The digital forensics of portable electronic communication devices based on a Skype im session of a pocket PC for NGC

Hai Cheng Chu, Der-Jiunn Deng, Han Chieh Chao

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Portable electronic communication devices can be used for many purposes and they are capable of integrating with ubiquitous computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P VoIP application program, which is being used by millions of global users to place IP phone calls, transfer files, or communicate via instant messaging (IM). This phenomenon already generates imminent network security issues that are indispensable to digital forensics researchers or the law enforcement agencies worldwide. Cellular phones, smart phones, and personal digital assistants (PDAs) are the representative ones of those devices and there are some open sources or commercial software toolkits that can be utilized to proceed the forensics investigation concerning the electronic crimes in next generation communications (NGCs). A case review was conducted to illustrate the hidden digital trails within the PDA from the Registry of the Windows Mobile and volatile data in the RAM to discover the possible network security leakage scenarios that resulted in the vandalism of intangible digital assets of the organization.

Original languageEnglish
Pages (from-to)211-225
Number of pages15
JournalWireless Communications and Mobile Computing
Volume11
Issue number2
DOIs
Publication statusPublished - 2011 Feb 1

Fingerprint

Network security
Personal digital assistants
Communication
Crime
Ubiquitous computing
Random access storage
Law enforcement
Application programs
Digital forensics

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

@article{c6e00b37e8204dcfa620c651755ed505,
title = "The digital forensics of portable electronic communication devices based on a Skype im session of a pocket PC for NGC",
abstract = "Portable electronic communication devices can be used for many purposes and they are capable of integrating with ubiquitous computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P VoIP application program, which is being used by millions of global users to place IP phone calls, transfer files, or communicate via instant messaging (IM). This phenomenon already generates imminent network security issues that are indispensable to digital forensics researchers or the law enforcement agencies worldwide. Cellular phones, smart phones, and personal digital assistants (PDAs) are the representative ones of those devices and there are some open sources or commercial software toolkits that can be utilized to proceed the forensics investigation concerning the electronic crimes in next generation communications (NGCs). A case review was conducted to illustrate the hidden digital trails within the PDA from the Registry of the Windows Mobile and volatile data in the RAM to discover the possible network security leakage scenarios that resulted in the vandalism of intangible digital assets of the organization.",
author = "Chu, {Hai Cheng} and Der-Jiunn Deng and Chao, {Han Chieh}",
year = "2011",
month = "2",
day = "1",
doi = "10.1002/wcm.954",
language = "English",
volume = "11",
pages = "211--225",
journal = "Wireless Communications and Mobile Computing",
issn = "1530-8669",
publisher = "John Wiley and Sons Ltd",
number = "2",

}

The digital forensics of portable electronic communication devices based on a Skype im session of a pocket PC for NGC. / Chu, Hai Cheng; Deng, Der-Jiunn; Chao, Han Chieh.

In: Wireless Communications and Mobile Computing, Vol. 11, No. 2, 01.02.2011, p. 211-225.

Research output: Contribution to journalArticle

TY - JOUR

T1 - The digital forensics of portable electronic communication devices based on a Skype im session of a pocket PC for NGC

AU - Chu, Hai Cheng

AU - Deng, Der-Jiunn

AU - Chao, Han Chieh

PY - 2011/2/1

Y1 - 2011/2/1

N2 - Portable electronic communication devices can be used for many purposes and they are capable of integrating with ubiquitous computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P VoIP application program, which is being used by millions of global users to place IP phone calls, transfer files, or communicate via instant messaging (IM). This phenomenon already generates imminent network security issues that are indispensable to digital forensics researchers or the law enforcement agencies worldwide. Cellular phones, smart phones, and personal digital assistants (PDAs) are the representative ones of those devices and there are some open sources or commercial software toolkits that can be utilized to proceed the forensics investigation concerning the electronic crimes in next generation communications (NGCs). A case review was conducted to illustrate the hidden digital trails within the PDA from the Registry of the Windows Mobile and volatile data in the RAM to discover the possible network security leakage scenarios that resulted in the vandalism of intangible digital assets of the organization.

AB - Portable electronic communication devices can be used for many purposes and they are capable of integrating with ubiquitous computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P VoIP application program, which is being used by millions of global users to place IP phone calls, transfer files, or communicate via instant messaging (IM). This phenomenon already generates imminent network security issues that are indispensable to digital forensics researchers or the law enforcement agencies worldwide. Cellular phones, smart phones, and personal digital assistants (PDAs) are the representative ones of those devices and there are some open sources or commercial software toolkits that can be utilized to proceed the forensics investigation concerning the electronic crimes in next generation communications (NGCs). A case review was conducted to illustrate the hidden digital trails within the PDA from the Registry of the Windows Mobile and volatile data in the RAM to discover the possible network security leakage scenarios that resulted in the vandalism of intangible digital assets of the organization.

UR - http://www.scopus.com/inward/record.url?scp=79951999328&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79951999328&partnerID=8YFLogxK

U2 - 10.1002/wcm.954

DO - 10.1002/wcm.954

M3 - Article

VL - 11

SP - 211

EP - 225

JO - Wireless Communications and Mobile Computing

JF - Wireless Communications and Mobile Computing

SN - 1530-8669

IS - 2

ER -