To see the other types of publications on this topic, follow the link: Mobile forensic tools.

Journal articles on the topic 'Mobile forensic tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile forensic tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.
APA, Harvard, Vancouver, ISO, and other styles
2

Osho, Oluwafemi, and Sefiyat Oyiza Ohida. "Comparative Evaluation of Mobile Forensic Tools." International Journal of Information Technology and Computer Science 8, no. 1 (January 8, 2016): 74–83. http://dx.doi.org/10.5815/ijitcs.2016.01.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
APA, Harvard, Vancouver, ISO, and other styles
4

Curran, Kevin, Andrew Robinson, Stephen Peacocke, and Sean Cassidy. "Mobile Phone Forensic Analysis." International Journal of Digital Crime and Forensics 2, no. 3 (July 2010): 15–27. http://dx.doi.org/10.4018/jdcf.2010070102.

Full text
Abstract:
During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone forensic analysis. In this regard, the authors discuss mobile phone forensic analysis, what it means, who avails of it and the software tools used.
APA, Harvard, Vancouver, ISO, and other styles
5

Riadi, Imam, Anton Yudhana, and Mushab Al Barra. "Forensik Mobile pada Layanan Media Sosial LinkedIn." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 1 (January 20, 2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.

Full text
Abstract:
The research explores mobile forensic on LinkedIn social media. Forensic mobile finds digital evidence of job hoax cases in LinkedIn, investigation using the NIST (National Institute of Standard and Technology) method. Data collection techniques using Andriller tools in investigations. Data examination using tools Root Browser, Autopsy in the forensic process. data analysis using tools MOBILedit in the forensic process. The investigation found digital evidence of log activity, a status update on LinkedIn. Other results found in the investigation are 17 WiFi password, 117 download history, 263 phone calls, 1 file deleted, 1 file hidden, and 1 file raised, the research has reached the expected target.
APA, Harvard, Vancouver, ISO, and other styles
6

Umar, Rusydi, Imam Riadi, and Guntur Maulana Zamroni. "Mobile Forensic Tools Evaluation for Digital Crime Investigation." International Journal on Advanced Science, Engineering and Information Technology 8, no. 3 (June 20, 2018): 949. http://dx.doi.org/10.18517/ijaseit.8.3.3591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.

Full text
Abstract:
Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.
APA, Harvard, Vancouver, ISO, and other styles
8

Zamroni, Guntur M., and Imam Riadi. "Mobile Forensic Tools Validation and Evaluation for Instant Messaging." International Journal on Advanced Science, Engineering and Information Technology 10, no. 5 (October 15, 2020): 1860. http://dx.doi.org/10.18517/ijaseit.10.5.7499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (June 20, 2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.

Full text
Abstract:
Digital forensics is a field that concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. Most of the forensic analysis software is proprietary, and eventually, specialized analysis software is developed in both the private and public sectors. This paper presents an alternative of forensic analysis tools for digital forensics, which specifically to analyze evidence through keyword indexing and searching. Keyword Indexing and Searching Tool (KIST) is proposed to analyze evidence of interest from WhatsApp chat text files using keyword searching techniques and based on incident types. The tool was developed by adopting the Prototyping model as its methodology. KIST includes modules such as add, edit, remove, display the indexed files, and to add WhatsApp chat text files. Subsequently, the tool is tested using functionality testing and user testing. Functionality testing shows all key functions are working as intended, while users testing indicates the majority of respondents are agree that the tool is able to index and search keyword and display forensic analysis results.
APA, Harvard, Vancouver, ISO, and other styles
10

Ghannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.

Full text
Abstract:
WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.
APA, Harvard, Vancouver, ISO, and other styles
11

Faheem, Muhammad, Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 1–19. http://dx.doi.org/10.4018/ijdcf.2015040101.

Full text
Abstract:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
APA, Harvard, Vancouver, ISO, and other styles
12

Souvignet, T., J. Hatin, F. Maqua, D. Tesniere, P. Léger, and R. Hormière. "Payment card forensic analysis: From concepts to desktop and mobile analysis tools." Digital Investigation 11, no. 3 (September 2014): 143–53. http://dx.doi.org/10.1016/j.diin.2014.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dégardin, Klara, and Yves Roggo. "Innovative Strategy for Counterfeit Analysis." Medicine Access @ Point of Care 1 (January 2017): maapoc.0000013. http://dx.doi.org/10.5301/maapoc.0000013.

Full text
Abstract:
Currently, counterfeit medicine is a significant issue for the pharmaceutical world, and it targets all types of therapeutic areas. The health consequences are appalling, since counterfeit medicines can contain impurities and the wrong chemical composition, and can be manufactured and/or stored in dreadful conditions. The provision of fast and reliable analytical tools can contribute to an efficient fight against this phenomenon. In this paper, an analytical strategy based on mobile and forensic laboratories is presented. The mobile equipment, composed of handheld x-ray fluorescence, Raman, infrared, and near-infrared spectrometers, and a handheld microscope, can be used as a first screening tool to detect counterfeits. The counterfeits can then be confirmed in a forensic-dedicated lab in which the chemical composition of the counterfeits is determined to evaluate the danger encountered by the patients. Relevant links with former counterfeit cases then can be revealed based on the analytical data, and can be interpreted from a forensic intelligence perspective in order to provide additional information for law enforcement.
APA, Harvard, Vancouver, ISO, and other styles
14

Aslan, Fatmagül, and Hacer Yaşar Teke. "A Case of Burn Related to Over-Heating of The Cell Phone Battery." Bulletin of Legal Medicine 23, no. 3 (December 23, 2018): 209–11. http://dx.doi.org/10.17986/blm.2018345611.

Full text
Abstract:
Contemporary communication tools are rather advanced tools, and cell phones have become indispensable parts of our daily lives. The purpose of this case report is to draw attention to new types of forensic cases that could develop in parallel with the advancement of technology and their consequences. 35-year-old male’s cell phone battery warmed up and burned his left hand, 2x2 cm sized 2nd degree burn wound with a 1x1 cm bulb area in the middle was found on the left hand palm thenar area. Today, mobile phone technology is the most advanced form of mobile communication in communication technologies. In our country and in the world there is a need for detailed studies dealing with health, communication, social, economic and legal aspects.
APA, Harvard, Vancouver, ISO, and other styles
15

Srivastava, Himanshu, and Shashikala Tapaswi. "Logical acquisition and analysis of data from android mobile devices." Information & Computer Security 23, no. 5 (November 9, 2015): 450–75. http://dx.doi.org/10.1108/ics-02-2014-0013.

Full text
Abstract:
Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.
APA, Harvard, Vancouver, ISO, and other styles
16

Ashawa, Moses, and Innocent Ogwuche. "Forensic Data Extraction and Analysis of Left Artifacts on emulated Android Phones: A Case Study of Instant Messaging Applications." Circulation in Computer Science 2, no. 11 (December 20, 2017): 8–16. http://dx.doi.org/10.22632/ccs-2017-252-67.

Full text
Abstract:
The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.
APA, Harvard, Vancouver, ISO, and other styles
17

Barinova, Olga A. "THE USE OF A MIX-450 MOBILE FORENSIC LIGHT SOURCE TO IDENTIFY CRIME TRACES." Russian investigator 12 (December 17, 2020): 3–5. http://dx.doi.org/10.18572/1812-3783-2020-12-3-5.

Full text
Abstract:
One of the tasks of forensic science is to improve the tactics of conducting an inspection of the scene, which is largely associated with the use of modern technical and forensic tools used to detect, fix and seize traces and other material evidence in order to disclose and investigate a crime and establish the identity of the offender. However, as practice shows, the use of traditional technical means — portable sources of ultraviolet radiation to detect traces of biological origin (blood, semen, saliva and other human secretions) is not always effective. This is due to the fact that the intensity of the luminous flux of fluorescent lamps is quite low, which prevents the detection of traces during daylight hours. In addition, long-term illumination of the object, over 5 seconds, causes the destruction of the DNA in the blood and semen, which prevents the possibility of its further examination. At the same time, the arsenal of methods and technical means is constantly expanding. For example, a mobile forensic light source “MIKS-450” has now been developed. However, there is no information about the types of traces detected with its use. To fill this gap, the author of the article carried out a set of experiments, the results of which testify to the effectiveness of its use for detecting traces of human skin and preliminary examination of documents at the scene. The author also comes to the conclusion that the possibility of detecting traces of human skin depends on the physical properties of the trace substance (dirty or clean hands, dry or wet), the structure of the trace-sensing surface (smooth, rough), its color, as well as the time elapsed since the occurrence traces.
APA, Harvard, Vancouver, ISO, and other styles
18

da Silveira, Claudinei Morin, Rafael T. de Sousa Jr, Robson de Oliveira Albuquerque, Georges D. Amvame Nze, Gildásio Antonio de Oliveira Júnior, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware." Applied Sciences 10, no. 12 (June 20, 2020): 4231. http://dx.doi.org/10.3390/app10124231.

Full text
Abstract:
This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.
APA, Harvard, Vancouver, ISO, and other styles
19

D.P., Gangwar, Anju Pathania, Anand -, and Shivanshu -. "AUTHENTICATION OF DIGITAL MP4 VIDEO RECORDINGS USING FILE CONTAINERS AND METADATA PROPERTIES." International Journal of Computer Science Engineering 10, no. 2 (April 30, 2021): 28–38. http://dx.doi.org/10.21817/ijcsenet/2021/v10i2/211002004.

Full text
Abstract:
The authentication of digital video recording plays a very important role in forensic science as well as for other crime investigation purposes. The field of forensic examination of digital video is continuously facing new challenges. At present the authentication of the video is carried out on the basis of pixel-based analysis. Due to the change in technology, it was felt that a new approach is required for the authentication of digital video recordings. In the present work a new approach i.e. analysis of media Information and structural analysis of video containers (boxes/ atoms) of mp4 file format have been applied for identification of original and edited videos. This work is limited only for Mp4 file format because the MP4 compressed format is widely used in most of the mobile phone for video recording and transmission purposes. For this purpose, we recorded more than 200 video samples using more than 20 different mobile phones of different make and models and more than 12 video editors, which are available in open source used for editing purpose. The original and edited MP4 video files were analyzed for their different metadata and structural contents analysis of different file containers (boxes/atoms) using different freeware tools. The details of the work are described below.
APA, Harvard, Vancouver, ISO, and other styles
20

Stanković, Miloš, Mohammad Meraj Mirza, and Umit Karabiyik. "UAV Forensics: DJI Mini 2 Case Study." Drones 5, no. 2 (June 1, 2021): 49. http://dx.doi.org/10.3390/drones5020049.

Full text
Abstract:
Rapid technology advancements, especially in the past decade, have allowed off-the-shelf unmanned aerial vehicles (UAVs) that weigh less than 250 g to become available for recreational use by the general population. Many well-known manufacturers (e.g., DJI) are now focusing on this segment of UAVs, and the new DJI Mini 2 drone is one of many that falls under this category, which enables easy access to be purchased and used without any Part 107 certification and Remote ID registration. The versatility of drones and drone models is appealing for customers, but they pose many challenges to forensic tools and digital forensics investigators due to numerous hardware and software variations. In addition, different devices can be associated and used for controlling these drones (e.g., Android and iOS smartphones). Moreover, according to the Federal Aviation Administration (FAA), the adoption of Remote ID is not going to be required for people without the 107 certifications for this segment at least until 2023, which creates finding personally identifiable information a necessity in these types of investigations. In this research, we conducted a comprehensive investigation of DJI Mini 2 and its data stored across multiple devices (e.g., SD cards and mobile devices) that are associated with the drone. The aim of this paper is to (1) create several criminal-like scenarios, (2) acquire and analyze the created scenarios using leading forensics software (e.g., Cellebrite and Magnet Axiom) that are commonly used by law enforcement agencies, (3) and present findings associated with potential criminal activities.
APA, Harvard, Vancouver, ISO, and other styles
21

Mercado, Melissa C., Deborah M. Stone, Caroline W. Kokubun, Aimée-Rika T. Trudeau, Elizabeth Gaylor, Kristin M. Holland, and Brad N. Bartholow. "Inconsistencies in Overdose Suicide Death Investigation Practice and Potential Remedies Using Technology: A Centers for Disease Control and Prevention Consultation Meeting Summary." Academic Forensic Pathology 11, no. 2 (June 2021): 83–93. http://dx.doi.org/10.1177/19253621211022464.

Full text
Abstract:
Introduction: It is widely accepted that suicides—which account for more than 47 500 deaths per year in the United States—are undercounted by 10% to 30%, partially due to incomplete death scene investigations (DSI) and varying burden-of-proof standards across jurisdictions. This may result in the misclassification of overdose-related suicides as accidents or undetermined intent. Methods: Virtual and in-person meetings were held with suicidologists and DSI experts from five states (Spring-Summer 2017) to explore how features of a hypothetical electronic DSI tool may help address these challenges. Results: Participants envisioned a mobile DSI application for cell phones, tablets, or laptop computers. Features for systematic information collection, scene description, and guiding key informant interviews were perceived as useful for less-experienced investigators. Discussion: Wide adoption may be challenging due to differences in DSI standards, practices, costs, data privacy and security, and system integration needs. However, technological tools that support consistent and complete DSIs could strengthen the information needed to accurately identify overdose suicides.
APA, Harvard, Vancouver, ISO, and other styles
22

Hani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.

Full text
Abstract:
This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving Android smartphone forensic data. The used of smartphone in crime was widely recognized. Several types of personnel information are stored in their smartphones. When the investigator analyses the image data of the smartphone, the investigator can know the behaviour of the smartphone’s owner and his social relationship with other people. The analysis of smartphone forensic data is cover in mobile device forensic. Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence from a mobile device under forensically sound condition. The digital investigation model used in this project is the model proposed by United States National Institute of Justice (NIJ) which consists four phases, which are collection phase, examination phase, analysis phase and presentation phase. This project related with analysis phase and presentation phase only. This paper introduces Visroid, a new tool that provides a suite of visualization for Android smartphone data.
APA, Harvard, Vancouver, ISO, and other styles
23

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Full text
Abstract:
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement, collection and study of computer information in the investigation of crimes. The objects are computer tools and systems, especially forensic technologies of collection (detection, fixation, seizure) and research of these objects to obtain evidence and guidance information. From the modern point of view, the method of crime is determined by personality, subject and circumstances of the criminal attack, the system of actions of the subject, aimed at achieving the criminal goal and united by a single criminal plan. The means of a crime commitment are divided into fully structured, including preparation, commission and concealment, and incomplete, when one or two elements are absent. The formation of the means of a crime is influenced by objective and subjective factors, which determines the determinism and repeatability of the means of the crime.The main means of computer crimes are considered: aimed at hiding unauthorized access to computer tools and systems; the use of Trojans for various purposes; infection of computer systems with viruses; the use of hardware and software systems for mass campaigns of malicious software distribution to mobile devices; computer attacks on local corporate networks, etc.It is established that the criminalistic regularity of the formation and implementation of computer crimes is a mandatory stage of preparation for the crime, which at the same time includes actions to conceal the traces of the crime, i.e. the methods of computer crimes are fully structured
APA, Harvard, Vancouver, ISO, and other styles
24

RYVKIN, STANISLAV, and GEORGE TUROV. "SPECIFIC FEATURES OF CONDUCTING INVESTIGATIVE ACTIONS IN THE ARCTIC." Gaps in Russian Legislation 13, no. 6 (November 30, 2020): 192–95. http://dx.doi.org/10.33693/2072-3164-2020-13-6-192-195.

Full text
Abstract:
He article discusses the features of investigative actions in the Arctic. The purpose of the study is to establish and identify the features of investigative actions in the Arctic zone of the Russian Federation. This is necessary for the quality of preliminary investigation of crimes committed in the Arctic territory in order to protect the rights and freedoms of citizens. Conclusions. As a result of this study, the authors propose: to create an independent investigatory management SK of the Russian Federation in the Arctic zone of the Russian Federation; to consider when carrying out search-educational, investigative and legal actions in the Arctic features climate-geographical, social, organizational, procedural and technical-criminalistic nature; to include in the composition of forces and means of using special icebreaker vessels, vessels of icebreaking type; to use the forensic technique of satellite communication; to attract specialists and experts from military units and also develop mobile criminal investigation groups; to form in educational institutions of legal profile, including in the Military University MO RF program on preparing and conducting inspections of the water surface and the mainland and archipelagos of permafrost, snow and ice cover, and investigations in the Arctic; when conducting inspections, use topographic, sea maps, satellites, balloons, unmanned aerial vehicles, and robotic equipment that allow for both discrete and conventional surveys; it is proposed to strengthen the forensic equipment of investigative units with positioning devices for determining coordinates by translating them from quasi-coordinates; use indirect methods of conducting investigative actions with reconstruction of the situation; use in verbal investigative actions telecommunications forensic software systems in the video conference format, using identity authentication tools.
APA, Harvard, Vancouver, ISO, and other styles
25

Nasirudin, Nasirudin, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 89. http://dx.doi.org/10.32493/informatika.v5i1.4578.

Full text
Abstract:
Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.
APA, Harvard, Vancouver, ISO, and other styles
26

Wan, Xuejiao, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, and Yonghao Mai. "Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices." International Journal of Digital Crime and Forensics 7, no. 1 (January 2015): 1–25. http://dx.doi.org/10.4018/ijdcf.2015010101.

Full text
Abstract:
During the rapid development of mobile wireless technologies and applications, the Android operating system, due to its open-source characteristics, has become the most popular development platform in the smartphone market. Meanwhile, as Android-based intelligent mobiles devices experience a rapid increase in numbers, high-tech crimes involving such devices have become more versatile, affecting an ever increasing amount of data, thus making digital evidence an indispensable part of the evidence that needs to be seriously dealt with during crime investigations. Consequently, understanding the internal structure of Android and the various data operations in the file systems becomes necessary in Android-based digital forensics. In this paper, we survey the state-of-the-art of technologies in Android-based digital forensics and some popular tools in the aspects of data recovery and acquisition, file system analysis and data analysis. We also discuss some technical challenges and point out future research directions in Android-based digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
27

Anshori, Ikhwan, Khairina Eka Setya Putri, and Umar Ghoni. "Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone Android Menggunakan Metode NIJ." IT Journal Research and Development 5, no. 2 (August 19, 2020): 118–34. http://dx.doi.org/10.25299/itjrd.2021.vol5(2).4664.

Full text
Abstract:
Facebook Messenger menjadi media sosial yang popular di tahun 2019 dan angkat sangat pesat perkembangannya dari tahun ke tahun. Meningkatnya jumlah pengguna Facebook Messenger tentu membawa dampak positif dan negatif, salah satu efek negatifnya adalah digunakan untuk tindak kejahatan digital seperti perdagangan narkoba. Cara menangkap para pelaku kejahatan digital maka diperlukan barang bukti pada persidangan. Salah satu ilmu untuk medapatkan barang bukti digital adalah melakukan forensik digital. Forensik digital dapat dilakukan pada smartphone yang digunakan para pelaku kejahatan. Penelitian ini akan melakukan pengangkatan barang bukti kejahatan digital sebanyak mungkin dari facebook Messenger pada smartphone Android. Pada penelitian ini tool yang kami gunakan adalah Oxygen Forensic dengan menggunakan metode National Institute Of Justice (NIJ). Penelitian ini mengacu pada proses investigasi yang digunakan metode National Institute Of Justice (NIJ). Metode ini merekomendasikan sebuah tahapan dasar dalam proses forensik, yaitu persiapan, koleksi, pemeriksaan, analisis dan pelaporan. Metode penelitian yang digunakan berdasarkan pedoman forensik perangkat mobile yang dibuat oleh National Institute of Justice (NIJ)
APA, Harvard, Vancouver, ISO, and other styles
28

AlHidaifi, Saleh. "Mobile Forensics: Android Platforms and WhatsApp Extraction Tools." International Journal of Computer Applications 179, no. 47 (June 15, 2018): 25–29. http://dx.doi.org/10.5120/ijca2018917264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Pawitradi, Gede, and I. Ketut Gede Suhartana. "Acquisition of LINE Digital Social Media Evidence Using the National Institute of Justice (NIJ) Method." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 2 (January 8, 2020): 129. http://dx.doi.org/10.24843/jlk.2019.v08.i02.p04.

Full text
Abstract:
Nowadays the use of social media has developed very rapidly over time. With very easy to use and also higher security than ordinary messaging services, making one of the factors of social media is very often used in today's world. But behind it all, social media such as LINE is very vulnerable to become one of the crime facilities, one of which is cyberbullying. To follow up on the cyberbullying activity, a forensic cellphone needs to be carried out to find evidence which is then useful to send to court. This study uses the LINE application as cyberbullying crime media, as well as using the National Institute of Justice (NIJ) method. The National Institute of Justice (NIJ) method has five basic stages namely, preparation, collection, examination, analysis, and reporting. In this study using the MOBILedit Forensic tool, and DB Browser for SQLite. It is hoped that the research carried out can help in solving cyberbullying on social media LINE on mobile forensics
APA, Harvard, Vancouver, ISO, and other styles
30

Rehault, Frederick. "Windows mobile advanced forensics: An alternative to existing tools." Digital Investigation 7, no. 1-2 (October 2010): 38–47. http://dx.doi.org/10.1016/j.diin.2010.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Berte, Rosamaria, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me, and Vittorio Ottaviani. "Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 18. http://dx.doi.org/10.1504/ijesdf.2009.023872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kumar, Manish. "Mobile phone forensics - a systematic approach, tools, techniques and challenges." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 64. http://dx.doi.org/10.1504/ijesdf.2021.111725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Agrawal, Vinayak, and Shashikala Tapaswi. "Forensic analysis of Google Allo messenger on Android platform." Information & Computer Security 27, no. 1 (March 11, 2019): 62–80. http://dx.doi.org/10.1108/ics-03-2017-0011.

Full text
Abstract:
Purpose The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts. Design/methodology/approach Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted. Findings Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory. Research limitations/implications As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications. Practical implications Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation. Originality/value This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.
APA, Harvard, Vancouver, ISO, and other styles
34

Orozco, Ana Lucila Sandoval, Jocelin Rosales Corripio, David Manuel Arenas González, Luis Javier García Villalba, and Julio Hernandez-Castro. "Theia: a tool for the forensic analysis of mobile devices pictures." Computing 98, no. 12 (January 25, 2016): 1251–86. http://dx.doi.org/10.1007/s00607-015-0482-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bulgakov, V. V. "A study of the effectiveness to use electronic educational resources with web analytics tools (on the example of a departmental University of the Ministry of Emergency Situations of Russia)." Open Education 24, no. 3 (June 27, 2020): 4–11. http://dx.doi.org/10.21686/1818-4243-2020-3-4-11.

Full text
Abstract:
Purpose of research. The purpose of this work is to study the effectiveness of the use of electronic educational resources and their demand for students. The availability of digital technologies and readiness of students and lecturers to study in the electronic educational environment ensure the active development of this form of educational process organization. To assess the effectiveness and demand for electronic educational resources, data on the parameters of operation and user interaction with educational material are required.Materials and methods. To obtain data on the operating parameters and users’ work in the electronic educational environment, it is proposed to use a multi-level automated system for training, monitoring and analysis of theoretical knowledge – the Fire Test program, which is designed to organize and implement training in higher education programs of the specialty 20.05.01 – Fire Protection, 40.05.03 – Forensic Examination, the direction of training 20.03.01 – Technosphere Safety and the educational program of secondary vocational education 20.02.04 – Fire Protection. The Fire Test program is available on the Internet and allows you to conduct independent testing on specialties, disciplines, subjects of disciplines, as well as to carry out self-monitoring and knowledge control by lecturers online. As a tool for evaluating the effectiveness and relevance of the Fire Test program, it is proposed to use the web analytics service – Yandex.Metrica. To monitor the Fire Test program, we have selected key parameters that characterize the number of users and their activity in the electronic educational environment, which include demographic parameters, parameters of activity and loyalty of trainees, and technology parameters.Results. Based on the results of monitoring demographic parameters, which included the age of the audience during the study period of 1 month, the Fire Test program received an average of 27 visits from lecturers and 15 visits from trainees. Visitors from the number of students were 87%, from the number of Faculty Members – 13%. Monitoring user activity by time spent in the Fire Test program showed that students spent an average of 8 minutes 57 seconds on the site, and lecturers – 10 minutes 32 seconds. The largest number of visits of trainees was made during classes from 8-00 to 14-00 (55%), during the period outside of training sessions and self-training from 17-00 to 22-00 (23%), there was a uniform appeal of trainees to the Fire Test program. According to the monitoring of the loyalty parameter, during the study period, 12% of users accessed the site only 1 time, the largest number of users (48%) worked in the Fire Test program from 16 to 127 times, and more than 128 times 13% of users accessed the site. Monitoring of the technology parameter showed that smartphones are used as the main device for working in the Fire Test program, the share of which is 88.2%. The main operating systems used on smartphones are iOS (51%) and Google Android (37%), while the most popular browsers are Mobile Safari (44%).Conclusion. The results of the study allow us to conclude about the effectiveness and relevance of the electronic educational environment implemented by the Fire Test program among the trainees of Ivanovo Fire and Rescue Academy of the State Fire Service of the Ministry of Emergency Situations of Russia, as evidenced by their loyalty and activity in remote operation with the educational material.
APA, Harvard, Vancouver, ISO, and other styles
36

Aminova, E., I. Trapeznikov, and A. Priorov. "OVERVIEW OF DIGITAL FORENSICS ALGORITHMS IN DSLR CAMERAS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W4 (May 10, 2017): 199–205. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w4-199-2017.

Full text
Abstract:
The widespread usage of the mobile technologies and the improvement of the digital photo devices getting has led to more frequent cases of falsification of images including in the judicial practice. Consequently, the actual task for up-to-date digital image processing tools is the development of algorithms for determining the source and model of the DSLR (Digital Single Lens Reflex) camera and improve image formation algorithms. Most research in this area based on the mention that the extraction of unique sensor trace of DSLR camera could be possible on the certain stage of the imaging process into the camera. It is considered that the study focuses on the problem of determination of unique feature of DSLR cameras based on optical subsystem artifacts and sensor noises.
APA, Harvard, Vancouver, ISO, and other styles
37

Keim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.

Full text
Abstract:
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source.
APA, Harvard, Vancouver, ISO, and other styles
38

Karampela, Sevasti, Jessica Smith, and Irene Panderi. "Determination of 19 Psychoactive Substances in Premortem and Postmortem Whole Blood Samples Using Ultra-High-Performance Liquid Chromatography–Tandem Mass Spectrometry." Separations 8, no. 6 (June 3, 2021): 78. http://dx.doi.org/10.3390/separations8060078.

Full text
Abstract:
An ever-increasing need exists within the forensic laboratories to develop analytical processes for the qualitative and quantitative determination of a broad spectrum of new psychoactive substances. Phenylethylamine derivatives are among the major classes of psychoactive substances available on the global market and include both amphetamine analogues and synthetic cathinones. In this work, an ultra-high-performance liquid chromatography-positive ion electrospray ionization tandem mass spectrometric method (UHPLC-ESI-MS/MS) has been developed and fully validated for the determination of 19 psychoactive substances, including nine amphetamine-type stimulants and 10 synthetic cathinone derivatives, in premortem and postmortem whole blood. The assay was based on the use of 1 mL premortem or postmortem whole blood, following solid phase extraction prior to the analysis. The separation was achieved on a Poroshell 120 EC-C18 analytical column with a gradient mobile phase of 0.1% formic acid in acetonitrile and 0.1% formic acid in water in 9 min. The dynamic multiple reaction monitoring used in this work allowed for limit of detection (LOD) and lower limit of quantitation (LOQ) values of 0.5 and 2 ng mL−1, respectively, for all analytes both in premortem and postmortem whole blood samples. A quadratic calibration model was used for the 12 quantitative analytes over the concentration range of 20–2000 ng mL−1, and the method was shown to be precise and accurate both in premortem and postmortem whole blood. The method was applied to the analysis of real cases and proved to be a valuable tool in forensic and clinical toxicology.
APA, Harvard, Vancouver, ISO, and other styles
39

Vizoso, Ángel, Martín Vaz-Álvarez, and Xosé López-García. "Fighting Deepfakes: Media and Internet Giants’ Converging and Diverging Strategies Against Hi-Tech Misinformation." Media and Communication 9, no. 1 (March 3, 2021): 291–300. http://dx.doi.org/10.17645/mac.v9i1.3494.

Full text
Abstract:
Deepfakes, one of the most novel forms of misinformation, have become a real challenge in the communicative environment due to their spread through online news and social media spaces. Although fake news have existed for centuries, its circulation is now more harmful than ever before, thanks to the ease of its production and dissemination. At this juncture, technological development has led to the emergence of deepfakes, doctored videos, audios or photos that use artificial intelligence. Since its inception in 2017, the tools and algorithms that enable the modification of faces and sounds in audiovisual content have evolved to the point where there are mobile apps and web services that allow average users its manipulation. This research tries to show how three renowned media outlets—<em>The Wall Street Journal</em>,<em> The Washington Post</em>,<em> </em>and<em> Reuters</em>—and three of the biggest Internet-based companies—Google, Facebook, and Twitter—are dealing with the spread of this new form of fake news. Results show that identification of deepfakes is a common practice for both types of organizations. However, while the media is focused on training journalists for its detection, online platforms tended to fund research projects whose objective is to develop or improve media forensics tools.
APA, Harvard, Vancouver, ISO, and other styles
40

Saleem, Shahzad, Oliver Popov, and Ibrahim Baggili. "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis." Digital Investigation 16 (March 2016): S55—S64. http://dx.doi.org/10.1016/j.diin.2016.01.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mai, Hang-Nga, and Du-Hyeong Lee. "Accuracy of Mobile Device–Compatible 3D Scanners for Facial Digitization: Systematic Review and Meta-Analysis." Journal of Medical Internet Research 22, no. 10 (October 23, 2020): e22228. http://dx.doi.org/10.2196/22228.

Full text
Abstract:
Background The accurate assessment and acquisition of facial anatomical information significantly contributes to enhancing the reliability of treatments in dental and medical fields, and has applications in fields such as craniomaxillofacial surgery, orthodontics, prosthodontics, orthopedics, and forensic medicine. Mobile device–compatible 3D facial scanners have been reported to be an effective tool for clinical use, but the accuracy of digital facial impressions obtained with the scanners has not been explored. Objective We aimed to review comparisons of the accuracy of mobile device–compatible face scanners for facial digitization with that of systems for professional 3D facial scanning. Methods Individual search strategies were employed in PubMed (MEDLINE), Scopus, Science Direct, and Cochrane Library databases to search for articles published up to May 27, 2020. Peer-reviewed journal articles evaluating the accuracy of 3D facial models generated by mobile device–compatible face scanners were included. Cohen d effect size estimates and confidence intervals of standardized mean difference (SMD) data sets were used for meta-analysis. Results By automatic database searching, 3942 articles were identified, of which 11 articles were considered eligible for narrative review, with 6 studies included in the meta-analysis. Overall, the accuracy of face models obtained using mobile device–compatible face scanners was significantly lower than that of face models obtained using professional 3D facial scanners (SMD 3.96 mm, 95% CI 2.81-5.10 mm; z=6.78; P<.001). The difference between face scanning when performed on inanimate facial models was significantly higher (SMD 10.53 mm, 95% CI 6.29-14.77 mm) than that when performed on living participants (SMD 2.58 mm, 95% CI 1.70-3.47 mm, P<.001, df=12.94). Conclusions Overall, mobile device–compatible face scanners did not perform as well as professional scanning systems in 3D facial acquisition, but the deviations were within the clinically acceptable range of <1.5 mm. Significant differences between results when 3D facial scans were performed on inanimate facial objects and when performed on the faces of living participants were found; thus, caution should be exercised when interpreting results from studies conducted on inanimate objects.
APA, Harvard, Vancouver, ISO, and other styles
42

Cadle, Brian A., Kristin C. Rasmus, Juan A. Varela, Leah S. Leverich, Casey E. O'Neill, Ryan K. Bachtell, and Donald C. Cooper. "Cellular Phone-Based Image Acquisition and Quantitative Ratiometric Method for Detecting Cocaine and Benzoylecgonine for Biological and Forensic Applications." Substance Abuse: Research and Treatment 4 (January 2010): SART.S5025. http://dx.doi.org/10.4137/sart.s5025.

Full text
Abstract:
Here we describe the first report of using low-cost cellular or web-based digital cameras to image and quantify standardized rapid immunoassay strips as a new point-of-care diagnostic and forensics tool with health applications. Quantitative ratiometric pixel density analysis (QRPDA) is an automated method requiring end-users to utilize inexpensive (~ $1 USD/each) immunotest strips, a commonly available web or mobile phone camera or scanner, and internet or cellular service. A model is described whereby a central computer server and freely available IMAGEJ image analysis software records and analyzes the incoming image data with time-stamp and geo-tag information and performs the QRPDA using custom JAVA based macros ( http://www.neurocloud.org ). To demonstrate QRPDA we developed a standardized method using rapid immunotest strips directed against cocaine and its major metabolite, benzoylecgonine. Images from standardized samples were acquired using several devices, including a mobile phone camera, web cam, and scanner. We performed image analysis of three brands of commercially available dye-conjugated anti-cocaine/benzoylecgonine (COC/BE) antibody test strips in response to three different series of cocaine concentrations ranging from 0.1 to 300 ng/ml and BE concentrations ranging from 0.003 to 0.1 ng/ml. This data was then used to create standard curves to allow quantification of COC/BE in biological samples. Across all devices, QRPDA quantification of COC and BE proved to be a sensitive, economical, and faster alternative to more costly methods, such as gas chromatography-mass spectrometry, tandem mass spectrometry, or high pressure liquid chromatography. The limit of detection was determined to be between 0.1 and 5 ng/ml. To simulate conditions in the field, QRPDA was found to be robust under a variety of image acquisition and testing conditions that varied temperature, lighting, resolution, magnification and concentrations of biological fluid in a sample. To determine the effectiveness of the QRPDA method for quantifying cocaine in biological samples, mice were injected with a sub-locomotor activating dose of cocaine (5 mg/kg; i.p.) and were found to have detectable levels of COC/BE in their urine (160.6 ng/ml) and blood plasma (8.1 ng/ml) after 15–30 minutes. By comparison rats self-administering cocaine in a 4 hour session obtained a final BE blood plasma level of 910 ng/ml with an average of 62.5 infusions. It is concluded that automated QRPDA is a low-cost, rapid and highly sensitive method for the detection of COC/BE with health, forensics, and bioinformatics application and the potential to be used with other rapid immunotest strips directed at several other targets. Thus, this report serves as a general reference and method describing the use of image analysis of lateral flow rapid test strips.
APA, Harvard, Vancouver, ISO, and other styles
43

Saleem, Shahzad, Oliver Popov, and Ibrahim Baggili. "Comments on “A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis” [Digit Investig 16S, S55–S64]." Digital Investigation 21 (June 2017): 88. http://dx.doi.org/10.1016/j.diin.2017.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Klevtsov, Kirill K., and Vitaliy F. Vasyukov. "Obtaining electronic information on criminal cases within the framework of international cooperation." Vestnik of Saint Petersburg University. Law 12, no. 1 (2021): 36–51. http://dx.doi.org/10.21638/spbu14.2021.103.

Full text
Abstract:
The explosive growth of information and communication technologies, which has affected human social communication institutions, has become commensurate with the increase in potential risks to the security and rights of citizens. The authors of the article attempt to highlight the issues of international cooperation between law enforcement agencies of the Russian Federation and other countries in the framework of obtaining electronic information that is important for proving criminal cases. Attention is paid to procedures for ensuring the collection and use of electronic data in the response to crime occurring in the current fine line of confidentiality of privacy and security. Despite the mutual agreements signed between many countries of the world, the practical implementation of regulations that ensure the provision of electronic information in the framework of international cooperation is currently fraught with certain problems. Meanwhile, in the context of countering such dangerous phenomena for the world community as terrorism, extremism, drug trafficking, weapons, and people, a single mechanism for exchanging information stored on a gigantic scale on the servers of Telecom operators and providers has not yet been developed. The actual search for data stored on mobile devices usually requires a warrant in common law countries. In situations where there is a significant risk of loss of evidence, such as when data detection and other computer forensics tools are actively used, some jurisdictions allow law enforcement agencies to perform limited searches of devices without a warrant due to alleged data vulnerability. Another problem is the retention of stored data, since different practices apply in different countries. In this regard, it is essential that investigators and prosecutors are well informed about geo-specific data mapping issues, including “embargoes” or bans on the exchange of computer information.
APA, Harvard, Vancouver, ISO, and other styles
45

Yudianto, Ahmad, and Nola Margaret. "EFFECT OF ROOM TEMPERATURE ON THE QUALITY OF DNA FROM EARPHONE SWAB BY OBSERVING MITOCHONDRIAL DNA [mtDNA] D-LOOP REGION OF 126 bp (HVS II, nt 34-159) AND 143 bp (HVS I, nt 16268-16410)." Folia Medica Indonesiana 53, no. 2 (November 3, 2017): 86. http://dx.doi.org/10.20473/fmi.v53i2.6342.

Full text
Abstract:
The objects contained in crime scene and its surroundings have significance in the examination of forensic identification. The most commonly used specimens in the examination for identification are blood/blood spots, semen patches, vaginal swabs, buccal swabs and bones, including items often used by the perpetrator/victim the last time. For example, a mobile phone hearing aid (headset/earphone). In the use of earphones attached to the outer ear skin so it is suspected there is a serumen attached to the tool. One factor that can affect the quality of DNA is the prolonged exposure. Until now in Indonesia the effect of long exposure to room temperature on the quality of DNA on the DNA material of earphone swabs through DNA analysis has not been widely known. The type of study was laboratory experimental. Used earphones are exposed at room temperature within 1, 7, 14 and 20 days. The results of this study indicate that the environmental effect, ie the duration of exposure, affects the decrease in DNA content significantly from day 1 to 20. Detection of PCR mtDNA D-Loop HVS I visualization results 143 bp nt: 16268 16410 shows positive detection results (+) Only at day 1 exposure to room temperature [4 sample/66,67%] and day 7 [3 sample/50%]. Visualization of PCR results mtDNA D-Loop HVS II 126bp nt: 34 -159 was performed on day 1 day room exposure [2 sample/33,37%] and day 7 [6 sample/100%]. Conclusion, the duration of exposure to room temperature affect the quality of DNA from earpiece swab material. Decreased levels of earphones DNA swabs showed a significance value (p <0.005) against the effect of long time exposure to room temperature.
APA, Harvard, Vancouver, ISO, and other styles
46

"FORENSIC ANALYSIS OF DUPLICATE IMEI’S-A CASE STUDY." March-2021 10, no. 3 (2021): 79–82. http://dx.doi.org/10.29121/ijesrt.v10.i3.2021.11.

Full text
Abstract:
Mobile forensics is a sub-set of digital forensics which includes the investigation and acquisition of artifacts of mobile phones. With the advancement of technology threats to mobile phones made forensic science a challenging Endeavour. Number of mobile users is increasing worldwide and creates tremendous problems and challenges. As the technology is advancing the criminals are also getting advanced day by day. Investigation agencies come across various crimes committed through different modes, forgery of IMEI number(s) of mobile device being one of them. This paper presents a case study in which mobile phones of duplicate IMEI’s, hardware tools capable of duplicating IMEI along with other evidences have been received and examined in the laboratory.
APA, Harvard, Vancouver, ISO, and other styles
47

Zamroni, Guntur Maulana, and Imam Riadi. "Instant Messaging Forensic Analysis on Android Operating System." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, May 28, 2019, 137–48. http://dx.doi.org/10.22219/kinetik.v4i2.735.

Full text
Abstract:
WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be approved and accepted by the law. This research conducted a forensic analysis of WA on unrooted Samsung C9 Pro devices using Belkasoft Evidence, Oxygen Forensic, Magnet AXIOM, and WA Key/DB Extractor. This research gives suggestion about forensic tools for conducting forensic analysis related to WA. From the research can be seen that there is no tool that can be used to obtain all the WA artifact parameters used in the research. The combination of the Magnet AXIOM and WA Key/DB Extractor is known to get the best results and meets the WA artifact parameters.
APA, Harvard, Vancouver, ISO, and other styles
48

Jansen, Wayne, and Rick Ayers. "Forensic Tools for Mobile Phone Subscriber Identity Modules." Journal of Digital Forensics, Security and Law, 2006. http://dx.doi.org/10.15394/jdfsl.2006.1006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

"Data Acquisition From Mobile Phone using Mobiledit." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S2 (August 31, 2019): 188–91. http://dx.doi.org/10.35940/ijitee.i1036.0789s219.

Full text
Abstract:
Mobile forensic is a subsidiary of digital forensic that is flourishing constantly. As per current scenario, mobile phones not only mean traditional mobile phones that were developed and used in late 1990s but also include smart phones that offer an array of functionality. Mobile phones developed in 1990s also known as feature phones provided limited functionality such as calling and messaging as they were subjected to provide communication facility. But at present, mobile phones are used not only for communication but also for executing face to face interactions, shopping using various applications, trading and internet surfing, etc thus making mobile more feature-variant and making them smart. Since, mobile phone market is constantly rising because of increased and improved features; usage of mobile phones in criminal activities or illegal activities has also increased. The crime scene can be re-created by identifying the series of actions that has taken place when crime was committed by using compatible mobile forensic tools. Current attack could not be prevented, but the investigator can attain all crucial evidences present on the crime scene in order to reduce similar kind of attacks in future. The capturing and recording of crime scene, collecting and analyzing the evidence and finding the culprit and reason of committing crime is the art of mobile forensics. In this paper, we are going to discuss the implementation of proposed framework by using tool MOBILedit
APA, Harvard, Vancouver, ISO, and other styles
50

Yudhana, Anton, Imam Riadi, and Ikhwan Anshori. "IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD." Kursor 9, no. 3 (January 15, 2019). http://dx.doi.org/10.28961/kursor.v9i3.152.

Full text
Abstract:
Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography