensics is still in its infancy, and analyzing mobile phones for forensic evidence is a cry from the traditional computer forensics models used for extracting evidence from computers, which is now well known to forensic science…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Reliability of Mobile Phone Forensic Evidence
Read Text Preview

Extract of sample "Reliability of Mobile Phone Forensic Evidence"

? Summary Week – 2 Due to the widespread usage of mobile phones in the U.S.A. digital evidence is gaining in importance. This can be garnered from the fact that almost 80% of all court cases have an element of digital evidence associated with them. For digital evidence from mobile phones to be useful in these legal procedures, the evidence has to be extracted in a sound manner. However, mobile forensics is still in its infancy and analyzing mobile phones for forensic evidence is a far cry from the traditional computer forensics models used for extracting evidence from computers, which is now well known to forensic science. From the perspective of reliability of mobile phone forensic evidence, the Daubert Guidelines play an important part. Tool testing and error rates find focus in the initial part of the guidelines. The use of a database approach for the documentation of the mobile forensics procedures assists in removing the documentation of testing methods employed, by acquiring results on the several test cases, enabling calculation of tool testing errors. This information enables the presenting of mobile forensic evidence in courts in a reliable and legally acceptable manner (Baggili et al, 2007). The practitioners of computer forensic quite often need to deal with digital images as a part of the evidence requirements. Such instances include child pornography or disputes involving proprietary rights. Photographic images found in computers have a strong likelihood of having originated from digital still cameras (DSC). Computer forensic practitioners should have an understanding of the characteristics of computer images to identify the origins of the DSC images in question. This understanding enables a computer forensic practitioner to use the specific attributes of a DSC image to prove replicas, derivates or additional images within a particular group. Some open source software can also be employed successfully to extract images based upon the characteristics of a DSC image (Kohen, 2007). Week – 3 The usage of the iPhone mobile from Apple is growing rapidly. This has led to the need for iPhone forensics as a part of the armory of forensic and security practitioners. This study shows that it is possible to examine the logical back up acquisition of the iPhone 3GS mobile device using the Apple iTunes back up utility to provide forensically important data in the form of e-mail messages, text and multimedia messages, calendar events browsing history, GPRS locations, contacts, call history, and voicemail recording. The study explored the possibility of forensic acquisition, examination and analysis of the backup of the logical copy in the iPhone 3GS mobile. In the examination process the aim was to find out what significant data was stored in the on the device, location of its storage in the memory, and where the data is located in the back up files. For the acquisition the freely available iTunes back up utility was used in a systematic manner to synchronize data between the iPhone and a paired computer. Testing of this methodology demonstrated that an iPhone mounted on a computer running iTunes does not change the user data portion, which means that data integrity remains intact. When a logical copy is acquired, several hundred backup files containing user data, device settings, application preferences, and status are obtained. All these back up files are encoded into XML, ASCII, or binary formats. Examination of the logical copy from an iPhone reveals that these back up files contain a wealth of data that has the potential for use as evidence in court cases (Baggili & Bader, 2010). Week – 4 Amendments made to the Federal Rules of Civil Procedure effective from December 1, 2006, addresses the issue of Electronically Stored Information (ESI), which also takes into consideration ESI found in small digital devices, like cell phones and Personnel Digital Assistants and their use as evidenced in court procedures. The standards employed for the admissibility of electronic evidence are found in the Frye Test, the Rules of evidence, The Daubert Test, and the Rules of Civil Procedure. Thus, the procedures employed in the preservation, collection, examination, and production of evidence must withstand these tests (Hendricks, 2008). The growing use of small scale devices has had the consequence of the development of mobile device analysis tools and techniques, resulting in the field of digital forensics. The field of digital forensics will grow as the use of small scale devices increases and moire evidence and information can be evinced from them. Turing aside from the information and evidence that is available in these devices will cause the charge of negligence and incomplete investigation. Given the wide variety of small scale devices, tool kit manufacturers will be hard put to interface every device. It may be extremely useful for the development of a selection of tools that cover as many devices as possible, and make this selection of tools available to the digital forensic examiners (Punja & Mislan, 2008). Evidence from earlier research has suggested that mobile devices internal has values are variable, when attempting back-to-back acquisitions. Hash values are useful to digital forensic examiners through their ability features to filter known data files, match data across platforms, and prove that integrity has been retained intact. Research taken up at Purdue University targeted the comparison of known hash values with reported values for data objects populated onto mobile devices, employing different transmission methods. The findings of the research showed that while in the majority of the tests uniformity was observed variability was observed in the has values reported for data objects transferred via Multimedia Messaging Service (MMS) (Danker, Ayers & Mislan, 2009). Week – 5 Developments in the field of cell phone technology have led to similarities in the functional ability of cell phones with computers. However, the organization and operation in cell phones is different. Cell phones use a flash memory and not a hard disk, and contain embedded software to enable them to do their specific functions, rather than operating system software. Differences like these make it difficult to employ computer forensic techniques to these devices and call for the development of cell phone forensics. There are however two impediments to the development of cell phone forensics, consisting of the limited coverage of available cell phone forensic tools and the insufficient means that are available for the validation of the correct functioning of the tools. Phone manager protocol filtering and the populating of SIM cards are two techniques that offer scope for overcoming these two impediments to the development of cell phone forensics (Jansen, Delaitre & Moenner, 2008). Several tools have been developed for the extraction of data objects (SWGDE) from SIM cards. However, a major portion of these tools are proprietary, or use of which is restricted to law enforcement agencies. This runs against the grain of the Daubert Test for acceptability from the scientific community. The SIMbrush is a forensic imaging tool for SIM/USIM cards of an open source nature valuable to forensic science with the capacity of extracting all observable memory and non-standard files present in these cards. It provides the advantages of extraction of the full file system in SIM/USIM cards; uncovers several non-standard files; executable simultaneously in several instances on the same machine without overloading the system and presents its output in a standard textual XML representation. However it carries two disadvantages in that the time required for brushing a SIM/USIM card in full extraction mode goes beyond an hour for most of these cards and it is not capable of extracting the body of those files that have ADM or NEV access conditions (Casadei, Savoldi & Gubian, 2006). Literary References Baggili, I. M. & Bader, M. (2010). iPhone 3GS Forensics: Logical Analysis using Apple iTunes Backup Utility. Advanced Cyber Forensics Research Laboratory, Zayed University. Baggili, I. M., Mislan, R. & Rogers, M. (2007). Mobile Phone Forensics Tool Testing: A Database Driven Approach. International Journal of Digital Evidence, 6(2), Casadei, F., Savoldi, A. & Gubian, P. (2006). Forensics and SIM Cards: An Overview. International Journal of Digital Evidence, 5(1), 1-21. Danker, S., Ayers, R. & Mislan, R. P. (2009). Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 3(1), 1-5. Hendricks, R. (2008). Admissibility of Small Scale Digital Devices in U.S. Civil Litigation. Small Scale Digital Device Forensics Journal, 2(1), 1-4. Jansen, W., Delaitre, A. & Moenner, L. (2008). Overcoming Impediments to Cell Phone Forensics. Proceedings of the 41st Hawaii International Conference on System Sciences – 2008, p.1-9. Kohen, C. (2007). Digital Still camera Forensics. Small Scale Digital Device Forensics Journal, 1(1), 1-7. Punja, S. G. & Mislan, R. P. (2008). Mobile Device Analysis. . Small Scale Digital Device Forensics Journal, 2(1), 1-16. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1404890-summary
(Summary Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/environmental-studies/1404890-summary.
“Summary Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/environmental-studies/1404890-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reliability of Mobile Phone Forensic Evidence

Legal Issues Relevant to the Quality of the Website

Legal Issues Relevant to the Quality of the Website ... he use of internet has gained much currency in the recent past especially for commercial purposes.... Internet technology has been widely adapted and accepted as one of the main components of marketing strategy in business (Miller, 2006, p....
12 Pages (3000 words) Essay

Potential Security Threats and Challenges for Hybrid Cloud Solution

Nature of Internet Activists ... nlike traditional hackers, internet activists seek to influence policies of governments or corporations across the globe.... Secondly, internet activist use a variety of information which can assist them to use the internet effectively for their cause, such as outreach, and advocacy tools....
13 Pages (3250 words) Coursework

SSDD Forensics Issues

Civil Litigation… The types of data (digital evidence) can be found on a memory card are pictures, movies, audio Files, and documents.... Logical backups are considered a rich source of data files that can help build evidence.... The author describes the similarities and differences between computer forensics and SSDD forensics, carving methodology, the logical acquisition approach, evidential data/information that can be extracted from the iPhone's iTunes backup and admissibility of SSDD in U....
4 Pages (1000 words) Essay

Home Burglaries and Forensic Evidence

This paper examines the role of forensic evidence with regards to the crime of home burglaries.... Research on the role of forensic evidence in solving residential burglaries showed it has little or no impact at all on the actual criminal case outcomes.... hellip; Current judicial process and police investigative work does not give much weight to the use of forensic scientific methods in identifying suspects, making arrests, filing for the prosecution of the case and eventual conviction of the crime for the perpetrators....
4 Pages (1000 words) Term Paper

New Laws have Changed Criminal Investigators Over Time

New laws have been made giving the law enforcement agencies more and more powers in the collection of electronic communication data such as mobile phone records, internet usage, instant messaging, making the collection of gathering evidence that would stand up in a court of law and ensure conviction of those charged with different crimes.... Equipping the Criminal Investigator - Laws that Have Changed the Game First name, last name Subject Professor Submission Date Equipping the Criminal Investigator - Laws that Have Changed the Game Abstract Over the past few years there have been numerous advances in the way criminal investigations are carried out, mainly in the area of technologies being used in the gathering and analysis of material used as evidence in the prosecution of criminal offenders....
4 Pages (1000 words) Assignment

3D Crime Mapping Technology

Despite the fact that the utilization of mapping within the criminal justice system has swelled in the recent past, a good number of crime mapping tools and instruments can only display information and details of a felony after it has occurred.... hellip; CRIME MAPPING Abstract Despite the fact that the utilization of mapping within the criminal justice system has swelled in the recent past, a good number of crime mapping tools and instruments can only display information and details of a felony after it has occurred....
12 Pages (3000 words) Assignment

Comparing Paper Forms, Labelled Buttons and Speech Recognition

This integrity and reliability of data is technically termed as warrant and if there is any serious doubt over the warrant there is subsequently serious doubt over the legitimacy of either the data or the claim, both of which can be called into question on the basis of a dubious warrant (Baber et al, 2006).... his paper investigates how evidence collected from a crime scene can be successfully collated to point at the criminal/criminals and get positive conviction where such convection is justified under existing laws....
10 Pages (2500 words) Essay

Messaging Apps Accusation Via Wireless Connection

Cyber attacks can involve a large number of hosts; requiring intelligent forensic analysts to reveal the evidence and to link this evidence together (Wang, 2010).... The investigator must work with specialized devices such as routers, firewall, IPS, and IDS on the network; as well as dealing with a great deal of data to come up with evidence that is reliable, consistent, not misleading, or tampered with to make the case stronger when presented to the court....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us