Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
SIM cards as part of smart cards are considered one of the elements found in every mobile phone either smartphone or not. They are used to communicate through the telephone network. SIM cards can be used to track the mobile or to extract user’s data like SMS or phonebook. Moreover, criminal cases involving mobile phone activities are increasing. Therefore, mobile security and analysis is important during the investigation.
We will emphasize on all the elements related to SIM cards. These elements are the differences between its communication protocols, SIM card application development environment, and SIM card file structure including the file meta-data. We will also describe in detail how to communicate with SIM card and extract information which can help with criminal investigation. In this research, we also investigate the SMS forensics and how we can use this information to track user’s activities during a certain period of time.
- 2.Casadei, F., Savoldi, A., & Gubian, P. (2006). Forensics and SIM cards: An overview. International Journal of Digital Evidence, 5(1), 1–21.Google Scholar
- 3.ETSI, T., 100 901 V7.5.0. (2001). Digital cellular telecommunications systems (Phase 2+), technical realization of the short message service (SMS) point-to-point (PP), European Telecommunications Standards Institute, Technical Specification.Google Scholar
- 4.ETSI, T., 100 916 V7.8.0. (2003). Digital cellular telecommunications system; AT command set for GSM Mobile Equipment (ME), European Telecommunications Standards Institute.Google Scholar
- 5.ETSI, T., 143 019 V5.6.0. (2003). Digital cellular telecommunications system (Phase 2+); Subscriber Identity Module Application Programming Interface (SIM API) for Java Card; ETSI Standards, European Telecommunications Standards Institute, Technical Specification.Google Scholar
- 6.ETSI, T., 131 102 V4.15.0. (2005). Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM application, European Telecommunications Standards Institute.Google Scholar
- 7.ETSI, T., 100 977 v8.14.0. (2007). Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface. ETSI Standards, European Telecommunications Standards Institute, Technical Specification.Google Scholar
- 8.Guo, H., Smart cards and their operating systems.Google Scholar
- 9.Ibrahim, N., Al Naqbi, N., Iqbal, F., & AlFandi, O. (2016). SIM Card Forensics: Digital Evidence.Google Scholar
- 10.I. Oracle. Java card technology. http://www.oracle.com/technetwork/java/embedded/javacard/overview/getstarted-1970079.html. Accessed 30 Jan 2017.
- 11.I. Sun Microsystems. (1998). Java Card Applet Developer’s Guide. Palo Alto: Sun Microsystems Inc. Revision 1.10, 17 July 1998.Google Scholar
- 12.Jansen, W., & Ayers, R. (2006, January). Forensic software tools for cell phone subscriber identity modules. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 93). Association of Digital Forensics, Security and Law.Google Scholar
- 13.Jansen, W.A., & Delaitre, A. (2007, October). Reference material for assessing forensic SIM tools. Security Technology, 2007 41st Annual IEEE International Carnahan Conference on Security Technology (pp. 227–234). IEEE.Google Scholar
- 14.Osmocom. Osmocom simtrace, http://bb.osmocom.org/trac/wiki/SIMtrace. Accessed 30 Jan 2017.
- 15.Rankl, W., & Effing, W. (2004). Smart card handbook. New York: Wiley.Google Scholar
- 16.Thakur, R., Chourasia, K., & Singh, B. (2012). Cellular phone forensics. International Journal of Scientific and Research Publications, 2(8), 233–326.Google Scholar