scholarly journals Forensic Analysis of Broken and Damaged Mobile Phone - A Crime Case Study

Author(s):  
Akhlesh Kumar ◽  
Bhushan Ghode ◽  
Khevna Maniar ◽  
Dr. S. K. Jain

Forensic laboratories are frequently subjected to mobile devices that are assailed by shock or forced damage which might be the result of intentional efforts to destroy proof from the devices or accidental exposure. Chip-off technique is an effective method for data retrieval from such kind of exhibits. However, nowadays all mobiles phones are securely encrypted with full disk encryption (FDE) or file-based encryption (FBE) which makes chip-off forensics an improbable process to successfully retrieve data. In many of these cases, the encryption is on the hardware and hence, the device could be successfully decrypted by bringing it in its original condition. Thus, the original user data can be obtained for investigative purposes. This process can be enabled by replacement of electronic parts of the original device which contains user data and decryption keys i.e. PCB to the new host. This research paper covers a case study of a mobile phone obtained in broken and shattered condition whose diagnosis of PCB and subsequent actions led to data recovery.

2021 ◽  
Vol 69 (2) ◽  
pp. 415-442
Author(s):  
Milana Pisarić

In detecting criminal offences, the police increasingly rely on electronic evidence. Due to ubiquitous digitization, data in electronic form with probative potential is found in an increasing number of sources. When the competent authorities need to collect potential electronic evidence from mobile phones, they face several normative and practical challenges. One of the important aggravating factors is the full-disk encryption of the device. Although functions of encryption cannot and must not be neglected in the modern digital environment, it has an obstructive role in criminal investigation. The competent authorities often have the appropriate authority to access the contents of a mobile phone, but they lack the technical ability to gain such access and collect data. After explaining the basic principles of encryption of mobile phones, the author analyzes the possible approaches for gaining access to a device protected by encryption, and indicates the possible legal basis for their application.


2021 ◽  
Vol 2 (3) ◽  
pp. 283
Author(s):  
Vipkas Al Hadid Firdaus ◽  
Dodit Suprianto ◽  
Rini Agustina

Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption.


Author(s):  
Keith M. Martin

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.


2021 ◽  
Vol 157 ◽  
pp. 106132
Author(s):  
Arslan Jamil ◽  
Saadia Tabassum ◽  
Muhammad Waqas Younis ◽  
Ammad Hassan Khan ◽  
Zia ur Rehman ◽  
...  

2017 ◽  
Vol 3 (2) ◽  
pp. 208-219 ◽  
Author(s):  
Shan Jiang ◽  
Joseph Ferreira ◽  
Marta C. Gonzalez

1979 ◽  
Vol 22 (1) ◽  
pp. 17-21
Author(s):  
C. B. Spengler
Keyword(s):  

2021 ◽  
Vol 25 (2) ◽  
pp. 253-277
Author(s):  
Shinya Konaka

This article explores an overlooked aspect of the 'resilience of pastoralism' in crises through an ethnographic case study of a series of conflicts between the Samburu and the Pokot in Kenya that erupted in 2004. Emery Roe's concepts of reliability professionals and real-time management of pastoralists are utilised as theoretical frameworks for this study. It was observed that the 'logic of high input variance matched by high process variance to ensure low and stable output variance' occurred through the formation of clustered settlements and an inter-ethnic mobile phone network. This case illustrates how pastoralists endured the conflict as reliability professionals.


Author(s):  
Briana McFadden ◽  
Elamathi Balasubramani ◽  
Wakama E. Miebaka
Keyword(s):  

Author(s):  
Harald Sterly ◽  
Benjamin Etzold ◽  
Lars Wirkus ◽  
Patrick Sakdapolrak ◽  
Jacob Schewe ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document