Conference Paper

MFL3G: An Open Source Mobile Forensics Library for Digital Analysis and Reporting of Mobile Devices for Collecting Digital Evidence, an Overview from Windows Mobile OS perspective

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones while keeping the size of such devices small enough to fit in a pocket. This led mobile phones to become portable data carriers. This in turn increased the potential for data stored on mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on mobile phones. It also discusses some of the emerging technologies and their potential impact on mobile phone based evidence. The paper will also cover some of the inherent differences between mobile phone forensics and computer forensics. It also highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the paper highlights the development of the proposed MFL3G forensic library for more in depth examination of mobile phone evidence.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... According to NIST definition of mobile phone forensics process is preservation, acquisition, examination and analysis, and then reporting [10]. The various aspects of mobile forensics have been discussed in our previous research work [1, 2, 3, 4, 5, 6, 7, 8, 13]. ...
Article
Full-text available
The extraordinary development of mobile communications is a source of new security challenges. Today, mobile phones have become ubiquitous in nature involving their use in many daily activities, and sometimes those activities might be criminal in nature. The remarkable advancements in the technology and increase in computing power of these devices over last few years, has led to an increase of their functionality while keeping the size of such devices small enough to fit in a pocket. The use of mobile phones in criminal activities has led to the need of recovering the digital evidence data in them for the further investigations. It is therefore essential for investigators to be able to extract digital evidence quickly and accurately. The digital forensic examiner must know how to preserve and acquire digital evidence effectively from mobile devices. This paper provides an overview of digital evidence preservation issues, relevant solutions for digital forensics examiners, and tips for successful preservation of digital evidence on mobile devices.
... The mobile phone forensics process lacks standardization and universal guidelines for all the devices [8]. ...
Article
Full-text available
Growing use of mobile handheld devices, such as cell phones and PDA does provide productivity benefits but they also pose new security risks. Due to continued growth of processing power and ever evolving ubiquitous functionality of these devices, they are also being used for lots of criminal activities too. This poses great challenges for investigators and law enforcement officials all over the world. The use of mobile phones in criminal activities has led to the need of recovering the data in them. The acquisition of information derived from cellular devices can be used as forensic evidence which has become a prime component of crime scene investigations. Digital evidence, like any other type of evidence, requires identification, collection, a chain of custody, examination/analysis, and finally authentication in court during presentation to the trier of fact. Forensic hashing is used for identification, verification and authentication of data and provide forensic examiner with the ability to verify the integrity of acquired data. This paper focuses on use of cryptographic hashing in mobile forensics and discusses the current challenges. Additional experiments were carried out to validate compared known hash values with reported values for data objects populated onto mobile devices using various data transmission methods.
... The various aspects of mobile forensics have been discussed in our previous research work [11,12,13,29,30]. ...
Article
Full-text available
The Google's Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in work by early 2011[21]. The explosive growth of the platform has been significant win for consumers with respect to competition and features. However forensic analysis and security engineers have struggled as there is lack of knowledge and supported tools for investigating these devices [1, 2]. This paper presents efficient generalized forensics framework for acquisition and subsequent analysis of these devices.
... For mobile phone forensics to catch up with release cycles of mobile phones, more comprehensive and in depth framework for evaluating mobile forensic toolkits should be developed and data on appropriate tools and techniques for each type of phone should be made available a timely manner. The authors are developing an open source and generic mobile forensics framework called MFL3G to aid the forensic experts to carry out investigations on vide variety of devices with an ease [34,35]. The Indian Laws should be modified to accommodate the digital evidence, specially the mobile phone based evidence in the Court of Laws with the perspectives as elaborated in the paper. ...
Conference Paper
Full-text available
Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones while keeping the size of such devices small enough to fit in a pocket. This led mobile phones to become portable data carriers. This in turn increased the potential for data stored on mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on mobile phones. It also highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of mobile phone evidence.
ResearchGate has not been able to resolve any references for this publication.