![]() Özellikle mobil teknolojideki gelişmelere paralel olarak akıllı telefon kullanımının çarpıcı şekilde artması ve yaygınlaşması, akıllı telefonlarda işlenen bilişim suçlarında bir artışa neden olmuştur. ![]() Öz Bilgi teknolojisi dünyasındaki gelişmeler yeni güvenlik gereksinimlerini, etik ve sosyal sorumlulukları, riskleri ve tehditleri de birlikte getirmiştir. In this study, the important details about the examination of smartphones within the scope of forensic computing are analyzed by comparing various mobile software, applications and studies. In the field of forensic crimes, there has been a subcategory of investigation of smart phones and mobile phones. This kind of threats is also considered to have some negative impact of m-government solutions and development. Thousands of innocents have suffered because of this malware. Afterwards, it was discovered that the malicious software was infected to some of nun-member suspects' mobile phones by Morbeyin operation which was discovered and revealed by mobile malware forensic experts. Particularly in Turkey, by the usage of ByLock and Eagle apps by FETO criminals, mobile forensic became the most important proof of evidence of being a member of the terroristic organization. The increase in the processing of information crimes via smartphones has necessitated the investigation of informatics crimes and produced many analysis softwares&methods. ![]() The dramatic increase and spread of smartphone usage, especially in line with advances in mobile technology, has led to an increase in IT crimes committed on smartphones. LiFE also offers an extensibility option to the user, where an examiner can add new evidence SQLite files to the application that can be automatically parsed, and these known files are then automatically populated in the automated GUI’s toolbar with an icon added to the investigator’s liking.ĭevelopments in the world of information technology have brought security needs, ethical and social responsibilities, risks and inconveniences. It is important to note that most of the evidence examined by LiFE is parsed from SQLite databases that are backed up by iTunes. Additionally, LiFE is designed so that the evidence located in files would retain its integrity. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence from known files). The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. Lastly, the authors note the need for an extensible software framework for future automated logical iPad examination tools. The results also illustrate that the file names in the backup folders have changed between iOS 3 and iOS 4. However, the researchers note that if a quick triage is needed of an iOS device, then automated tools provide a faster method for obtaining digital evidence from an iOS device. ![]() The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |