Abstract
Cyberterrorism has become a hotly debated research issue in the past decades because of the convergence of mobile computing powers and the fledging multimedia communication computing capabilities. Cyberterrorism is the exploitation of computer network tools to incur malfunction or shut down critical infrastructures with several keyboard punches, which is dramatically different from traditional terrorism. Due to the ubiquitous multimedia communication tools, they have radically transformed the ways concerning data transmission. Unfortunately, it also incurs unprecedented opportunities for committing cyber crimes that we were not able to foresee two decades ago. Undoubtedly, the mushrooming proliferation of mobile phones spectacularly triggers the information security leakage while most people heavily rely on mobile phones for daily communication. As cybercrime or cyberterrorism surges, digital forensics (DF) of mobile communication devices still enormously lags behind than computer forensics. Hence, in this research paper, we provide a hypothetical case review concerning the DF of a potential cyberterrorist attack that was triggered by a mobile multimedia smart phone utilizing a popular web 2.0 application program via ubiquitous Wi-Fi access points. The corresponding DF of the mobile device was conducted in a step-by-step manner as well as the crime scene reconstruction based on the digital evidence collected, analyzed, and preserved.













Similar content being viewed by others
References
Ahmed, R., Dharaskar, R.V.: Mobile forensics: an introduction from Indian law enforcement perspective. ICISTM, CCIS 31, 173–184 (2009)
Weimann, G.: Cyber terrorism: the sum of all fears? Stud Confl Terror 28(2), 129–149 (2005)
Chu, H.C., Lin, W.D.: Live information discovery of the P2P instant messaging based on Skype’s finger printing. J Internet Technol 11(2), 193–202 (2010)
Dhinakaran, C., Nagamalai, D., Lee, J.K.: Multilayer approach to defend phishing attacks. J Internet Technol 11(3), 417–425 (2010)
Lim, K.S., Choi, Y.S., Kim, J.S., Lee, C.H., Lee, S.J.: CFES: comprehensive framework for forensic analysis of embedded systems. J Internet Technol 10(5), 549–562 (2009)
Grabosky, P.: Requirements of prosecution services to deal with cyber crime. Crime Law Social Change 47(4–5), 201–223 (2007)
Levi, M.: White-collar, organized and cyber crimes in the media: some contrasts and similarities. Crime Law Social Change 49(5), 365–377 (2008)
Sobieraj, S.C.: Mobile device forensics case file integrity verification. Master thesis, West Lafayette, Indiana, Purdue University, May, 2008
Yu, X., Jiang, L.H., Shu, H., Yin, Q., Liu, T.M.: A process model for forensic analysis of Symbian smart phones, Advances in Software Engineering. Commun Comput Inf Sci 59, 86–93 (2009)
Harrill, D.C., Mislan, R.P.: A small scale digital device forensics ontology. Small Scale Digit Forensics J 1(1), 1–7 (2007)
Distefano, A., Me, G.: An overall assessment of mobile internal acquisition tool. Digit Investig 5(Suppl 1), s121–s127 (2008)
Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks, Communications, IET, 4(7), 894–903 (2010)
Ng, P.C., Edwards, D.J., Liew, S.C.: Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks, Communications. IET 3(11), 1736–1746 (2009)
Hwang, R.H., Hsu, W.H., Chen, W.E.: WiMAX Integrated Communications, Communications. IET 4(9), 1037–1038 (2010)
Savoldi, A., Gubian, P.: Data recovery from Windows CE based handheld devices. In: Advances in Digital Forensics IV, Springer, Boston, Massachusetts, pp. 219–230 (2008)
Mokhonoana, P.M., Olivier, M.S.: Acquisition of a Symbian smart phone’s content with an on-phone forensic tool. In: Proceedings of the Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007), Sugar Beach Resort, Mauritius, September 2007, pp. 1–7 (2007)
Savoldi, A., Gubian, P.: Symbian forensics: an overview. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, August 2008, pp. 529–533 (2008)
Savoldi, A., Gubian, P.: Issues in Symbian S60 platform forensics. J Commun Comput 6(3), 16–22 (2009)
Acknowledgments
This research is supported by the National Science Council (NSC) of Taiwan and a result of the Project NSC 99-2221-E-029-024.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chu, HC., Deng, DJ. & Chao, HC. Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics. Multimedia Systems 17, 341–349 (2011). https://doi.org/10.1007/s00530-010-0216-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-010-0216-7