The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps

被引:22
作者
Cahyani, Niken Dwi Wahyu [1 ,2 ]
Ab Rahman, Nurul Hidayah [1 ,3 ]
Glisson, William Bradley [4 ]
Choo, Kim-Kwang Raymond [1 ,5 ]
机构
[1] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
[2] Telkom Univ, Bandung, Indonesia
[3] Univ Tun Hussein Onn Malaysia, Kuala Lumpur, Johor, Malaysia
[4] Univ S Alabama, Sch Comp, Mobile, AL USA
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Android device forensics; Cloud app forensics; Mobile forensics; Terrorist investigations; Windows phone forensics;
D O I
10.1007/s11036-016-0791-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile technologies can be, and have been, exploited in terrorist activities. In this paper, we highlight the importance of mobile forensics in the investigation of such activities. Specifically, using a series of controlled experiments on Android and Windows devices, we demonstrate how mobile forensics techniques can be used to recover evidentiary artefacts from client devices. There are three simulation scenarios, namely: (1) information propagation, (2) information concealment and (3) communications. The experiments used three popular cloud apps (Google Drive, Dropbox, and OneDrive), five communication apps (Messenger, WhatsApp, Telegram, Skype and Viber), and two email apps (GMail and Microsoft Outlook). The evidential data was collected and analysed using mobile forensics and network packet analyser tools. The correlation of evidence artefacts would support to infer illegal use of mobile devices. This study also highlights the extent of acquired evidence between Android and Windows devices, in which Android presents more evidentiary value.
引用
收藏
页码:240 / 254
页数:15
相关论文
共 35 条
[1]   Forensic analysis of social networking applications on mobile devices [J].
Al Mutawa, Noora ;
Baggili, Ibrahim ;
Marrington, Andrew .
DIGITAL INVESTIGATION, 2012, 9 :S24-S33
[2]   Combating Terrorism in the New Media Environment [J].
Amble, John Curtis .
STUDIES IN CONFLICT & TERRORISM, 2012, 35 (05) :339-353
[3]   Forensic analysis of WhatsApp Messenger on Android smartphones [J].
Anglano, Cosimo .
DIGITAL INVESTIGATION, 2014, 11 (03) :201-213
[4]  
[Anonymous], 2012, US INT TERR PURP
[5]  
[Anonymous], 2015, CLOUD SECURITY ECOSY, DOI DOI 10.1016/B9780-12801595-7.00015X
[6]  
[Anonymous], CONCURRENCY COMPUTAT
[7]  
[Anonymous], CLOUD SECURITY ECOSY
[8]  
[Anonymous], 2016, CONCURRENCY COMPUTAT
[9]  
Ariffin Aswami, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P375, DOI 10.1109/ARES.2013.50
[10]  
Australian Government Department of the Prime Minister and Cabinet, 2010, SEC AUSTR PROT OUR C