Digital Evidence Retrieval and Forensic Analysis on Gambling Machine

  • Pritheega Magalingam
  • Azizah Abdul Manaf
  • Rabiah Ahmad
  • Zuraimi Yahya
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 31)


Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling.


digital forensic forensic analysis gambling machine information retrieval digital evidence interpretation string search 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lemay, S.G., Rodges, A.M., Breckner, R.E., Chen, X.: EPROM file system in gaming apparatus, structure of a gaming system. United States Patent No.7108605 (2006),
  2. 2.
    John, D., McMullan, L., David, D., Perrier, C.: Cheats At Play: The Social Organization Video Lottery Terminal Fraud. In: Gambling, Law Enforcement and Justice System Conference, Alberta Gaming Institute and University of Alberta, Edmonton, Alberta (2002)Google Scholar
  3. 3.
    Catsoulis, J.: Designing Embedded Hardware. O’Reilly, USA (2005)Google Scholar
  4. 4.
    Breeuwsma, M., De Jongh, M., Klaver, C., van der Knijff, R., Roeloffs, M.: Forensic Data Recovery from Flash Memory. SSDDFJ 1(1) (2007)Google Scholar
  5. 5.
    Brian, D., Carrier, J.G.: A Hardware-Based Memory Acquisition Procedure for Digital Investigations. IDJE 1(1) (2004)Google Scholar
  6. 6.
    Nick, L., Petroni Jr., Walters, A., Fraser, T., Arbaugh, W.A.: FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory. Digital Investigation Journal 3(4) (2006)Google Scholar
  7. 7.
    Benjamin Turnbull, D.: Forensic Investigation of the Nintendo Wii: A First Glance. ISSN 2(1) (2008)Google Scholar
  8. 8.
    Brey, B.B.: The Z80 Microprocessor Hardware, Software, Programming, an Interfacing. Prentice-Hall, Inc., Englewood Cliffs (1988)Google Scholar
  9. 9.
    Siekiersi, W.R., Sterling, M.: Random Number Generating Techniques and Gaming Equipment Employing such Techniques. United States Patent No. 4527798 (1985),
  10. 10.
    Dr.Elazar (Azi) Zadok, Brig. Gen. Director, D.I.F.S.: Gambling Machines Laboratory, Division of Identification and Forensic Science. Unpublished note, Investigation Department/ Israel Police HeadquartersGoogle Scholar
  11. 11.
    SCI Counsel James F. Villere. Illegal Gambling. Unpublished Report, Division of Criminal Justice in the Attorney General’s Department of Law and Public Safety (1991) Google Scholar
  12. 12.
    Asim, M.: Reverse Engineering. Unpublished note, Blekinge Institute of TechnologyGoogle Scholar
  13. 13.
  14. 14.
    The National Standard Working Party.: Revision 9.0. Australian/New Zealand Gaming Machine National Standard. New Zealand: Australian and New Zealand gaming regulators (2007)Google Scholar
  15. 15.
    Dietz II, M. J., Morris, E.D., Miller, R.A.: Instant, Multiple Play Gaming Ticket And Validation System. United States Patent No. 5949042,
  16. 16.
    Gaming Labs Certified. Standard Series. Version 2.0. Client-Server Systems. Gaming Laboratories International, Inc. (2007)Google Scholar
  17. 17.
    Casino Gambling Terms and Definitions,
  18. 18.
    Manship, J., Vinneau, M., Ross, D., Hache, N., Maillet, C.: Video Gaming Machine. United States Patent No. 5393061 (1995),
  19. 19.
    Grand, J., Carrier, B.: Method and Apparatus For Preserving Computer Memory Using Expansion Card. United States Patent No. 7181560 (2007),
  20. 20.
    Burke, P.K., Craiger, P.: Xbox Forensics. Journal of Digital Forensic Practice 1(4), 252–282 (2006)Google Scholar
  21. 21.
    Lim, K.-S., Lee, S.: A Methodology for Forensic Analysis of Embedded Systems. In: Second International Conference on Future Generation Communication and Networking, pp. 283–286. IEEE Computer Society, Los Alamitos (2008)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Pritheega Magalingam
    • 1
  • Azizah Abdul Manaf
    • 2
  • Rabiah Ahmad
    • 1
  • Zuraimi Yahya
    • 3
  1. 1.Centre For Advanced Software EngineeringMalaysia
  2. 2.College Science and TechnologyMalaysia
  3. 3.Electrical EngineeringUniversiti Teknologi MalaysiaKuala Lumpur

Personalised recommendations