Advertisement

Comparing Cellphones, Global Positioning Systems (GPSs), Email and Network and Cyber-Forensics

  • Hossein ZareEmail author
  • Peter Olsen
  • Mohammad J. Zare
  • Mojgan Azadi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 800)

Abstract

Evidence collection of digital devices is the most important step of Forensic Investigation. We discuss four major evidence’s sources focusing on Cellphones, Global Positioning Systems (GPSs), Email and Network. Cellphone provides tremendous evidence, but it needs to be isolated to protect risk of being wiped up and overwritten. GPSs are valuable sources of information and can guide an investigator to identify “where the unit has been and where a user intended to go”. Network and Emails are the most powerful sources of evidence, but professional skills are needed to protect evidence from being overwritten and modified. In this paper using the CIA’s model, we prioritize these four sources of evidence. Network and email with 0.82 and 0.72 availability ratio received the highest availability score but with considering data integrity Cellphone and GPSs received the highest score and can be considered more reliable source of evidence during a Forensic Investigation.

Keywords

Forensic investigation Cellphone GPS Risk assessment analysis 

References

  1. 1.
    Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell Phone Forensic Tools. Retrieved 10 Oct 2018 from https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=150375 (2005)
  2. 2.
    Barbara, J.J: SIM Forensics: Part 1. Retrieved 10 Mar 2017 from: https://www.forensicmag.com/article/2011/04/sim-forensics-part-1 (2011)
  3. 3.
    Bailey, T.D., Grimaila, M.R.: Running the blockade: information technology, terrorism, and the transformation of Islamic mass culture. Terrorism Polit. Viol. 18(4), 523–543 (2006)CrossRefGoogle Scholar
  4. 4.
    Brian, M., Harris, T.: How GPS Receivers Work. Retrieved 10 Mar 2017 from http://electronics.howstuffworks.com/gadgets/travel/gps.htm/printable (2011)
  5. 5.
    Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Elsevier Inc, Waltham (2011)Google Scholar
  6. 6.
    Hartenstein, M., Sheridan, M.: Missing Vegas Showgirl Debbie Flores-Narvaez was Pregnant, Beaten by her ex, According to Police. Retrieved 10 Mar 2017 from: http://www.nydailynews.com/news/national/missing-vegas-showgirl-debbie-flores-narvaez-pregnant-beaten-police-article-1.149194 (2010)
  7. 7.
    He, S., Paar, I.C.: SIM Card Security. Chair for Communication Security. Retrieved 10 Mar 2017 from: https://pdfs.semanticscholar.org/9adb/d6044393c8f0fb0ab6329d286e4ad64cae6c.pdf (2007)
  8. 8.
    Hillebrand, F. (ed.): GSM and UMTS: The Creation of Global Mobile Communication, p. 371. Wiley, Chichester (2002)Google Scholar
  9. 9.
    Jansen, W., Ayers, R.: Guidelines on cell phone forensics. NIST Special Publication, 800, 101. Retrieved 10 Mar 2017 from: http://www.4law.co.il/cell1.pdf (2007)
  10. 10.
    Järv, O., Ahas, R., Witlox, F.: Understanding monthly variability in human activity spaces: a twelve-month study using mobile phone call detail records. Trans. Res. Part C: Emerg. Technol. 38, 122–135 (2014)CrossRefGoogle Scholar
  11. 11.
    Kessler, G.: Cell Phone Analysis: Technology, Tools, and Processes. Mobile Forensics World. Purdue University, Chicago (2010)Google Scholar
  12. 12.
    Kizza, J.M.: Guide to Computer Network Security. Springer, Swindon, UK (2015)CrossRefGoogle Scholar
  13. 13.
    Lee, X., Yang, C., Chen, S., Wu, J.: Design and implementation of forensic system in Android smart phone. In: The 5th Joint Workshop on Information Security (2009)Google Scholar
  14. 14.
    LeMere, B.: Enhancing Investigations with GPS Evidence. Retrieved 10 Mar 2017 from http://www.forensicmag.com/article/enhancing-investigations-gps-evidence (2011)
  15. 15.
    Mahajan, A., Dahiya, M.S., Sanghvi, H.P.: Forensic analysis of instant messenger applications on Android devices. arXiv preprint arXiv:1304.4915 (2013)Google Scholar
  16. 16.
    Oluwasegun, S., David, O.E., Esther, E., Victor, O.: Computer forensics for law enforcement. J. Emerg. Trend. Eng. Appl. Sci. (JETEAS). 5(1), 35–38 (2014)Google Scholar
  17. 17.
    Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1–12 (2002). Retrieved 10 Mar 2017 from http://www.di-srv.unisa.it/~ads/corso-security/www/CORSO-9900/a5/gsmreport/gsmreport.pdf Google Scholar
  18. 18.
    Ryder, S., Le-Khac, N.A.: The end of effective law enforcement in the cloud? To encypt, or not to encrypt. arXiv preprint arXiv:1609.07602 (2016). Retrieved 10 Mar 2017 from https://arxiv.org/ftp/arxiv/papers/1609/1609.07602.pdf
  19. 19.
    Sammons, J.: The Basics of Digital Forensics-2nd Edition: the Primer for Getting Started in Digital Forensics. Elsevier Inc, Waltham (2015)Google Scholar
  20. 20.
    Scourias, J.: Overview of the global system for mobile communications. University of Waterloo, 4 (1995)Google Scholar
  21. 21.
    Snort: Snort User’s Manual 2.9.9. Retrieved March 10, 2017 from http://manual-snort-org.s3-website-us-east-1.amazonaws.com/ (2016)
  22. 22.
    Steeh, C., Buskirk, T.D., Callegaro, M.: Using text messages in US mobile phone surveys. Field Methods. 19(1), 59–75 (2007)CrossRefGoogle Scholar
  23. 23.
    Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800–30. Risk management guide for information technology systems (2002)Google Scholar
  24. 24.
    Tschabitscher, H.: How to Understand Date and Time in Email Headers. Retrieved 10 Mar 2017 from https://www.lifewire.com/what-is-an-email-header-1171127 (24 Aug 2016)
  25. 25.
    UMUC: Enterprise Network Intrusion Prevention Systems, CSEC 630 Module 1, Document posted in University of Maryland University College prevention and protection strategies in cybersecurity-CSE630 online classroom. Archived at: https://leoprdws.umuc.edu/CSEC630/1306/csec630_01/assets/csec630_01.pdf (2016)
  26. 26.
    Valacich, J., Schneider, C.: Information System Today: Managing in the Digital World, 6th edn. Pearson, New Jersy (2014)Google Scholar
  27. 27.
    Weiss, S.M., Indurkhya, N., Zhang, T., Damerau, F.: Text Mining: Predictive Methods for Analyzing Unstructured Information. Springer Science & Business Media, New York (2010)zbMATHGoogle Scholar
  28. 28.
    Wireshark: Wireshark User’s Guide. Retrieved 10 Mar 2017 from https://www.wireshark.org/docs/wsug_html_chunked/ (2016)

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hossein Zare
    • 1
    • 2
    Email author
  • Peter Olsen
    • 3
  • Mohammad J. Zare
    • 4
  • Mojgan Azadi
    • 5
    • 6
  1. 1.Department of Health Services ManagementUniversity of Maryland University College (UMUC)AdelphiUSA
  2. 2.Department of Health Policy and ManagementThe Johns Hopkins UniversityBaltimoreUSA
  3. 3.Department of Computer Science and Electrical EngineeringUniversity of Maryland Baltimore CountyBaltimoreUSA
  4. 4.Department of Computer Science and EngineeringAzad UniversityYazdIran
  5. 5.University of Maryland University CollegeAdelphiUSA
  6. 6.The Johns Hopkins University School of NursingBaltimoreUSA

Personalised recommendations