Abstract
Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones while keeping the size of such devices small enough to fit in a pocket. This led mobile phones to become portable data carriers. This in turn increased the potential for data stored on mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on mobile phones. It also highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of mobile phone evidence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Doran, P.: MDA, 2008- the year of mobile customers (2008), http://www.themda.org/documents/PressReleases/General/_MDA_future_of_mobile_press_release_Nov07.pdf
Canalys. Smart mobile device shipments hit 118 million in 2007, up 53% on 2006 (2007), http://www.canalys.com/pr/2008/r2008021.htm
Aljazeera. Phone Dealers in al-Hariri Probe Net (2005), http://english.aljazeera.net/archive/2005/09/200841014558113928.html
Westtek. ClearVue Suite (2008), http://www.westtek.com/smartphone/
Manfrediz, A.: IDC Press Release. IDC Finds More of the World’s Population Connecting to the Internet in New Ways and Embracing Web 2.0 Activities (2008), http://www.idc.com/getdoc.jsp?containerId=prUS21303808
FoneKey (2008), www.FoneKey.net , http://www.youtube.com/watch?v=qW8MdpZFKUY , http://www.youtube.com/watch?v=BqJiNvQ3xp8 , http://www.youtube.com/watch?v=9eAKvCKanH0
Ducell (2008), http://www.DuCell.org
Mock, D.: Wireless Advances the Criminal Enterprise (2002), http://www.thefeaturearchives.com/topic/Technology/Wireless_Advances_the_Criminal_Enterprise.html
Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell Phone Forensic Tools: An Overview and Analysis (2007), http://csrc.nist.gov/publications/nistir/nistir-7250.pdf
Carrier, B.D.: Risks of Live Digital Forensic Analysis. Communications of the ACM 49(2), 56–61 (2006), http://portal.acm.org/citation.cfm?id=1113034.1113069&coll=GUIDE&dl=GUIDE
Jansen, W., Ayers, R.: Guidelines on PDA Forensics (2004), http://csrc.nist.gov/publications/nistir/nistir-7100-PDAForensics.pdf
Symbian History (2008), http://www.symbian.com/about/overview/history/history.html
Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2006), http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf
Zheng, P., Ni, L.M.: The Rise of the Smart Phone. IEEE Distributed Systems Online, 7(3), art. no. 0603-o3003 (2006)
Espiner, T.: Mobile Phone Forensics ’Hole’ Reported (2006), http://news.zdnet.co.uk/hardware/0,1000000091,39277347,00.htm
McCarthy, P.: Forensic Analysis of Mobile Phones. Unpublished Bachelor of Computer and Information Science (Honours) Degree, University of South Australia, Adelaide (2005)
Jansen, W.: Mobile Device Forensic Software Tools. In: Techno Forensics 2005, Gaithersburg, MD, USA (2005)
SWGDE. SWGDE and SWGIT Digital & Multimedia Evidence Glossary (2006), http://www.swgde.org/documents/swgde2005/SWGDE%20and%20SWGIT%20Combined%20Master%20Glossary%20of%20Terms%20-July%2020.pdf
Ghosh, A.: Guidelines for the Management of IT Evidence (2004), http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN016411.pdf
ACPO. Good Practice Guide for Computer based Electronic Evidence (2003), http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf
IOCE. Best Practice Guidelines for Examination of Digital Evidence (2002), http://www.ioce.org/2002/Guidelines%20for%20Best%20Practices%20in%20Examination%20of%20Digital%20Evid.pdf
USSS. Best Practices for Seizing Electronic Evidence (2006), http://www.ustreas.gov/usss/electronic_evidence.shtml
NIJ. Electronic Crime Scene Investigation: A Guide for First Responders (2001), http://www.ncjrs.gov/pdffiles1/nij/187736.pdf
Keizer, G.: First Mobile Phone Java Trojan on the Loose (2006), http://www.crn.com.au/story.aspx?CIID=35467&r=rstory
CCIPS. Searching and Seizing Computers and Related Electronic Evidence Issues (2002), http://www.usdoj.gov/criminal/cybercrime/searching.html
Mellars, B.: Forensic Examination of Mobile Phones. Digital Investigation: The International Journal of Digital Forensics & Incident Response 1(4), 266–272 (2004)
Becker, D.: Toshiba Reports Battery Breakthrough (2005), http://news.com.com/2061-10786_3-5649141.html?tag=nl
Long, M.: Airborne Viruses: Real Threat or Just Hype (2005), http://www.newsfactor.com/story.xhtml?story_id=12100002P4HM
McAfee Mobile Security Report (2008), http://www.mcafee.com/mobile
The Information Technology Act 2000, India (2000), http://www.legalserviceindia.com/cyber/itact.html
Yahoo News India. The Arushi Murder Case: CBI says it has found the evidence (2008), http://in.news.yahoo.com/32/20080731/1053/tnl-aarushi-case-cbi-says-it-has-found-e_1.html
Helplinelaw, Pramod Mahajan Murder Trial: SMS cannot be valid evidence, says defence (2007), http://news.helplinelaw.com/1207/echo12.php
Telecom Paper (2008), http://www.telecompaper.com/news/article.aspx?cid=647427
Ahmed, R., Dharaskar, R.V.: MFL3G: Mobile Forensics Library for digital analysis and reporting of mobile devices for collecting digital evidence. In: 2nd Asia Pacific Mobile Learning & Edutainment Conference 2008, PWTC Kuala Lumpur, Malaysia (2008)
Ahmed, R., Dharaskar, R.V.: MFL3G: An Open Source Mobile Forensics Library For Digital Analysis And Reporting Of Mobile Devices For Collecting Digital Evidence, An Overview From Windows Mobile OS Perspective. In: International Conference on Advanced Computing Technologies (ICACT 2008), GRIET, Hyderabad, India (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmed, R., Dharaskar, R.V. (2009). Mobile Forensics: An Introduction from Indian Law Enforcement Perspective. In: Prasad, S.K., Routray, S., Khurana, R., Sahni, S. (eds) Information Systems, Technology and Management. ICISTM 2009. Communications in Computer and Information Science, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00405-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-00405-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00404-9
Online ISBN: 978-3-642-00405-6
eBook Packages: Computer ScienceComputer Science (R0)