Conference PaperPDF Available

Extracting Evidence Related to VoIP Calls

Authors:

Abstract and Figures

The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service, an individual only needs a user name for identification. In comparison, the public switched telephone network requires detailed information from a user before creating an account. The limited identity information requirement makes VoIP calls appealing to criminals. In addition, due to VoIP call encryption, conventional eavesdropping and wiretapping methods are ineffective. Forensic investigators thus require alternative methods for recovering evidence related to VoIP calls. This paper describes a digital forensic tool that extracts and analyzes VoIP packets from computers used to make VoIP calls.
Content may be subject to copyright.
Chapter 17
EXTRACTING EVIDENCE
RELATED TO VoIP CALLS
David Irwin and Jill Slay
Abstract The Voice over Internet Protocol (VoIP) is designed for voice commu-
nications over IP networks. To use a VoIP service, an individual only
needs a user name for identification. In comparison, the public switched
telephone network requires detailed information from a user before cre-
ating an account. The limited identity information requirement makes
VoIP calls appealing to criminals. In addition, due to VoIP call en-
cryption, conventional eavesdropping and wiretapping methods are in-
effective. Forensic investigators thus require alternative methods for
recovering evidence related to VoIP calls. This paper describes a digital
forensic tool that extracts and analyzes VoIP packets from computers
used to make VoIP calls.
Keywords: VoIP calls, packet extraction, packet analysis
1. Introduction
Voice over Internet Protocol (VoIP) telephony is an inexpensive and
increasingly popular alternative to using traditional telephone networks.
The use of VoIP in U.S. businesses is expected to reach 79% by 2013 [2].
Meanwhile, the lack of technology for law enforcement to monitor VoIP
calls, the low barrier for entry and the anonymity provided by VoIP
service are making it very attractive to criminals [3].
Fortunately, the remnants of a VoIP call remain in the physical mem-
ory of the computers used for the call. The information available in-
cludes signaling information, the digitized call, and information about
the VoIP client. The signaling information is related to the setup and
initialization of the VoIP call. The digitized call comprises packets that
contain the encapsulated voice component. Information specific to the
VoIP application being used, such as the contact list, is also saved. It
G. Peterson and S. Shenoi (Eds.): Advances in Digital Forensics VII, IFIP AICT 361, pp. 221–228, 2011.
c
IFIP International Federation for Information Processing 2011
222 ADVANCES IN DIGITAL FORENSICS VII
is possible to manually search for known VoIP remnants, but this is a
time-consuming process that requires considerable expertise.
McKemmish [4] defines digital forensics as “the process of identifying,
preserving, analyzing and presenting digital evidence in a manner that
is legally acceptable.” The digital forensic search tool described in this
paper is designed to support all four steps. A byte-for-byte copy of the
original memory is created without modifying the original digital evi-
dence. This evidence is processed and formatted into a human-readable
format for presentation in a court of law.
Several researchers have investigated memory forensic techniques for
extracting evidence related to VoIP calls [6, 7, 9]. This paper builds
on this work by describing a forensic tool that detects and reconstructs
VoIP packet sequences from a computer memory capture. In addition,
it provides a means for extracting user information and VoIP client in-
formation. Experimental tests demonstrate that the tool locates more
than 97% of the packets in VoIP calls.
2. Internet Protocol
VoIP is a collection of several protocols that set up, maintain and tear
down calls involving the encapsulation and transportation of voice pack-
ets over the Internet. The two most prominent protocols used are the
User Datagram Protocol (UDP) and the Real-Time Transport Protocol
(RTP). UDP is a transport layer protocol used by Skype [8]. RTP is an
application layer protocol that, in the case of X-Lite [1], uses UDP as
the transport layer protocol. Both these protocols include an Ethernet
frame link layer and an Internet Protocol (IP) Internet layer header.
IP commonly uses version 2 Ethernet frames. An Ethernet frame
consists of a seven-byte preamble, a one-byte start of frame delimiter,
and two six-byte Media Access Control (MAC) headers, one each for
the source and destination. Following the MAC headers are the two-
byte Ethertype, the IP/UDP/RTP data payload in bytes 46 to 1,500,
and a four-byte cyclic redundancy checksum for packet integrity.
IP provides Internet addresses in its headers, allowing packets to be
routed from their source to a destination IP address. However, an IP
address is not sufficient to deliver an IP packet from a source IP address
to a destination IP address. The port numbers of the source and des-
tination computers must also be known for a VoIP call to take place.
UDP maintains the port information. While UDP does not guarantee IP
packet delivery, it is well-suited to VoIP because of the real-time nature
of voice communications. Thus, VoIP uses the IP/UDP protocol stack
shown in Figure 1.
Irwin & Slay 223
Figure 1. IP and UDP packet headers.
RTP [5] provides transport for real-time applications that transmit
audio over packet-switched networks. The protocol incorporates infor-
mation such as packet sequence numbers and timestamps. This allows a
receiving application to buffer and sequence packets in the correct order
for audio playback. Thus, the complete VoIP stack is IP/UDP/RTP.
Figure 2. RTP packet he ader.
Figure 2 presents the RTP packet header format. In RTP, the Syn-
chronization Source (SSRC) field identifies the source of the synchro-
nization (e.g., computer clock). The Contributing Source (CSRC) field
identifies the source of the individual contributions that make up the
single data stream payload for the packet. It is not necessary to use
RTP to participate in a VoIP call. VoIP applications such as Skype
do not use RTP; X-Lite, on the other hand, uses RTP. RTP provides a
means for a VoIP client to reassemble and synchronize packets.
224 ADVANCES IN DIGITAL FORENSICS VII
-Request-Line:
-Invite sip:8889215862@sip.pennytel.com
Method: Invite
-Message Header
Contact:sip:8889215864@119.40.108.72:26610
-To: "david"< sip:8889215862@sip.pennytel.com>
SIP Display info: "david"
-SIP to address:sip:8889215862@sip.pennytel.com
SIP to address User Part: 8889215862
SIP to address Host Part: sip.pennytel.com
-From:"8889215864"sip:8889215864@sip.pennytel.com
Figure 3. SIP invite request.
3. VoIP Packet Identification
After an individual registers with a VoIP service provider, the individ-
ual uses the provider’s client to make calls. To initiate a call, the client
connects to the provider using the Session Initiation Protocol (SIP).
Figure 3 shows a SIP invite request. Elements of a SIP invite request
that are important to a forensic investigator include the user’s regis-
tered name (david), unique SIP user identifier (8889215862) and host
(sip.pennytel.com).
SIP contains information about the call participants based on their
unique SIP identifiers. A regular expression search can be used to iden-
tify VoIP packets in a memory capture. In our experiments, we used a
hex editor to search two physical memory captures. The first capture
was made after a Skype call that only uses UDP. The second was made
after an X-Lite VoIP call that uses RTP and SIP.
0000 00 0C 29 B6 57 76 00 21 6A 4A D6 26 08 00 45 00
0010 00 7D 58 77 00 00 80 11 5F DD C0 A8 00 66 C0 A8
0020 00 65 A1 01 53 CD 00 69 89 E6 80 6B 23 01 00 2B
0030 59 1C 22 14 AD 31 3C 64 7B 82 29 6C E0 18 DD A9
0040 25 EA 44 65 61 9A C1 66 D3 A1 B9 09 BC 38 B1 86
0050 89 66 63 11 D2 44 5F 88 A3 2D E4 63 8E A5 B8 73
0060 26 41 09 BD 90 99 65 1D E7 1B 85 D6 A3 A6 5A 09
0070 DC 21 5C C0 A8 39 05 BB F1 A5 1B E6 A2 29 4A E0
0080 6C 56 92 47 9D CA 65 00
Figure 4. VoIP frame with the search expression highlighted.
Figure 4 shows a single VoIP packet capture with the search pat-
tern highlighted. The headers are segmented by vertical lines (Ether-
net/IP/UDP/RDP/RTP/Payload).
The Ethernet frame is fourteen bytes in length (the preamble and
start of the frame delimiter are not shown) with six bytes each for the
Irwin & Slay 225
Figure 5. User interface.
source and destination MAC addresses. The last two bytes identifies the
Ethertype, which, in the case of VoIP, is 0x0800 for an IP packet.
During our analysis of a 4 GB memory capture, a search using the
IP identifier (0x0800) and the first byte of the IP header (0x45) corre-
sponding to the byte search pattern 0x080045 yielded 8,881 hits.
The UDP header is eight bytes long and does not form part of the
search pattern. The identification of UDP verifies the use of an Eth-
ernet/IP/UDP stack and the port numbers identify the two parties in-
volved in a call. The UDP protocol is identified by byte 10 of the IP
header (0x11), indicating that the next protocol is in fact UDP. The
search pattern 0x080045--------11 yielded 559 hits. If the VoIP client
uses RTP, then the RTP header follows the UDP header.
The identification of RTP is accomplished by examining the first byte
that follows the UDP header. The first byte of RTP contains the version
number, padding bit, extension bit and CSRC count. In the example
in Figure 4, the current SIP version is 2 and the other elements are
predominantly empty; thus, the byte has the value 0x80.
A search of the 4 GB memory capture using the complete pattern
0x080045--------11-----------------80 yielded no false positive er-
rors.
4. Forensic Tool
The forensic tool implemented to extract and analyze VoIP packets
has a simplified interface with tabbed browsing and asynchronous func-
tionality (Figure 5). The user first selects the memory capture file to
be searched. By default, the Ethernet Protocol, IP version 4, UDP and
226 ADVANCES IN DIGITAL FORENSICS VII
Figure 6. Results interface.
RTP are automatically selected and searched. The option to search for
IP version 6 is also available. The search looks for VoIP packets that
match the pattern with and without the RTP component.
Figure 6 presents the results of an analysis of a memory capture using
the forensic tool. The top data grid displays the RTP packets recovered.
When a user selects an individual packet, the bottom grid updates to
display detailed packet information. The displayed information includes
the Ethernet source and destination addresses, IP source and destina-
tion addresses and sequence number, UDP source and destination port
numbers and sequence number, timestamp, and synchronization source
identifier. The recovered packets can be saved for further analysis in an
SQL Server database. For example, the payloads can recombined into a
single stream and attempts can be made to decrypt the payloads either
by brute force or with the assistance of the VoIP provider.
Irwin & Slay 227
Table 1. Wireshark and RAM recovery results.
VoIP Duration Wireshark RAM RAM % Call
Client (seconds) Packet Packets Packets Recovered
Count (Total) (Unique)
Skype 180 18,701 41,959 18,208 97.4%
X-Lite 30 3,097 4,759, 3,093 99.9%
X-Lite 30 3,290 5,488 3,274 99.5%
X-Lite 180 9,089 17,695 9,063 99.7%
The forensic tool can also be used to train forensic analysts. An indi-
vidual packet may be expanded and each protocol highlighted in a differ-
ent color to facilitate the interpretation of individual protocol fields. The
color-coded graphical representation of the VoIP protocol stack greatly
simplifies the interpretation and understanding of the overall frame and
the individual protocols.
5. Experimental Results
Two memory captures were performed after VoIP calls. The first was
a 4 GB RAM capture performed after a Skype call that lasted three
minutes. The second memory capture occurred after a clean restart on
the following day and three successive X-Lite calls, the first lasting 30
seconds, the second 30 seconds and the third three minutes.
Table 1 compares the remnants of the calls recovered by the digital
forensic tool (RAM capture) versus the Wireshark capture of the VoIP
calls. Note that the total number of packets recovered by the RAM cap-
ture (Total) exceeds the actual number of packets in the call (Wireshark
Packet Count). It was found that duplicate packets exist in up to six
different locations in memory. Filtering these duplicate packets provides
a more accurate measure of the number of packets recovered (Unique).
The forensic tool locates nearly all the VoIP packets corresponding to
the two types of calls. Note that the recovery percentage is lower for the
Skype call because it does not use RTP and, therefore, does not benefit
from the use of a longer search expression.
6. Conclusions
The forensic tool presented in this paper successfully recovers VoIP
packets from memory captures. The tool also helps extract user details
from VoIP application control signals. The ability to analyze, store and
format VoIP packets is particularly valuable in forensic investigations.
228 ADVANCES IN DIGITAL FORENSICS VII
Several opportunities exist to improve the tool. For example, be-
fore transmission and during playback, the call is in an unencrypted
form. Therefore, the potential exists to extract unencrypted audio from
memory. Another enhancement involves the creation of a database with
contact list structures and control signal information associated with
commonly used VoIP clients.
Acknowledgements
This research was supported by the Australian Research Council via
Linkage Grant LP0989890 and by the Australian Federal Police.
References
[1] CounterPath Corporation, X-Lite, Vancouver, Canada (www.count
erpath.com/x-lite.html).
[2] In-Stat, VoIP penetration forecast to reach 79% of U.S. businesses
by 2013, Scottsdale, Arizona (www.instat.com/newmk.asp?ID=
2721), February 2, 2010.
[3] R. Koch, Criminal activity through VoIP: Addressing the mis-
use of your network, Technology Marketing Corporation, Norwalk,
Connecticut (www.tmcnet.com/voip/1205/special-focus-criminal-
activity-through-voip.htm), 2010.
[4] R. McKemmish, What is forensic computing? Trends and Issues in
Crime and Criminal Justice, no. 118, pp. 1–6, 1999.
[5] H. Schulzrinne, S. Casner, R. Frederick and V. Jacobson, RTP: A
Transport Protocol for Real-Time Applications, RFC 3550, Internet
Engineering Task Force, Fremont, California (tools.ietf.org/html
/rfc3550), 2003.
[6] M. Simon and J. Slay, Voice over IP: Forensic computing implica-
tions, Proceedings of the Fourth Australian Digital Forensics Con-
ference, pp. 1–6, 2006.
[7] M. Simon and J. Slay, Enhancement of forensic computing inves-
tigations through memory forensic techniques, Proceedings of the
International Conference on Availability, Reliability and Security,
pp. 995–1000, 2009.
[8] Skype, Luxembourg (www.skype.com).
[9] J. Slay and M. Simon, Voice over IP forensics, Proceedings of the
First International Conference on Forensic Applications and Tech-
niques in Telecommunications, Information and Multimedia, pp.
10:1–10:6, 2008.
... The figure 5 shows the connection between a Skype client and a telephone user in PSTN user. The connection between Skype client and PSTN gateway will be accomplished through VoIP protocol which is obviously an unencrypted digital connection [9,13]. The communication path which we consider is marked with red line in the figure. ...
... Tracing the Ports Used in RTP: Initial Skype handshake connection is analyzed to identify the ports used by the Skype client for RTP transfer [13]. Once ports are identified, all such VoIP packets are analyzed and extracted. ...
Conference Paper
Full-text available
Skype is a secure internet telephonic application which establishes connection between its clients through a peer-to-peer architecture. The connection between Skype client to its server and other clients uses an encrypted channel that uses Transport layer Security (TLS) protocol. At the same time, connection between Skype client and Public Switch telephone Network (PSTN) gateway is accomplished through unencrypted digital channel using Voice over Internet Protocol (VoIP). The encrypted channels in the Skype communication make forensic analysis frameworks to work badly in decrypting the traffic and procuring critical forensic details of the network stream against intruders and cyber criminals. Furthermore, policy violations and unbound usage of Skype VoIP communication over PSTN users waste the network bandwidth. Here we propose a sophisticated Skype forensic framework that collects forensic information by decrypting the Skype client-server communication along with recreating voice content in the Skype to PSTN VoIP communication. We also propose an efficient packet reconstruction algorithm powered by time stamping technique for regenerating malicious content from payloads of the Skype network stream followed by supporting prosecution of policy violators and cyber criminals in the court of law.
... The four most fundamental criteria that influence the quality of VoIP or video stream communication became the subject of each communication's investigation. [3] Packet loss is the most crucial connectivity parameter directly related to the quality and reliability of the network. The second monitored parameter is Max Delta, which indicates the time that separates the previous packet in the stream and the current packet. ...
Article
Full-text available
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
... Irwin and Slay [26] presented one of the most useful attempts up to that time. In their work, they proposed the idea of analyzing the RAM for discovering evidence related to VoIP usage. ...
Conference Paper
Voice over Internet Protocol (VoIP) is one of the highly used applications for voice and data communication purposes. The convenience of using VoIP applications, its acceptable quality, and the relatively low cost of usage have made it a potential replacement for landline and cellular communication. Along with these advantages, the vulnerability of using VoIP is usually considered the most cumbersome con. Various researchers have investigated VoIP risk issues; yet, a very limited research has approached VoIP from digital forensic perspective. A survey of the prominent research proposals and methods that presented VoIP forensic within their context is provided in this paper. In addition, a contemporary discussion on trends for improving VoIP forensic is given in this paper to formulate directions for new and useful research in the area of VoIP forensic.
... Irwin and Slay [26] presented one of the most useful attempts up to that time. In their work, they proposed the idea of analyzing the RAM for discovering evidence related to VoIP usage. ...
Conference Paper
Full-text available
Voice over Internet Protocol (VoIP) is one of the highly used applications for voice and data communication purposes. The convenience of using VoIP applications, its acceptable quality, and the relatively low cost of usage have made it a potential replacement for landline and cellular communication. Along with these advantages, the vulnerability of using VoIP is usually considered the most cumbersome con. Various researchers have investigated VoIP risk issues; yet, a very limited research has approached VoIP from digital forensic perspective. A survey of the prominent research proposals and methods that presented VoIP forensic within their context is provided in this paper. In addition, a contemporary discussion on trends for improving VoIP forensic is given in this paper to formulate directions for new and useful research in the area of VoIP forensic.
... In our proposed work it is demonstrated that this information can be obtained by mining the SDP headers which can be collected locally, without the need for network operator collaboration thus saving on administrative overheads. Irwin and Slay (2011) developed an application that searches for VoIP artefacts in the computer's volatile memory. They showed that real-time transport protocol (RTP) conversations can be reconstructed with a significant probability of success from the data residing in RAM. ...
Article
Full-text available
In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if appropriate forensic readiness processes and controls are in place, a wealth of evidence can be obtained. The type of the end user equipment of the internal users, the private IP, the software that is used can help build a reliable baseline information database. On the other hand the private IP addresses of the potential attacker even during the presence of NAT services, as well as and the attack tools employed by the malicious parties are logged for further analysis.
Article
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity and availability (CIA) of organisation assets, as well as minimising loss (e.g. financial, reputational and legal) particularly as organisations move to the cloud. In this paper, we surveyed existing incident handling and digital forensic literature with the aims of contributing to the knowledge gap(s) in handling incidents in the cloud environment. 139 English language publications between January 2009 and May 2014 were located by searching various sources including the websites of standard bodies (e.g. National Institute of Standards and Technology) and academic databases (e.g. Google Scholar, IEEEXplore, ACM Digital Library, Springer and ScienceDirect). We then propose a conceptual cloud incident handling model that brings together incident handling, digital forensic and the Capability Maturity Model for Services to more effectively handle incidents for organisations using the cloud. A discussion of open research issues concludes this survey.
Technical Report
Full-text available
This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of-service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously.
Technical Report
Full-text available
This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of-service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers.
Article
Full-text available
The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. VoIP provides strong encryption and a decentralised databased network. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. New methods are required to collect evidence from systems running VoIP software. This paper presents work in progress and, based on a literature review of the field, explores a methodology that may be used to advance this research area.
Article
Adam Graycar Director Developments in information technology have begun to pose new challenges for policing. Most professions have had to adapt to the digital age, and the police profession must be particularly adaptive, because criminal exploitation of digital technologies necessitates new types of criminal investigation. More and more, information technology is becoming the instrument of criminal activity. Investigating these sophisticated crimes, and assembling the neces-sary evidence for presentation in a court of law, will become a significant police responsibility. This paper provides an overview of the new law enforcement field of forensic computing. It is an abridged version of a report prepared by the author during his Donald Mackay Churchill Fellowship. Its publication here reflects the Australian Institute of Criminology's continuing role in informing policy makers and the public about complex criminal activity. T he application of computer technology to the investigation of computer based crime has given rise to a new field of specialisation—forensic computing—which is the process of identi-fying, preserving, analysing and presenting digital evidence in a manner that is legally acceptable. It encompasses four key elements. 1. The identification of digital evidence is the first step in the forensic process. Knowing what evidence is present, where it is stored and how it is stored is vital to determining which processes are to be employed to facilitate its recovery. Whilst many people think of personal computers as the sole focus of forensic computing, in reality it can extend to any electronic device that is capable of storing information, such as mobile/cellular telephones, electronic organisers (digital diaries) and smart cards. In addition, the com-puter forensic examiner must be able to identify the type of infor-mation stored in a device and the format in which it is stored so that the appropriate technology can be used to extract it. 2. The preservation of digital evidence is a critical element in the forensic process. Given the likelihood of judicial scrutiny in a court of law, it is imperative that any examination of the electronically stored data be carried out in the least intrusive manner. There are circumstances where changes to data are unavoidable, but it is important that the least amount of change occurs. In situations where change is inevitable it is essential that the nature of, and reason for, the change can be explained. Alteration to data that is of evidentiary value must be accounted for and justified. This applies not only to changes made to the data itself, but also includes physi-cal changes that are made to the particular electronic device to facilitate access to the data.
Article
With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This paper presents and discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications
Conference Paper
The use of memory forensic techniques has the potential to enhance computer forensic investigations. The analysis of digital evidence is facing several key challenges; an increase in electronic devices, network connections and bandwidth, the use of anti-forensic technologies and the development of network centric applications and technologies has lead to less potential evidence stored on static media and increased amounts of data stored off-system. Memory forensic techniques have the potential to overcome these issues in forensic analysis. While much of the current research in memory forensics has been focussed on low-level data, there is a need for research to extract high-level data from physical memory as a means of providing forensic investigators with greater insight into a target system. This paper outlines the need for further research into memory forensic techniques. In particular it stresses the need for methods and techniques for understanding context on a system and also as a means of augmenting other data sources to provide a more complete and efficient searching of investigations.
Criminal activity through VoIP: Addressing the misuse of your network
  • R Koch
R. Koch, Criminal activity through VoIP: Addressing the misuse of your network, Technology Marketing Corporation, Norwalk, Connecticut (www.tmcnet.com/voip/1205/special-focus-criminalactivity-through-voip.htm), 2010.
What is forensic computing? Trends and Issues in Crime and Criminal Justice
  • R Mckemmish
  • R. McKemmish
R. McKemmish, What is forensic computing? Trends and Issues in Crime and Criminal Justice, no. 118, pp. 1-6, 1999.
VoIP penetration forecast to reach 79% of U.S. businesses by
  • In-Stat
In-Stat, VoIP penetration forecast to reach 79% of U.S. businesses by 2013, Scottsdale, Arizona (www.instat.com/newmk.asp?ID= 2721), February 2, 2010.