Skip to main content

Results of Field Testing Mobile Phone Shielding Devices

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2011)

Abstract

This paper is based on thesis research from the authors. Mobile phones are increasingly a source of evidence in criminal investigations. The evidence on a phone is volatile and can easily be overwritten or deleted. There are many devices that claim to radio isolate a phone in order to preserve evidence. There has been little published research on how well these devices work in the field despite the escalating importance of mobile phone forensics. The purpose of this study was to identify situations where the devices used to protect evidence on mobile phones can fail. These devices were tested using mobile phones from three of the largest services providers in the U.S. Calls were made to contact the isolated phones using voice, SMS, and MMS at varying distances from the provider’s towers. In the majority of the test cases the phones were not isolated from their networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Scientific Working Group on Digital Evidence.: Best Practices for Mobile Phone Examinations (2009), http://www.swgde.org/documents/swgde2009/Best%20Practices%20for%20Mobile%20Phone%20Examinations%20v1.0.pdf

  2. De Toffol, E.: Re: Wireless preservation (2009)

    Google Scholar 

  3. CTIA.: Wireless Quick Facts. CTIA The Wireless Association (2009), http://www.ctia.org/media/industry_info/index.cfm/AID/10323

  4. Jansen, W., Delaitre, A., Moenner, L.: Overcomming Impediments to Cell Phone Forensics (2008)

    Google Scholar 

  5. Mislan, R., Casey, E., Kessler, G.: The growing need for on-scene triage of mobile devices. Digital Investigation 6(3-4), 112–124 (2010)

    Article  Google Scholar 

  6. Lesemann, D., Mahalik, H.: Dialing Up and Drilling Down: Forensic Preservation of Handheld Devices. Information Security Systems Association Journal (2008)

    Google Scholar 

  7. Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2007)

    Google Scholar 

  8. Interpol European Working Party on IT Crime.: Good Practice Guide for Mobile Phone Seizure and Examination (2006)

    Google Scholar 

  9. BKForensics. Solutions (2010), http://www.bkforensics.com/Mesh.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Katz, E., Mislan, R., Rogers, M., Smith, A. (2012). Results of Field Testing Mobile Phone Shielding Devices. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics