SMIRK: SMS Management and Information Retrieval Kit

  • Ibrahim Baggili
  • Ashwin Mohan
  • Marcus Rogers
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 31)


There has been tremendous growth in the information environment since the advent of the Internet and wireless networks. Just as e-mail has been the mainstay of the web in its use for personal and commercial communication, one can say that text messaging or Short Message Service (SMS) has become synonymous with communication on mobile networks. With the increased use of text messaging over the years, the amount of mobile evidence has increased as well. This has resulted in the growth of mobile forensics. A key function of digital forensics is efficient and comprehensive evidence analysis which includes authorship attribution. Significant work on mobile forensics has focused on data acquisition from devices and little attention has been given to the analysis of SMS. Consequentially, we propose a software application called: SMS Management and Information Retrieval Kit (SMIRK). SMIRK aims to deliver a fast and efficient solution for investigators and researchers to generate reports and graphs on text messaging. It also allows investigators to analyze the authorship of SMS messages.


Cyber forensics cellular phone forensics forensic tools SMS authorship attribution post-hoc forensic analysis 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    McKenna, K., Green, A., Gleason, M.: Relationship formation on the Internet: What’s the big attraction. Journal of Social Issues 58(1), 9–31 (2002)CrossRefGoogle Scholar
  2. 2.
    The Independent, Dr Tim Grant: How text-messaging slips can help catch murderers (retrieved November 29) (2008),
  3. 3.
    Cellular-news, SMS as a tool in murder investigations (retrieved November 24) (2008),
  4. 4.
    Ayers, R., Jansen, W., Delaitre, A., Moenner, L.: Cell Phone Forensics Tools: An Overview and Analysis Update, NIST Interagency Report (IR) 7387 (February 2007)Google Scholar
  5. 5.
    Lee, F.: SMS Shortform Identification and Codec. National University of Singapore Thesis (2005), (retrieved May 21, 2009 )
  6. 6.
    Viégas, F.B., Golder, S., Donath, J.: Visualizing Email Content: Portraying Relationships from Conversational Histories. Long paper, CHI 2006 (2006)Google Scholar
  7. 7.
    de Vel, O., et al.: Mining E-Mail Content for Author Identification Forensics. SIGMOD Record 30(4), 55–64 (2001)CrossRefGoogle Scholar
  8. 8.
    de Vel, O., Corney, M., Anderson, A., Mohay, G.: Language and Gender Author Cohort Analysis of E-mail for Computer Forensics. In: Digital Forensic Research Workshop, Syracuse, NY, August 7-9 (2002)Google Scholar
  9. 9.
    Stolfo, S.J., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.: Behavior Profiling of Email. In: Proc. of NSF/NIJ Symposium on Intelligence & Security Informatics (2003)Google Scholar
  10. 10.
    Netling, The netlingo list of acronyms & text messaging shorthand (retrieved May 21) (2009),
  11. 11.
    UzZaman, N., Khan, M.: T12: An Advanced Text Input System with Phonetic Support for Mobile Devices. In: 2nd International Conference on Mobile Technology, Applications and Systems, pp. 1–7 (2005)Google Scholar
  12. 12.
    Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)Google Scholar
  13. 13.
    SimMetrics: Open Source Similarity Measure Library,

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Ibrahim Baggili
    • 1
  • Ashwin Mohan
    • 2
  • Marcus Rogers
    • 2
  1. 1.Zayed UniversityAbu DhabiUnited Arab Emirates
  2. 2.Purdue UniversityWest LafayetteUSA

Personalised recommendations