Skip to main content

Mobile Forensics: An Introduction from Indian Law Enforcement Perspective

  • Conference paper
Information Systems, Technology and Management (ICISTM 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 31))

Abstract

Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones while keeping the size of such devices small enough to fit in a pocket. This led mobile phones to become portable data carriers. This in turn increased the potential for data stored on mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on mobile phones. It also highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of mobile phone evidence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Doran, P.: MDA, 2008- the year of mobile customers (2008), http://www.themda.org/documents/PressReleases/General/_MDA_future_of_mobile_press_release_Nov07.pdf

  2. Canalys. Smart mobile device shipments hit 118 million in 2007, up 53% on 2006 (2007), http://www.canalys.com/pr/2008/r2008021.htm

  3. Aljazeera. Phone Dealers in al-Hariri Probe Net (2005), http://english.aljazeera.net/archive/2005/09/200841014558113928.html

  4. Westtek. ClearVue Suite (2008), http://www.westtek.com/smartphone/

  5. Manfrediz, A.: IDC Press Release. IDC Finds More of the World’s Population Connecting to the Internet in New Ways and Embracing Web 2.0 Activities (2008), http://www.idc.com/getdoc.jsp?containerId=prUS21303808

  6. FoneKey (2008), www.FoneKey.net , http://www.youtube.com/watch?v=qW8MdpZFKUY , http://www.youtube.com/watch?v=BqJiNvQ3xp8 , http://www.youtube.com/watch?v=9eAKvCKanH0

  7. Ducell (2008), http://www.DuCell.org

  8. Mock, D.: Wireless Advances the Criminal Enterprise (2002), http://www.thefeaturearchives.com/topic/Technology/Wireless_Advances_the_Criminal_Enterprise.html

  9. Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell Phone Forensic Tools: An Overview and Analysis (2007), http://csrc.nist.gov/publications/nistir/nistir-7250.pdf

  10. Carrier, B.D.: Risks of Live Digital Forensic Analysis. Communications of the ACM 49(2), 56–61 (2006), http://portal.acm.org/citation.cfm?id=1113034.1113069&coll=GUIDE&dl=GUIDE

    Article  Google Scholar 

  11. Jansen, W., Ayers, R.: Guidelines on PDA Forensics (2004), http://csrc.nist.gov/publications/nistir/nistir-7100-PDAForensics.pdf

  12. Symbian History (2008), http://www.symbian.com/about/overview/history/history.html

  13. Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2006), http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf

  14. Zheng, P., Ni, L.M.: The Rise of the Smart Phone. IEEE Distributed Systems Online, 7(3), art. no. 0603-o3003 (2006)

    Google Scholar 

  15. Espiner, T.: Mobile Phone Forensics ’Hole’ Reported (2006), http://news.zdnet.co.uk/hardware/0,1000000091,39277347,00.htm

  16. McCarthy, P.: Forensic Analysis of Mobile Phones. Unpublished Bachelor of Computer and Information Science (Honours) Degree, University of South Australia, Adelaide (2005)

    Google Scholar 

  17. Jansen, W.: Mobile Device Forensic Software Tools. In: Techno Forensics 2005, Gaithersburg, MD, USA (2005)

    Google Scholar 

  18. SWGDE. SWGDE and SWGIT Digital & Multimedia Evidence Glossary (2006), http://www.swgde.org/documents/swgde2005/SWGDE%20and%20SWGIT%20Combined%20Master%20Glossary%20of%20Terms%20-July%2020.pdf

  19. Ghosh, A.: Guidelines for the Management of IT Evidence (2004), http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN016411.pdf

  20. ACPO. Good Practice Guide for Computer based Electronic Evidence (2003), http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf

  21. IOCE. Best Practice Guidelines for Examination of Digital Evidence (2002), http://www.ioce.org/2002/Guidelines%20for%20Best%20Practices%20in%20Examination%20of%20Digital%20Evid.pdf

  22. USSS. Best Practices for Seizing Electronic Evidence (2006), http://www.ustreas.gov/usss/electronic_evidence.shtml

  23. NIJ. Electronic Crime Scene Investigation: A Guide for First Responders (2001), http://www.ncjrs.gov/pdffiles1/nij/187736.pdf

  24. Keizer, G.: First Mobile Phone Java Trojan on the Loose (2006), http://www.crn.com.au/story.aspx?CIID=35467&r=rstory

  25. CCIPS. Searching and Seizing Computers and Related Electronic Evidence Issues (2002), http://www.usdoj.gov/criminal/cybercrime/searching.html

  26. Mellars, B.: Forensic Examination of Mobile Phones. Digital Investigation: The International Journal of Digital Forensics & Incident Response 1(4), 266–272 (2004)

    Article  Google Scholar 

  27. Becker, D.: Toshiba Reports Battery Breakthrough (2005), http://news.com.com/2061-10786_3-5649141.html?tag=nl

  28. Long, M.: Airborne Viruses: Real Threat or Just Hype (2005), http://www.newsfactor.com/story.xhtml?story_id=12100002P4HM

  29. McAfee Mobile Security Report (2008), http://www.mcafee.com/mobile

  30. The Information Technology Act 2000, India (2000), http://www.legalserviceindia.com/cyber/itact.html

  31. Yahoo News India. The Arushi Murder Case: CBI says it has found the evidence (2008), http://in.news.yahoo.com/32/20080731/1053/tnl-aarushi-case-cbi-says-it-has-found-e_1.html

  32. Helplinelaw, Pramod Mahajan Murder Trial: SMS cannot be valid evidence, says defence (2007), http://news.helplinelaw.com/1207/echo12.php

  33. Telecom Paper (2008), http://www.telecompaper.com/news/article.aspx?cid=647427

  34. Ahmed, R., Dharaskar, R.V.: MFL3G: Mobile Forensics Library for digital analysis and reporting of mobile devices for collecting digital evidence. In: 2nd Asia Pacific Mobile Learning & Edutainment Conference 2008, PWTC Kuala Lumpur, Malaysia (2008)

    Google Scholar 

  35. Ahmed, R., Dharaskar, R.V.: MFL3G: An Open Source Mobile Forensics Library For Digital Analysis And Reporting Of Mobile Devices For Collecting Digital Evidence, An Overview From Windows Mobile OS Perspective. In: International Conference on Advanced Computing Technologies (ICACT 2008), GRIET, Hyderabad, India (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmed, R., Dharaskar, R.V. (2009). Mobile Forensics: An Introduction from Indian Law Enforcement Perspective. In: Prasad, S.K., Routray, S., Khurana, R., Sahni, S. (eds) Information Systems, Technology and Management. ICISTM 2009. Communications in Computer and Information Science, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00405-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00405-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00404-9

  • Online ISBN: 978-3-642-00405-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics