Dissertations / Theses on the topic 'Mobile forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 39 dissertations / theses for your research on the topic 'Mobile forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bade, Hans, and Oscar Hedlund. "Anti-Forensik : Anti-forensiska metoder på mobila enheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.
Full textMobile phones have become essential for the extraction of digital artifacts in foren-sic investigations. Android’s Linux-based operating systems bring greater potentialfor anti-forensic methods, which means that knowledge of anti-forensics is essen-tial to today’s IT forensic investigators. In this study, the effect of anti-forensicson Android-based mobile devices is highlighted, as well as revealing today’s anti-forensic attack methods against forensic tools. By experiment, it is shown how toprevent a forensic tool from extracting data by using a simple script.
Andriotis, Panagiotis. "Towards task automation for mobile device forensics." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.690380.
Full textUz, Ali. "The Effectiveness of Remote Wipe as a Valid Defense for Enterprises Implementing a BYOD Policy." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30376.
Full textShakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.
Full textAl, Tawqi Masoud. "Architecture and design of Process Based Framework for Mobile Forensics (PBFMF)." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845660/.
Full textHomem, Irvin. "Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments." Licentiate thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-130742.
Full textNordin, Anton, and Felix Liffner. "Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40207.
Full textZhao, Xiwei. "Foundational Forensic Techniques for Cellular and Ad Hoc Multi-hop Networks." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/23.
Full textSurrao, Alicia M. "Advancing Column Chromatography by Improving Mobile Phase Chemistry for the Separation of Trace Uranium, Plutonium, Strontium, and Barium." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1529666911529026.
Full textCinti, Mariagrazia. "Metodologie e tecniche per l'analisi forense di dispositivi di telefonia mobile." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6677/.
Full textOskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.
Full textMattsson, Emil, and Marcus Albrektsson. "Mobil strömförsörjning med hjälp av HotPlug : Examensarbete på programmet IT-forensik och informationssäkerhet, 120p." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5112.
Full textDetta arbete har gjorts för att undersöka om det finns en möjlighet att kringgå problemet med stationära datorers strömförsörjning, vid nedstängning genom att man drar ut strömkabeln, i syftet att minimera dataförlusten ur en forensisk synvinkel. Arbetet är också till för att undersöka om det teoretiskt skulle gå att lösa problemet. När man drar ur strömkabeln ur en stationär dator kommer flyktig data att försvinna och gå förlorad vilket ur en forensisk synvinkel kan betyda förlust av bevis.
Nguyen, Lam Ngoc. "Big brother forensic: A novel approach to mobile phone text detection via CCTV." Thesis, Nguyen, Lam Ngoc (2020) Big brother forensic: A novel approach to mobile phone text detection via CCTV. Masters by Coursework thesis, Murdoch University, 2020. https://researchrepository.murdoch.edu.au/id/eprint/59304/.
Full textNembandona, Phillimon. "Mobile bullying : investigating the non-technical factors that influence forensic readiness in township schools in South Africa." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20706.
Full textBergholm, Johan, Sascha Gallardo, and Jonny Svensson. "Positionering och Spårning av mobila enheter, ur ett IT–forensiskt perspektiv." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24177.
Full textAronsson, John, and Percy Bolmér. "Hur forensiska verktyg påverkar integriteten på mobiltelefoner." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32686.
Full textThe rising use of smartphones and other mobile devices in society today has resulted in a higher prevalence of these in crimes and crime investigations. The information in these devices must be extracted and the integrity of the extracted information assured. The goal of this project is to determine whether the two forensic software programs Xry and Encase tamper with the extracted data. To answer this, a literary study together with an interview and two experiments were performed. The result from the experiments determined that data changes occured between extractions. Further analysis explained the changes to be caused by the devices themselves, and as a consequence of rooting. The conclusion drawn from the result was that the softwares programs did not tamper with the material during the extraction-process.
James, Peter. "Secure portable execution and storage environments: A capability to improve security for remote working." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1707.
Full textLisander, Joakim, and Niklas Lyxell. "Problem kring mobilforensik : En sammanställning om hur mobiltelefoner och forensiska verktyg hanterar kryptering, utvinning och molnlagring." Thesis, Högskolan i Halmstad, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30747.
Full textHubac, Sylvain. "Nouvelles stratégies d'analyses rapides d'acides nucléiques : étude et développement de dispositifs de prélèvements biologiques à des fins d'identification par empreinte génétique." Thesis, Cergy-Pontoise, 2017. http://www.theses.fr/2017CERG0872.
Full textForensic sciences can be defined as the used of technical processes to judicial investigations allowing the scientific study of traces and evidences found on crime scenes.Since the discovery of DNA fingerprinting by Sir Alec Jeffreys in 1984, the legal world has become deeply rooted in the DNA by successive technological developments in molecular biology and its applications in forensic. The need for instant response is omnipresent in the minds. The key to success is the implementation of simple, sensitive, reliable analytical techniques that enable results to be achieved in the shortest possible time.During these technical processes, the collection of biological samples, is an unavoidable and a crucial step that will condition the analysis success rate. This study consisted in developing efficient biological collecting solutions either by diverting from their original function the existing solutions or by developing simple but innovative solutions combining the advantages of the existing solutions. This allowed developing the micro-swab GendSAG. The potentialities of GendSAG make it possible to propose an alternative solution to the commercial rapid DNA analysis integrated systems. This rapid, cost effective and high-throughput DNA analysis solution performed in a dedicated mobile laboratory directly into the crime scene enables the large majority of the rapid DNA analysis integrated systems benefits and also all of their limitations
Passetti, Renata Regina 1981. "O efeito do telefone celular no sinal da fala : uma análise fonético-acústica com implicações para a verificação de locutor em português brasileiro." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/271133.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Estudos da Linguagem
Made available in DSpace on 2018-08-27T03:40:06Z (GMT). No. of bitstreams: 1 Passetti_RenataRegina_M.pdf: 2198292 bytes, checksum: 75f3471d8eeffbfb0346d7705e4ea136 (MD5) Previous issue date: 2015
Resumo: Esta dissertação avalia os efeitos causados ao sinal da fala pela transmissão telefônica de linhas móveis e, com isso, busca determinar o grau de modificação fonético-acústica intralocutor causado pelo filtro de banda do canal telefônico à voz habitual e os efeitos que a transmissão telefônica exerce sobre as vogais orais do português brasileiro, pelo estudo de parâmetros acústicos que são afetados por esse tipo de transmissão. As análises investigaram quais características acústicas eram modificadas e quais permaneciam inalteradas na fala de indivíduos diante da utilização de telefones celulares quando comparadas a gravações diretas. O corpus constitui-se de gravações de 10 locutores do sexo masculino, realizadas de forma simultânea nas condições via celular e direta, pelo posicionamento de um microfone em frente aos sujeitos enquanto falavam ao celular. As vogais orais do português brasileiro foram transcritas e segmentadas e, posteriormente, foi utilizado o script ForensicDataTrecking para extração automática das seguintes classes de parâmetros: frequência dos três primeiros formantes (F1, F2 e F3), frequência fundamental (F0), ênfase espectral, frequência de base da fundamental (baseline) e duração interpicos de F0 presentes no discurso. Foram conduzidas análises acústicas com o objetivo investigar os efeitos da transmissão telefônica sobre as vogais orais do português brasileiro, sobre os locutores e no espaço vocálico dos locutores. As análises foram validadas estatisticamente. Para a análise do efeito da transmissão telefônica sobre as vogais orais do português brasileiro, os resultados revelam alterações nas frequências do primeiro e o terceiro formante de, aproximadamente, 14%, na condição telefônica. Em relação às frequências do segundo formante, os resultados da análise de dispersão mostraram que a transmissão telefônica agiu de forma a aumentar artificialmente as frequências de vogais com baixos valores de F2 e a diminuir as frequências de vogais com altos valores de F2. Dos parâmetros acústicos investigados na análise dos efeitos da transmissão telefônica sobre os locutores, apenas a baseline e a duração interpicos de F0 não apresentaram diferenças estatisticamente significativas entre as duas condições de gravação, indicando robustez aos efeitos da transmissão telefônica e podendo ser considerados como parâmetros eficazes na análise forense. Esta análise revelou, também, que a transmissão telefônica agia de maneira distinta nos sujeitos, o que permitiu que fossem agrupados a depender do parâmetro investigado. A análise do efeito telefônico no espaço vocálico dos sujeitos complementou os resultados das análises anteriores. De modo geral, observou-se um abaixamento global do espaço vocálico na gravação telefônica, influenciado pelo aumento nas frequências de F1. A diminuição dos valores de F2 para as vogais anteriores e o aumento nos valores deste formante para vogais posteriores comprimiu o espaço vocálico da maioria dos sujeitos. As modificações nas disposições das vogais têm implicações perceptuais, uma vez que o abaixamento e redução do espaço vocálico fizeram com que as vogais se situassem proximamente a regiões centrais, podendo soar como mais abertas no telefone celular
Abstract: This dissertation evaluates the effects to speech signal due to telephone transmission of mobile phones and seeks to determine the degree of intra-speaker acoustic-phonetic modification caused by the mobile phone band-pass filter to the speech signal and the telephone transmission effects over the Brazilian Portuguese oral vowels by the study of the acoustic parameters affected by this kind of transmission. The analysis investigated which are the acoustic cues which are modified and which cues remain undifferentiated in the speaker's speech by the use of a mobile phone in comparison to direct recordings. The corpus used consists of simultaneous recordings of 10 male speakers in two conditions: via mobile phone and face-to-face, by placing a microphone directly in front of the subjects. The Brazilian Portuguese oral vowels were segmented and transcribed and the ForensicDataEvaluator script was used to automatically extract the following acoustic parameters: three first formants frequencies (F1, F2 and F3), median of fundamental frequency (F0), spectral emphasis, fundamental frequency baseline and F0 inter-peaks duration. The acoustic analyses aimed at investigating the telephone transmission effects over the Brazilian Portuguese oral vowels, over the speakers and at the speakers¿ vowel space. The analyses were supported statistically. The analysis of the telephone transmission effect over the Brazilian Portuguese oral vowels showed variations of 14% in the frequencies of the first and the third formants. The analysis of the scatter plot of F2 values showed that the mobile phone band-pass filtering has an effect of shifting upwards vowels with low values of F2 and shifting downwards vowels with high values of F2. For the analysis of the telephone transmission effects over the speaker only the acoustic parameters "fundamental frequency baseline" and "F0 inter-peaks duration" did not show any difference statistically significant between the two recording conditions, demonstrating robustness to the telephone transmission effects, which make them able to be considered as powerful parameters for forensic analysis. This analysis also revealed that the telephone transmission affects the speakers in different ways, which set them into different groups of speakers depending on the parameter analyzed. The analysis of the telephone effect in the speakers¿ vowel space shed some light on the previous analyses. In general, the increase of the F1 values in the mobile phone situation caused a global downward displacement of the vowel space. The decrease of the F2 values for the front vowels and the increase of the values of this formant for back vowels reduced the area of the vowel space for the most of the subjects. The vowels rearrangement at the vowel space in the telephone situation has some perceptual implications, since the lowering and reduction of the vowel space made the vowels be placed at its center, which could result in hearing these vowels as more open over the mobile phone
Mestrado
Linguistica
Mestra em Linguística
"Enhancing Mobile Forensics on iOS." Master's thesis, 2015. http://hdl.handle.net/2286/R.I.36434.
Full textDissertation/Thesis
Masters Thesis Computer Science 2015
葉書廷. "iOS Forensics in Instant Message with Mobile Explorations." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/nxjb2c.
Full text(11205891), Tanvi Milind Gandhi. "Forensic Analysis of GroupMe on Android and iOS Smartphones." Thesis, 2021.
Find full text(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.
Find full textChen, Sheng-Wen, and 陳聖文. "Mobile Forensics System – Design and Implementation of Android Live SD." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/74kgzn.
Full text國立高雄師範大學
資訊教育研究所
100
Android is a fast-developing smart phone operating system with rising penetration rate. It becomes more vital in both daily life and work for people than traditional feature phones because users can themselves add plug-in programs, as what they can do in computers. Being vital to users means smart phones contain rich personal information, and this indeed raises concern to maintain the information security on devices. In recent years, phone security events emerges, and the terms of personal information leakage and malware embedding is no news anymore. Therefore, besides the emphasis on regular guarding practice by users, it is important as well how forensic professionals could collect evidences as possible from victim phones as soon as the security events happened. In this research, by using the characteristic of allowing users to legally update the service packs in Android, we designed and implemented in the memory cards to realize Live SD platform to perform mobile digital forensics on Android smart phones referring to the theory of Live CD/DVD/USB digital forensics in computers. The physical data acquisition and disk image making are performed for evidence collection on the phones which are not Root-authorized. As for Live SD, based on Android OS as digital forensic platform, we developed and designed with open-source-code tools and integrated the required forensic tools into Android Live SD platform to conduct forensic analysis.
左育丞. "High-tech Crime and Digital Forensics in Mobile iPhone Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/2wrvr9.
Full textBernardo, Bruno Miguel Vital. "Toolbox application to support and enhance the mobile device forensics investigation process - breaking through the techniques available." Master's thesis, 2021. http://hdl.handle.net/10362/113177.
Full textOne of the main topics that is discussed today is how can a person leverage on technology on a positive and secure way in order to enhance their daily life, making it a healthier, more productive, joyful and easier. However, with improvements in technology, comes challenges for which there is not yet a stable and safe way to overcome. One of the greatest challenges that people are faced has to do with their concern on their privacy and on the safeguard of their sensitive information that is stored in any device that one uses. In fact, one of the most used technology is the Mobile, which can take several forms, features, shapes, and many other components. In line manner, cybercrime is growing rapidly, targeting the exploitation and retrieval of information from these gadgets. Even so, with a Mobile, comes several challenges including a rapidly dynamic change in its landscape, an everincreasing diversity of mobile phones forms, integration of the information on a Mobile into the Cloud and IoT. As such, it’s vital to have a stable and safe toolbox that will enable a digital investigator to potentially prevent, detect and solve any issue that may be related to Mobile Device Forensics while solving out various investigations, being it criminal, civil, corporate or any other.
Bopape, Rudy Katlego. "Towards a unified fraud management and digital forensic framework for mobile applications." Diss., 2015. http://hdl.handle.net/10500/21202.
Full textComputing
M. Sc. (Computing)
Fang, Yen-Fei, and 方彥霏. "Study on Constructing Digital Evidence Forensics Standard Operating Procedures for Mobile Device - Extraction and Analysis of Digital Evidence on Smartphone." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/qrh62j.
Full text國立宜蘭大學
多媒體網路通訊數位學習碩士在職專班
104
As Internet technology improves, mobile communications protocols mature and intelligent diversification and the popularity of mobile phones, change the habits of people using their cell phones, cell phone is no longer a traditional phone, smart phone, you can use communications software to communicate, surf the Web page associated with the transaction and storage of personal information ( Such as photos, notes, etc ), It's like computer action. Convenience of mobile phones, making it dependent on deepening, even those tools of crime, smart phone as the computer there are a lot of electromagnetic records, these records are digital evidence forensic value. In view of this, traditional methods of forensic equipment and will not be enough to gather digital evidence in the mobile phone. About digital evidence, and selection and use of forensic tools, is the main professional and examiner must have basic knowledge. Digital evidence collection, analysis, extraction process, you must use the standard digital forensics process in order to enhance its credibility and effectiveness. According to the scholars of this study by Professor I-Lon Lin 's Digital Evidence Forensics Standard Operating Procedure (DEFSOP), To constructing Digital Evidence Forensics Standard Operating Procedure for Mobile Device (DEFSOP For Mobile Device ). With the ISO 27037:2012 and ISO 27041:2015 analysis than to verify DEFSOP Rigorous and availability through the example DEFSOP For Mobile Device integrity and effectiveness. Mobile phone forensics operations, data extraction has some software tools can be used, under the multiple tools of interaction uses, extract the necessary evidence is not a problem, more difficult question is how to properly manage all these digital evidence, its maximum effectiveness. This study selected forensics tool for Android provides the ADB and the Cellebrite UFED through digital evidence forensics software extraction, classification and identification of data availability and validity of cross-analysis, comparison of reducing crime facts. The results of this study contribute: First, this study suggests that the Digital Evidence Forensics Standard Operating Procedure for Mobile Device (DEFSOP For Mobile Device) prototype, and three real cases to prove the four stages theory concepts, phases of preparation, action and reporting, provides event investigation and forensics officers followed standard operating procedures. Second, this study used forensic tools ADB and UFED , Through the comparative analysis of the advantages and disadvantages, operation and presentation of results, provide event investigation forensic tools reference you can follow. Three, an event-handling standards, this paper studies the international funding ISO 27041:2015 and use Cellebrite UFED Forensic tool test for China's first research master's thesis.
Yang, Chieh-Chiang, and 楊傑強. "Smart Mobile Device Forensic Platform: Business Model." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/8cx4ma.
Full text國立臺北科技大學
管理學院經營管理EMBA泰國專班
105
Ever since the release of the first iPhone in 2007, the rise of smart mobile devices has dramatically reconstructed the sphere of mobile network. Ten years ago, we could hardly imagine using phones to connect to the internet. In addition to a small unattractive screen display, phones at the time were accompanied by slow connection speed and expensive data transfer cost, which discourages the majority from using phone as a medium for internet connection. Rather, only a handful of high-end people required the use of mobile devices to perform data transmission, to send, and to receive email for business purposes. In less than a decade, mobile communication technology had surpassed people’s imagination. As communication technology moves forward from 2G (GPRS/EDGE) to 3G UMTS to 4GLTE, people who do not subscribe to wireless mobile internet services nowadays have shifted to become the minority group. In recent years, the incorporation of smart mobile devices such as smart phones, tablets, smart watches, etc. in daily lives has enabled criminals to commit crime through the utilization of smart mobile device’s wide range software applications, posing major security issues in many countries. This study utilizes smart mobile equipment, digital forensic procedures, mobile forensic tools to extract and gather criminal suspect information onto the cloud. Then, Big Data analysis can be applied to digital forensic analysis data extraction, mass storage data analysis of criminal patterns, and extraction of criminal intelligence as a digital forensic business module (Economic Model of Cloud Data Sharing).
陳明源. "Forensic Analysis of Mobile Instant Messaging Applications on Android Smartphones." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/4rw35z.
Full text中央警察大學
刑事警察研究所
106
Mobile instant messaging applications are very popular among smartphone users because they provide the convenience for interpersonal communication. Through the internet, users can communicate with each other using messages, texts, files, pictures, movies, and voices. However, they can also be used as communication tools for criminal activities, and criminals may even use their various social functions to assist their crim-inal activities. In actual criminal investigation, investigators mostly use the expensive equipment provided by private companies to collect and analyze the data in smartphones. For new smartphones or new version applications, it often happens that the data cannot be collected and ana-lyzed because the speed of the development of smartphones is much faster than the speed of updating the equipment. For smartphone operating systems, Android currently has the highest market share. In this paper, we use two free tools, ADB (Android Debug Bridge) and SQLite Database Browser, to collect and analyze the data of 10 popular mobile instant messaging applications for Android smartphones. Not only we can save money, but we can also speed up the collection and the analysis of data. In addition, we also propose a method to solve the problem of collecting and analyzing the cloned mobile instant messaging applications.
Peng, Wan-Ting, and 彭琬婷. "The Design and Implementation of Cloud Anti-Forensic System on Android Mobile Devices." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/53469502981104632149.
Full text國立高雄師範大學
資訊教育研究所
102
Android is the operating system used on mobile devices by Goggle. The fact that the sale numbers of smart phones and the amount of storage have increased and there exist a wide variety of applications for users to download all make smart phones an integral part of people's lives. Due to the fact that users are more inclined to store their personal data on smart phones and the bill of personal information protection has passed at the end of October last year, the safety of personal data on smart phones has received greater attention. The definition of Anti-forensics is the attempt to compromise effective and useful digital evidence to result in negative influence during the process of investigation. There are four types of Anti-investigation: Data Hiding, Artifact Wiping, Trail Obfuscation and Counterfeiting evidence. The research is based on Data Hiding of Anti-forensics and conducts encryption and decryption towards private information such as, contacts, call logs and SMS through the powerful computing ability of Cloud, which quickens the processes of Anti-forensics effectively, prevents and reduces the chances of the disclosure and leakage of private information, and protects personal data from being utilized by people with bad intentions. At the end, the system is implemented on Android mobile devices.
Tsai, Yuan-Chi, and 蔡沅錡. "Design and Implementation of Forensic Systems with Unlock Screen and Physical Acquisition for Android Mobile." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/36041971267622794939.
Full text國立高雄師範大學
資訊教育研究所
101
With the prevalence of domestic Internet service, the use of smart phones becomes popular. The Android system published by Google in 2007 soon dominated the market of operating systems of smart phones. In order to ensure that users’ privacy is secured, Android utilizes the basic security measure Screen Lock (including Pattern Lock, PIN Lock and Password Lock). However, the design may be misused and become a means to protect crimes. Therefore the problems of how to acquire the digital evidence when the device is locked and how to unlock the device in order to finish other forensic investigations remain to be solved. Based on the mobile forensics protocol provided by NIST, the research focuses on how to do physical acquisition, disk image and unlock screen of the device when android smart phone are on Screen Lock. With a personal computer, the acquired data can be further analyzed and the deleted data can be recovery. Finally,unlock mobile can be finish other forensic works.
Pin, Chang Feng, and 鄭鋒濱. "A Study on the Differences of Capturing Digital Evidence by Forensic Tools Based on Mobile Device Platform." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75964868104108420059.
Full text國防大學
資訊管理學系
103
With the popularity of mobile devices and Internet use, crime information network has been significantly improved, the crime scene is no longer limited to physical traces card crime, law enforcement officers with traditional forensic equipment and tools are insufficient to capture Internet digital space scene evidence.Therefore, law enforcement officers are required to understand the extent of the platform for mobile devices, such as electromagnetic records which may be generated, which will not get the record, what tools should be used to carry out forensic,it’s their basic knowledge. In response to the investigation of crime and improve smartphone efficiency and detection rate, investigators must be able to promptly identify and trace the source of the problem and, through compliance with standard operating procedures, evidence collection and processing so that come with digital evidence in court evidence probative force and enhance the professionalism of the forensic report and credibility. Thus, for different smartphone platforms crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence, as court evidence in the courts has become very important. and how to provide an appropriate recommendations or guidelines for the use of law enforcement personnel reference, has become very urgent and important issues worth exploring. This study attempts to create a different smartphone platforms use the same context, and the use of different professional forensic tools implementation, by sorting, classification, analysis and other steps to retrieve the digital evidence to compare the implementation of key differences, such as the mirror file produced time, file restore time, the identification data integrity, data identification readability, data identification number, to restore the hardware and software categories and support system, expect to obtain an objective relative differences in data, and then for different smartphones platform crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence put forward appropriate recommendations or guidelines related to law enforcement officers to serve for reference use; study showed relevant information is available forensic personnel familiar with the operation and forensic tools to be an effective reference for the court, and proposed future direction for the development of resistance and forensic work.
LIN, CHAO-MENG, and 林照萌. "Research on Constructing Moblie Device Digital Evidence Forensics Mechanism and Case Verification - Taking Instant Messaging Software as an Example." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/z9qddq.
Full text國立宜蘭大學
多媒體網路通訊數位學習碩士在職專班
107
As technology becomes more developed, mobile devices continue to update service offerings, use mobile phones to communicate messages and communicate with each other. The main reason for the popularity of instant messaging software is their cross-platform compatibility and minimal or no additional cost. Through handheld mobile devices, you can use the communication software to communicate with each other, browse the web and transactions, and store personal related information (such as photos, notes, etc.). The convenience brought by mobile phones has made people's reliance on it deeper and even become a criminal tool for people with a heart. There are a large number of forensic digital evidence in smart phones. In view of this, traditional identification devices and methods will not be enough to collect. Digital evidence in the phone. The cognition of electromagnetic recording and the selection and use of forensic tools will be the knowledge that must be possessed by forensic personnel. The digital evidence identification enhances the overall evidence ability and evidence proof through the collection, analysis, and extraction processes in accordance with the standard identification process. This study is based on the Digital Evidence Standard Operating Procedure (DEFSOP) proposed by Professor Lin Yilong, a domestic scholar, to construct a new DEFSOP for Mobile Forensis. Verify the rigor of New DEFSOP for MF by comparing with ISO/IEC 27037:2012, ISO/IEC 27041:2015, ISO/IEC 27042:2015 and ISO/IEC 27043:2015, and verify New DEFSOP for Mobile by example The integrity and availability of Forensics. In the process of digital forensic work, the use of tool software to extract important data is no longer a problem. The more difficult thing is how to properly keep the evidence and maximize its effectiveness. The digital identification tools used in this study are UFED, XRY and MobileEdit, which extract important evidence through the forensic software, classify and identify the availability, analysis and comparison of the data to restore the truth of the crime.
Chou, Po-How, and 邱柏豪. "The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/9j4589.
Full text國立交通大學
管理學院資訊管理學程
106
Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
Barmpatsalou, Konstantia. "Uma integração de métodos de aquisição forense em tempo real nos sistemas PPDR da próxima geração." Doctoral thesis, 2021. http://hdl.handle.net/10316/95279.
Full textOs dispositivos móveis substituíram os computadores pessoais e portáteis em muitos aspectos da rotina diária das pessoas. Na practica, eles transformaramse em impressões digitais que carregam uma quantidade crítica de informações pessoais, que variam desde conteúdo multimedia e registos de comunicação, a geolocalização e dados de transações eletrônicas. No entanto, o uso de dispositivos móveis não se limita às interacções pessoais de um indivíduo. Os dispositivos móveis podem constituir partes de redes de comunicação corporativas ou dedicadas. As redes corporativas e da emergência como os sistemas de Proteção Pública e Mitigação de Desastres (PPDR), exigem o estabelecimento de um ambiente altamente seguro, para proteger vários bens críticos. Além disso, organizações como a Polícia Judiciária acedem dados de dispositivos móveis de terceiras entidades como provas para investigações criminais. A aquisição e análise forense móvel têm um papel crucial tanto na proteção de um ambiente PPDR contra ataques intencionais ou uso indevido dos utilizadores, como na condução de uma investigação criminal robusta. Esta tese estuda o papel da aquisição e análise forense para sistemas PPDR, introduzindo uma metodologia para perfs digitais automatizados e identifcação de padrões suspeitos a partir de dados e metadados de dispositivos móveis. Três técnicas de computação inteligente, nomeadamente Fuzzy Systems, Redes Neuronais (RNs) e Adaptive Neuro-Fuzzy Inference System (ANFIS) são usadas para construir perfs criminais e identifcar padrões suspeitos em dados e metadados provenientes de chamadas e SMS para três cenários de casos de uso diferentes. Mais especifcamente, os Sistemas Fuzzy servíram como prova de conceito para detectar a deserção de agentes PPDR realizada por SMS. Um cenário mais complexo envolveu o uso de RNs e ANFIS, que foram empregados como meio de identifcação de padrões suspeitos de chamadas e SMS para casos de cyberbullying e de tráfico de droga. Os resultados que foram produzidos durante todas as fases experimentais foram bastante satisfatórios e foram comparados para defnir a técnica mais apropriada para a identifcação de padrões suspeitos.
Mobile devices have substituted desktop and portable computers in many aspects of people’s everyday routine. Practically, they have become digital fngerprints that carry a critical amount of personal information, varying from multimedia and communication logs to geolocation and electronic transaction data. Moreover, the usage of mobile devices is not limited to an individual’s personal interactions. The aforementioned devices may also constitute parts of corporate or dedicated communication networks. Enterprise and frst-responder communication networks, such as Public Protection and Disaster Relief (PPDR) systems require the establishment of a highly secured environment, in order to protect various critical assets. Moreover, services such as law enforcement may need to access third-party mobile device data as evidence for criminal investigations. Mobile forensic acquisition and analysis play a crucial role towards both the protection of a PPDR environment against intentional attacks or potential user misuse and the conduction of a robust criminal investigation. The current thesis studies the role of forensic analysis in use cases related to law enforcement investigations by introducing a methodology for automated digital profling and suspicious pattern identifcation from mobile device data and metadata. Three intelligent computation techniques, namely Fuzzy Systems, Neural Networks (NNs) and the Adaptive Neuro-Fuzzy Inference System (ANFIS) are used for constructing criminal profles and identifying suspicious patterns in calls and SMS evidence data and metadata for three different use case scenarios. More specifcally, Fuzzy Systems served as proof-of-concept for detecting PPDR ofcers’ defection performed by SMS. A more complex scenario for call and SMS suspicious pattern identifcation of cyberbullying and low-level drug dealing cases was documented with the use of NNs and ANFIS.
Visser, Bennet Louis. "The significance of physical surveillance as a method in the investigation of insurance fraud: a Discovery Life perspective." Diss., 2015. http://hdl.handle.net/10500/20182.
Full textThe primary aim of this study is to determine the significance of the application of physical surveillance as a method in the investigation of insurance fraud conducted by the Surveillance Unit at the Forensic Department of Discovery Life. Various objectives were fulfilled in this study: To explore, identify and describe the value of the application of physical surveillance, as a forensic investigation method, in order to determine the significance of this method in the investigation of insurance fraud at the Forensic Department of Discovery Life. To determine whether the application of physical surveillance at the Forensic Department of Discovery Life is achieving its intended objective relating to the degree to which the beneficiary’s (Discovery Life) situation has changed as a result of this method. To apply new information, acquired from the findings of this study, to further develop good practice and enhance performance in order to empower investigators at Discovery Life with new knowledge relating to the application of physical surveillance in the investigation of insurance fraud. Semi-structured interviews were conducted with forensic investigators employed at the Forensic Department at Discovery Life. The research has revealed that the majority of forensic investigators, other than the Surveillance Unit, at the Forensic Department of Discovery Life do not utilise physical surveillance during insurance fraud investigations to assist them in gathering evidence. These investigators also had a lack of knowledge and skills regarding the utilisation of physical surveillance during insurance fraud investigations and the advantages of this method during insurance fraud investigations. As a result of the non-utilisation of physical surveillance during insurance fraud investigations conducted at the Forensic Department of Discovery Life, important information and evidence with regard to the movement and actions of identified perpetrators who commit insurance fraud are lost to the investigators. However, the significance of the application of physical surveillance in the investigation of insurance fraud is emphasised by the forensic investigators attached to the Surveillance Unit of Discovery Life who utilise physical surveillance on a daily basis to investigate insurance fraud. The research has further revealed that insurance fraud is a major concern to the insurance industry, but can be mitigated through the implementation of unconventional investigative methods, such as physical surveillance, to enhance investigative capabilities. It was recommended that all forensic investigators at Discovery Life be trained in the techniques of physical surveillance to address shortcomings of general and out-dated investigation methods.
Criminology and Security Science
M. Tech. (Forensic Investigation)
Lochner, Hendrik Thomas. "Kartering van selfoontegnologie." Diss., 2007. http://hdl.handle.net/10500/554.
Full textCriminology
M.Tech. (Forensic Investigation)