Skip to main content

Mobile Phone Forensics

  • Chapter
  • First Online:
Mobile Phone Security and Forensics

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

More than often in our days, cases go to trial and crimes are solved with the help of evidence taken from the mobile phones and their use. Typical examples of such evidence are the mobile phone’s location (based on the serving base station and/or GPS data), the contacts correlation (based on incoming and outgoing calls), communication content (based on messages and emails send/received/stored), and so on. In this chapter, we will analyze the subject of digital evidence from mobile phones from both the theoretical and the technical side.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harrill DC, Mislan RP (2007) A small scale digital device forensics ontology. Small Scale Digital Device Forensics J 1(1) June 2007

    Google Scholar 

  2. Mislan RP (2010) Cellphone crime solvers. Spectrum, IEEE, 2010;47(7):34–39. doi: 10.1109/MSPEC.2010.5491013

    Google Scholar 

  3. Androulidakis I (2009) Digital evidence in mobile phones. IT security professional magazine, Issue 13, pp 36–39

    Google Scholar 

  4. Gratzer V, Naccache D, Znaty D (2006) Law Enforcement, Forensics and Mobile Communications. In: Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops (PERCOMW ‘06). IEEE Computer Society, Washington, DC, USA, 256-. doi: 10.1109/PERCOMW.2006.73

    Google Scholar 

  5. AlZarouni M (2006) Mobile handset forensic evidence: a challenge for law enforcement, School of Computer and Information Science, Edith Cowan University

    Google Scholar 

  6. International Organization on Computer Evidence Guidelines for Best Practice in the Forensic Examination of Digital Technology. http://www.ioce.org/core.php?ID=5

  7. ACPO Good Practice Guide for Computer-Based Evidence. ACPO. http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence_v4_web.pdf

  8. Jansen W (2007) Guidelines on cell phone forensics. NIST SP 800-101, 2007

    Google Scholar 

  9. Jansen W (2004) Guidelines on PDA forensics. NIST SP 800-72, 2004

    Google Scholar 

  10. McCarthy P (2005) Forensic analysis of mobile phones. University of South Australia, School of Computer and Information Science

    Google Scholar 

  11. Kessler GC (2007) Cell phone analysis. In: DoD cyber crime conference

    Google Scholar 

  12. ISO/IEC 7816-1 (1998) Identification cards—integrated circuit(s) cards with contacts—part 1: physical characteristics

    Google Scholar 

  13. ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the subscriber identity module mobile equipment (SIM ME) interface, May 1997

    Google Scholar 

  14. GPP TS 51.011, Technical Specification Group Core Network and Terminals; Specification of the Subscriber Identity Module – Mobile Equipment (SIM – ME) interface, 2005

    Google Scholar 

  15. Quantaq Solutions (2006) USIMcommander

    Google Scholar 

  16. Ayers R (2007) Cell phone forensic tools: an overview and analysis update. NIST IR 7387, 2007

    Google Scholar 

  17. Ayers R (2006) An overview of cell phone forensic tools. NIST, 2006

    Google Scholar 

  18. Mokhonoana PM, Olivier MS (2007) Acquisition of a Symbian smart phone’s content with an on-phone forensic tool, SATNAC2007

    Google Scholar 

  19. Jansen WA, Delaitre A (2007) Reference material for assessing forensic SIM tools. Paper No. ICCST 2007-74, 2007

    Google Scholar 

  20. Jansen WA, Delaitre A, Moenner L (2008) Overcoming impediments to cell phone forensics. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS ‘08). IEEE Computer Society, Washington, DC, USA, 483-. doi: 10.1109/HICSS.2008.341

    Google Scholar 

  21. Casadei F, Savoldi A, Gubian P (2006) Forensics and SIM cards: an overview. International Journal of Digital Evidence 5(1)

    Google Scholar 

  22. Vedder K (2006) Smart cards. In: ETSI Future Security Workshop: The threats, risks and opportunities, 16–17 January 2006, Sophia Antipolis, France

    Google Scholar 

  23. Vedder K (2007) Smart cards. In: 2nd ETSI Security Workshop: future security, 16–17 January 2007, Sophia Antipolis, France

    Google Scholar 

  24. Mayes KE, Markantonakis K (2008) Smart cards, tokens, security and applications. Springer, New York

    Google Scholar 

  25. Richter T (2002) Chipkarten im Mobilfunk, 2002

    Google Scholar 

  26. Tual J-P (2004) Introduction à la carte à puce. Axalto, 2004

    Google Scholar 

  27. Kanninen A (2000) Emerging problems with smart card technologies, Helsinki University of Technology, 2000

    Google Scholar 

  28. Domingo-Ferrer J, Posegga J, Schreckling D (2006) Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, In: Proceedings Springer 2006, Tarragona, Spain, April 19–21, 2006

    Google Scholar 

  29. Rankl W, Effing W (2004) Smart cards in telecommunications. In: Smart card handbook, 3rd edn. Wiley, New York

    Google Scholar 

  30. Rankl W (2004) Protocol of the communication between SIM and mobile phone. http://www.wrankl.de/UThings/SIM-ME-Communication.pdf. Accessed Dec 2011

  31. Rankl W (2004) Smart card training, some basics about the SIM. http://www.wrankl.de/UThings/SIM.pdf. Accessed Dec 2011

  32. Guo H, Smart cards and their operating systems. HUT, Telecommunications Software and Multimedia Laboratory

    Google Scholar 

  33. ETSI TS 101 220 (2007) Smart cards. ETSI numbering system for telecommunication application providers, 2007

    Google Scholar 

  34. ETSI TS 102 222 (2003) Integrated Circuit Cards (ICC). Administrative commands for telecommunications applications, 2003

    Google Scholar 

  35. Witteman M (2001) Everything you always wanted to know about Smart Cards Black Hat 2001

    Google Scholar 

  36. ITU (2006) ITU-T recommendation E.118. The international telecommunication charge card

    Google Scholar 

  37. Androulidakis I (2010) The mobile phone has a memory and remembers. IT security professional magazine, Issue 14

    Google Scholar 

  38. Willassen SY (2005) Forensic analysis of mobile phone internal memory advances in digital forensics. In: IFIP WG 11.9 conference on digital forensics, 2005

    Google Scholar 

  39. Breeuwsma M, de Jongh M, Klaver C, van der Knijff R, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digital Device Forensics, Vol 1(1)

    Google Scholar 

  40. Al-Zarouni M (2007) Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. In: Proceedings of the 5th Australian digital forensics conference, 2007

    Google Scholar 

  41. IEEE, IEEE 1149.1, IEEE Standard test access port and boundary scan architecture, 2001

    Google Scholar 

  42. Middleton J (2010) Sagem embeds wifi in SIM. http://www.telecoms.com/18192/sagem-embeds-wifi-in-sim

  43. Middleton J (2010) Estonian operator trials SIM-embedded GPS tech. http://www.telecoms.com/17811/estonian-operator-trials-sim-embedded-gps-tech

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this chapter

Cite this chapter

Androulidakis, I.I. (2012). Mobile Phone Forensics. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1650-0_6

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-1649-4

  • Online ISBN: 978-1-4614-1650-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics