Abstract
The Nokia N900 is a very powerful smartphone and offers great utility to users. As smartphones contain a wealth of information about the user, including information about the user’s contacts, communications, and activities, investigators must have at their disposal the best possible methods for extracting important data from smartphones. Unlike with other smartphones, knowledge of forensic acquisition from the N900 is extremely limited. Extractions of data from the N900 are categorized into limited triage extractions and full physical extractions. The imaging process of the phone has been explained as is necessary for a full investigation of the phone. The types of data as called for in a limited data extraction have been identified, and the locations of these files on the N900 were detailed. Also, a script was created which can be utilized for a limited data extraction from a Nokia N900.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bryner, J.: Nokia N900 Mobile Forensic Cheat Sheet (2010), http://blogs.sans.org/computer-forensics/2010/03/17/nokia-n900-forensic-cheat-sheet
Dolan, B.: Study: 42 percent of U.S. Uses a Smartphone (2010), http://mobihealthnews.com/6178/study-42-percent-of-u-s-uses-a-smartphone
Evans, M.: Hands-on Nokia N900 Review – The Best Nokia Smartphone Yet (2009), http://mobilementalism.com/2009/09/14/hands-on-nokia-n900-review-the-best-nokia-smartphone-yet
Hoog, A.: Android Forensics (2009), http://viaforensics.com/wpinstall/wp-content/uploads/2009/08/Android-Forensics-Andrew-Hoog-viaForensics.pdf
Hoog, A., Strzempka, A.: iPhone Forensics White Paper (2009), http://viaforensics.com/education/white-papers/iphone-forensics
Mislan, R.P., Casey, E., Kessler, G.C.: The Growing Need for On-Scene Triage of Mobile Devices. Digital Investigation 6(3-4) (2010)
Mokhonoana, P.M., Olivier, M.S.: Acquisition of a Symbian Smart Phone’s Content With An On-Phone Forensic Tool. In: Proceedings of the Southern African Telecommunication Networks and Applications Conference (2007)
Mooij, B.: Data Extraction From A Physical Dump, http://www.dfinews.com/article/data-extraction-physical-dump
National Institute of Standards and Technology.: Smart Phone Tool Specification, Version 1.1 (2010), http://www.cftt.nist.gov/documents/Smart_Phone_Tool_Specification.pdf
Nokia Corporation.: Maemo Features, http://maemo.nokia.com/features
Nokia Corporation.: Stories Behind Maemo: Bringing Open Source to the Consumer Mainstream, http://maemo.nokia.com/maemo/open-source
Nokia Corporation.: Technical Specifications, http://maemo.nokia.com/n900/specifications
Rankin, K.: Nokia N900: First Look (2009), http://www.linuxjournal.com/content/nokia-n900-first-look
Zdziarski, J.: iPhone Insecurity, http://iphoneinsecurity.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lohrum, M. (2012). Forensic Extractions of Data from the Nokia N900. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35515-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35514-1
Online ISBN: 978-3-642-35515-8
eBook Packages: Computer ScienceComputer Science (R0)