Abstract
More than often in our days, cases go to trial and crimes are solved with the help of evidence taken from the mobile phones and their use. Typical examples of such evidence are the mobile phone’s location (based on the serving base station and/or GPS data), the contacts correlation (based on incoming and outgoing calls), communication content (based on messages and emails send/received/stored), and so on. In this chapter, we will analyze the subject of digital evidence from mobile phones from both the theoretical and the technical side.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Harrill DC, Mislan RP (2007) A small scale digital device forensics ontology. Small Scale Digital Device Forensics J 1(1) June 2007
Mislan RP (2010) Cellphone crime solvers. Spectrum, IEEE, 2010;47(7):34–39. doi: 10.1109/MSPEC.2010.5491013
Androulidakis I (2009) Digital evidence in mobile phones. IT security professional magazine, Issue 13, pp 36–39
Gratzer V, Naccache D, Znaty D (2006) Law Enforcement, Forensics and Mobile Communications. In: Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops (PERCOMW ‘06). IEEE Computer Society, Washington, DC, USA, 256-. doi: 10.1109/PERCOMW.2006.73
AlZarouni M (2006) Mobile handset forensic evidence: a challenge for law enforcement, School of Computer and Information Science, Edith Cowan University
International Organization on Computer Evidence Guidelines for Best Practice in the Forensic Examination of Digital Technology. http://www.ioce.org/core.php?ID=5
ACPO Good Practice Guide for Computer-Based Evidence. ACPO. http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence_v4_web.pdf
Jansen W (2007) Guidelines on cell phone forensics. NIST SP 800-101, 2007
Jansen W (2004) Guidelines on PDA forensics. NIST SP 800-72, 2004
McCarthy P (2005) Forensic analysis of mobile phones. University of South Australia, School of Computer and Information Science
Kessler GC (2007) Cell phone analysis. In: DoD cyber crime conference
ISO/IEC 7816-1 (1998) Identification cards—integrated circuit(s) cards with contacts—part 1: physical characteristics
ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the subscriber identity module mobile equipment (SIM ME) interface, May 1997
GPP TS 51.011, Technical Specification Group Core Network and Terminals; Specification of the Subscriber Identity Module – Mobile Equipment (SIM – ME) interface, 2005
Quantaq Solutions (2006) USIMcommander
Ayers R (2007) Cell phone forensic tools: an overview and analysis update. NIST IR 7387, 2007
Ayers R (2006) An overview of cell phone forensic tools. NIST, 2006
Mokhonoana PM, Olivier MS (2007) Acquisition of a Symbian smart phone’s content with an on-phone forensic tool, SATNAC2007
Jansen WA, Delaitre A (2007) Reference material for assessing forensic SIM tools. Paper No. ICCST 2007-74, 2007
Jansen WA, Delaitre A, Moenner L (2008) Overcoming impediments to cell phone forensics. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS ‘08). IEEE Computer Society, Washington, DC, USA, 483-. doi: 10.1109/HICSS.2008.341
Casadei F, Savoldi A, Gubian P (2006) Forensics and SIM cards: an overview. International Journal of Digital Evidence 5(1)
Vedder K (2006) Smart cards. In: ETSI Future Security Workshop: The threats, risks and opportunities, 16–17 January 2006, Sophia Antipolis, France
Vedder K (2007) Smart cards. In: 2nd ETSI Security Workshop: future security, 16–17 January 2007, Sophia Antipolis, France
Mayes KE, Markantonakis K (2008) Smart cards, tokens, security and applications. Springer, New York
Richter T (2002) Chipkarten im Mobilfunk, 2002
Tual J-P (2004) Introduction à la carte à puce. Axalto, 2004
Kanninen A (2000) Emerging problems with smart card technologies, Helsinki University of Technology, 2000
Domingo-Ferrer J, Posegga J, Schreckling D (2006) Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, In: Proceedings Springer 2006, Tarragona, Spain, April 19–21, 2006
Rankl W, Effing W (2004) Smart cards in telecommunications. In: Smart card handbook, 3rd edn. Wiley, New York
Rankl W (2004) Protocol of the communication between SIM and mobile phone. http://www.wrankl.de/UThings/SIM-ME-Communication.pdf. Accessed Dec 2011
Rankl W (2004) Smart card training, some basics about the SIM. http://www.wrankl.de/UThings/SIM.pdf. Accessed Dec 2011
Guo H, Smart cards and their operating systems. HUT, Telecommunications Software and Multimedia Laboratory
ETSI TS 101 220 (2007) Smart cards. ETSI numbering system for telecommunication application providers, 2007
ETSI TS 102 222 (2003) Integrated Circuit Cards (ICC). Administrative commands for telecommunications applications, 2003
Witteman M (2001) Everything you always wanted to know about Smart Cards Black Hat 2001
ITU (2006) ITU-T recommendation E.118. The international telecommunication charge card
Androulidakis I (2010) The mobile phone has a memory and remembers. IT security professional magazine, Issue 14
Willassen SY (2005) Forensic analysis of mobile phone internal memory advances in digital forensics. In: IFIP WG 11.9 conference on digital forensics, 2005
Breeuwsma M, de Jongh M, Klaver C, van der Knijff R, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digital Device Forensics, Vol 1(1)
Al-Zarouni M (2007) Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. In: Proceedings of the 5th Australian digital forensics conference, 2007
IEEE, IEEE 1149.1, IEEE Standard test access port and boundary scan architecture, 2001
Middleton J (2010) Sagem embeds wifi in SIM. http://www.telecoms.com/18192/sagem-embeds-wifi-in-sim
Middleton J (2010) Estonian operator trials SIM-embedded GPS tech. http://www.telecoms.com/17811/estonian-operator-trials-sim-embedded-gps-tech
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Androulidakis, I.I. (2012). Mobile Phone Forensics. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1650-0_6
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-1649-4
Online ISBN: 978-1-4614-1650-0
eBook Packages: EngineeringEngineering (R0)