3GPP (2007), Specification of the Subscriber Identity Module – Mobile Equipment (SIM – ME) interface, 3rd Generation Partnership Project, TS 11.11 V8.14.0 (Release 1999), Technical Specification, (2007-06).

Good Practice and Advice Guide for Managers of e-Crime Investigation, January 2011, .

Ireti Ajala, Spatial Analysis of GSM Subscriber Call Data Records, Directions Magazine, Mar 07, 2006, .

Searching Voicemail and E-mail, Point of View, Alameda County District Attorney’s Office, Winter 2003, .

Phone, E-mail, and Internet Records, Point of View, Alameda County District Attorney’s Office, Fall 2004, .

Marwan Al-Zarouni, Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Australian Digital Forensics Conference, December 2007, .

Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith, Smudge Attacks on Smartphone Touch Screens, 4th USENIX Workshop on Offensive Technologies, August 2010, .

Rick Ayers, Computer Forensic Tool Testing (CFTT) Program.

Rick Ayers, Forensics@NIST .

Mona Bader, Ibrahim Baggili, iPhone 3GS Forensics: Logical Analysis using Apple iTunes Backup Utility, Small Scale Digital Device Forensics Journal, Vol. 4, No.1, September 2010, .

Graeme B. Bell, Richard Boddington, Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?, The Journal of Digital Forensics Security and Law, Volume 5, Number 3, 2010.

Marcel Breeuwsma, Forensic Imaging of Embedded Systems using JTAG (boundary-scan), Digital Investigation, Volume 3, Issue 1, 2006, pp.32-42.

Marcel Breeuwsma, Martien de Jongh, Coert Klaver, Ronald van der Knijff, Mark Roeloffs, Forensic Data Recovery from Flash Memory, Small Scale Digital Device Forensics Journal, Vol. 1, No. 1, June 2007, .

Sam Brothers, How Cell Phone “Forensic” Tools Actually Work – Cell Phone Tool Leveling System, Mobile Forensic World, Chicago, IL, March, 2008.

Sam Brothers, How Cell Phone Forensics Tools Work, AAFS 2012, Washington, DC.

Eoghan Casey, Benjamin Turnbull, Digital Evidence and Computer Crime, Third Edition, Elsevier Inc., 2011 .

Dankar S., Ayers, R., Mislan, R., Hashing Techniques for Mobile Device Forensics, Small Scale Digital Device Forensics Journal, 2009.

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, NCJ 219941, April 2008, .

Bob Elder, Chip-Off and JTAG Analysis for Mobile Device Forensics, Evidence Technology Magazine, May-June 2012, .

Digital cellular telecommunications system (Phase 2) – Event and call data (GSM 12.05 version 4.3.1), European Telecommunication Standard (ETS), ETSI TS 100 616 V7.0.1, July 1999.

Salvatore Fiorillo, Theory and practice of flash memory mobile forensics, Australian Digital Forensics Conference, December 2009, .

Dario Forte, Andrea de Donno, Chapter 10: Mobile Network Investigations, Handbook of Digital Forensics and Investigation, Edited by Eoghan Casey, Elsevier Academic Press, 2010.

K. Edward Gibbs, David F. Clark, Chapter 10: Wireless Netowrk Analysis, Handbook of Digital Forensics and Investigation, Edited by Eoghan Casey, Academic Press, 2002.

IMEI Allocation and Approval Guidelines, Version 3.3.0, GSM Association, Permanent Reference Document TW.06, December 2004, .

GSME Position On Data Retention – Implications for The Mobile Industry, GSM Europe, GSM Association, 23 August 2005, .

Job de Haas, Reverse Engineering ARM Based Devices, Black Hat Europe, May 2004, .

Andrew Hoog, Katie Strzempka, 2011, iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, Elsevier, Jul 25, 2011>.

ITU-T (2006), Automatic International Telephone Credit Cards, International Telecommunications Union, Telecommunication Standardization Sector (ITU-T), Recommendation E.118, (02/01).

Mobile Phone Forensics, 47th EWPITC meeting – Final report, European Working Party on IT Crime, INTERPOL, September 7, 2006.

Wayne Jansen, Aurélien Delaitre, Mobile Forensic Reference Materials: A Methodology and Reification, NIST Interagency Report IR-7617, October 2009, .

Kevin Jonkers, The forensic use of mobile phone flasher boxes5, digital investigation 6 (2010) 168–178, .

Eric Katz, A Field Test of Mobile Phone Shielding Devices, 2010, College of Technology Masters Thesis, Paper 33, .

Ronald van der Knijff, Chapter 8: Embedded Systems Analysis, Handbook of Digital Forensics and Investigation, Edited by Eoghan Casey, Elsevier Academic Press, 2010.

Kevin Mansell, Darren Lole, Fiona Litchfield, Recovering Deleted Data From Fat Partitions Within Mobile Phone Handsets Using Traditional Imaging Techniques, F3 Annual Conference, November 11-13, 2008, .

Paul McCarthy, Forensic Analysis of Mobile devices, BS CIS Thesis, University of South Australia, School of Computer and Information Science, Mawson Lakes, October 2005.

Paul McCarthy, Jill Slay, Mobile devices: admissibility of current forensic procedures for acquiring data, the Second IFIP WG 11.9 International Conference on Digital Forensics, 2006.

Barrie Mellars, Forensic Examination of Mobile devices, Digital Investigation, Vol.1, No. 4, 2004, pp. 266-272.

Christa Miller, The other side of mobile forensics, Cygnus Business Media, July 1, 2008, .

Tilo Müller, Michael Spreitzenbarth, and Felix C. Freiling, Forensic Recovery of Scrambled Telephones, .

Cindy Murphy, Developing Process for Mobile Device Forensics, 2013, .

No More ‘Cell’ Phones, TechBeat, Winter 2005, National Law Enforcement and Corrections Technology Center, .

Thomas R. O’connor, Admissibility of Scientific Evidence Under Daubert, North Carolina Wesleyan College, March 2004, .

Terrence P. O’Connor, Provider Side Cell Phone Forensic, Small Scale Digital Device Forensics Journal, Vol. 3, No. 1, June 2009, .

By Justin Ormont (Own work) CC-BY-SA-3.0 or GFDL , via Wikimedia Commons.

Lee Reiber, SIMs and Salsa, MFI Forum, Mobile Forensics, Inc., September 2008.

Greg Smith, Switch On ~ Update = Lose Evidence, Mobile Telephone Evidence Newsletter, INDEX NO: VOL 4-MTE05- 2006, Trew & Co, 2005, .

Greg Smith, Handset Password Unlock, Mobile Telephone Evidence Newsletter, INDEX NO: VOL 4-MTE03- 2006 supp: 002, Trew & Co, 2006.

SWGDE, SWGDE Best Practices for Mobile Phone Forensics, .

John (Zeke) Thackray, Flasher Boxes: Back to Basics in Mobile Phone Forensics, Digital Forensic Investigator News, July 13, 2010, .

Svein Willassen, Forensics and the GSM Mobile Telephone System, International Journal of Digital Evidence, Volume 2, Issue 1, 2003, .

Svein Willassen, Forensic Analysis of Mobile Phone Internal Memory, IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005, in Advances in Digital Forensics, Vol. 194, Pollitt, M.; Shenoi, S. (Eds.), XVIII, 313 p., 2006.

Jonathan Zdziarski, iOS Forensic Investigative Methods, 2012, .

Scott Zimmerman, Dominick Glavach, Cyber Forensics in the Cloud, December 2011, IAnewsletter, Vol 14, No 1, .


Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment