Advertisement

Experimental Digital Forensics of Subscriber Identification Module (SIM) Card

  • Mohamed T. AbdelazimEmail author
  • Nashwa Abdelbaki
  • Ahmed F. Shosha
Chapter

Abstract

SIM cards as part of smart cards are considered one of the elements found in every mobile phone either smartphone or not. They are used to communicate through the telephone network. SIM cards can be used to track the mobile or to extract user’s data like SMS or phonebook. Moreover, criminal cases involving mobile phone activities are increasing. Therefore, mobile security and analysis is important during the investigation.

We will emphasize on all the elements related to SIM cards. These elements are the differences between its communication protocols, SIM card application development environment, and SIM card file structure including the file meta-data. We will also describe in detail how to communicate with SIM card and extract information which can help with criminal investigation. In this research, we also investigate the SMS forensics and how we can use this information to track user’s activities during a certain period of time.

References

  1. 1.
    AbdelAzim, M. (2016). Simanalyzer tool. https://github.com/Tabaz/SIMAnalyzer. Accessed 30 Jan 2017.Google Scholar
  2. 2.
    Casadei, F., Savoldi, A., & Gubian, P. (2006). Forensics and SIM cards: An overview. International Journal of Digital Evidence, 5(1), 1–21.Google Scholar
  3. 3.
    ETSI, T., 100 901 V7.5.0. (2001). Digital cellular telecommunications systems (Phase 2+), technical realization of the short message service (SMS) point-to-point (PP), European Telecommunications Standards Institute, Technical Specification.Google Scholar
  4. 4.
    ETSI, T., 100 916 V7.8.0. (2003). Digital cellular telecommunications system; AT command set for GSM Mobile Equipment (ME), European Telecommunications Standards Institute.Google Scholar
  5. 5.
    ETSI, T., 143 019 V5.6.0. (2003). Digital cellular telecommunications system (Phase 2+); Subscriber Identity Module Application Programming Interface (SIM API) for Java Card; ETSI Standards, European Telecommunications Standards Institute, Technical Specification.Google Scholar
  6. 6.
    ETSI, T., 131 102 V4.15.0. (2005). Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM application, European Telecommunications Standards Institute.Google Scholar
  7. 7.
    ETSI, T., 100 977 v8.14.0. (2007). Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface. ETSI Standards, European Telecommunications Standards Institute, Technical Specification.Google Scholar
  8. 8.
    Guo, H., Smart cards and their operating systems.Google Scholar
  9. 9.
    Ibrahim, N., Al Naqbi, N., Iqbal, F., & AlFandi, O. (2016). SIM Card Forensics: Digital Evidence.Google Scholar
  10. 10.
  11. 11.
    I. Sun Microsystems. (1998). Java Card Applet Developer’s Guide. Palo Alto: Sun Microsystems Inc. Revision 1.10, 17 July 1998.Google Scholar
  12. 12.
    Jansen, W., & Ayers, R. (2006, January). Forensic software tools for cell phone subscriber identity modules. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 93). Association of Digital Forensics, Security and Law.Google Scholar
  13. 13.
    Jansen, W.A., & Delaitre, A. (2007, October). Reference material for assessing forensic SIM tools. Security Technology, 2007 41st Annual IEEE International Carnahan Conference on Security Technology (pp. 227–234). IEEE.Google Scholar
  14. 14.
    Osmocom. Osmocom simtrace, http://bb.osmocom.org/trac/wiki/SIMtrace. Accessed 30 Jan 2017.
  15. 15.
    Rankl, W., & Effing, W. (2004). Smart card handbook. New York: Wiley.Google Scholar
  16. 16.
    Thakur, R., Chourasia, K., & Singh, B. (2012). Cellular phone forensics. International Journal of Scientific and Research Publications, 2(8), 233–326.Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Mohamed T. Abdelazim
    • 1
    Email author
  • Nashwa Abdelbaki
    • 1
  • Ahmed F. Shosha
    • 1
  1. 1.Nile UniversityCairoEgypt

Personalised recommendations