SMIRK: SMS Management and Information Retrieval Kit
There has been tremendous growth in the information environment since the advent of the Internet and wireless networks. Just as e-mail has been the mainstay of the web in its use for personal and commercial communication, one can say that text messaging or Short Message Service (SMS) has become synonymous with communication on mobile networks. With the increased use of text messaging over the years, the amount of mobile evidence has increased as well. This has resulted in the growth of mobile forensics. A key function of digital forensics is efficient and comprehensive evidence analysis which includes authorship attribution. Significant work on mobile forensics has focused on data acquisition from devices and little attention has been given to the analysis of SMS. Consequentially, we propose a software application called: SMS Management and Information Retrieval Kit (SMIRK). SMIRK aims to deliver a fast and efficient solution for investigators and researchers to generate reports and graphs on text messaging. It also allows investigators to analyze the authorship of SMS messages.
KeywordsCyber forensics cellular phone forensics forensic tools SMS authorship attribution post-hoc forensic analysis
Unable to display preview. Download preview PDF.
- 2.The Independent, Dr Tim Grant: How text-messaging slips can help catch murderers (retrieved November 29) (2008), http://www.independent.co.uk/opinion/commentators/dr-tim-grant-how-textmessaging-slips-can-help-catch-murderers-923503.html
- 3.Cellular-news, SMS as a tool in murder investigations (retrieved November 24) (2008), http://www.cellular-news.com/story/18775.php
- 4.Ayers, R., Jansen, W., Delaitre, A., Moenner, L.: Cell Phone Forensics Tools: An Overview and Analysis Update, NIST Interagency Report (IR) 7387 (February 2007)Google Scholar
- 5.Lee, F.: SMS Shortform Identification and Codec. National University of Singapore Thesis (2005), http://www.comp.nus.edu.sg/~rpnlpir/downloads/corpora/smsCorpus/mingFungLeeThesis.pdf (retrieved May 21, 2009 )
- 6.Viégas, F.B., Golder, S., Donath, J.: Visualizing Email Content: Portraying Relationships from Conversational Histories. Long paper, CHI 2006 (2006)Google Scholar
- 8.de Vel, O., Corney, M., Anderson, A., Mohay, G.: Language and Gender Author Cohort Analysis of E-mail for Computer Forensics. In: Digital Forensic Research Workshop, Syracuse, NY, August 7-9 (2002)Google Scholar
- 9.Stolfo, S.J., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.: Behavior Profiling of Email. In: Proc. of NSF/NIJ Symposium on Intelligence & Security Informatics (2003)Google Scholar
- 10.Netling, The netlingo list of acronyms & text messaging shorthand (retrieved May 21) (2009), http://www.netlingo.com/acronyms.php
- 11.UzZaman, N., Khan, M.: T12: An Advanced Text Input System with Phonetic Support for Mobile Devices. In: 2nd International Conference on Mobile Technology, Applications and Systems, pp. 1–7 (2005)Google Scholar
- 12.Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)Google Scholar
- 13.SimMetrics: Open Source Similarity Measure Library, http://www.dcs.shef.ac.uk/~sam/simmetrics.html