Skip to main content

Advertisement

Log in

Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Cyberterrorism has become a hotly debated research issue in the past decades because of the convergence of mobile computing powers and the fledging multimedia communication computing capabilities. Cyberterrorism is the exploitation of computer network tools to incur malfunction or shut down critical infrastructures with several keyboard punches, which is dramatically different from traditional terrorism. Due to the ubiquitous multimedia communication tools, they have radically transformed the ways concerning data transmission. Unfortunately, it also incurs unprecedented opportunities for committing cyber crimes that we were not able to foresee two decades ago. Undoubtedly, the mushrooming proliferation of mobile phones spectacularly triggers the information security leakage while most people heavily rely on mobile phones for daily communication. As cybercrime or cyberterrorism surges, digital forensics (DF) of mobile communication devices still enormously lags behind than computer forensics. Hence, in this research paper, we provide a hypothetical case review concerning the DF of a potential cyberterrorist attack that was triggered by a mobile multimedia smart phone utilizing a popular web 2.0 application program via ubiquitous Wi-Fi access points. The corresponding DF of the mobile device was conducted in a step-by-step manner as well as the crime scene reconstruction based on the digital evidence collected, analyzed, and preserved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. http://www.paraben-forensics.com, http://www.hexworkshop.com, http://www.oxygensoftware.com, http://www.msab.com, http://tulp2g.sourceforge.net, http://www.tech-faq.com.

References

  1. Ahmed, R., Dharaskar, R.V.: Mobile forensics: an introduction from Indian law enforcement perspective. ICISTM, CCIS 31, 173–184 (2009)

    Google Scholar 

  2. Weimann, G.: Cyber terrorism: the sum of all fears? Stud Confl Terror 28(2), 129–149 (2005)

    Article  Google Scholar 

  3. Chu, H.C., Lin, W.D.: Live information discovery of the P2P instant messaging based on Skype’s finger printing. J Internet Technol 11(2), 193–202 (2010)

    Google Scholar 

  4. Dhinakaran, C., Nagamalai, D., Lee, J.K.: Multilayer approach to defend phishing attacks. J Internet Technol 11(3), 417–425 (2010)

    Google Scholar 

  5. Lim, K.S., Choi, Y.S., Kim, J.S., Lee, C.H., Lee, S.J.: CFES: comprehensive framework for forensic analysis of embedded systems. J Internet Technol 10(5), 549–562 (2009)

    Google Scholar 

  6. Grabosky, P.: Requirements of prosecution services to deal with cyber crime. Crime Law Social Change 47(4–5), 201–223 (2007)

    Article  Google Scholar 

  7. Levi, M.: White-collar, organized and cyber crimes in the media: some contrasts and similarities. Crime Law Social Change 49(5), 365–377 (2008)

    Article  Google Scholar 

  8. Sobieraj, S.C.: Mobile device forensics case file integrity verification. Master thesis, West Lafayette, Indiana, Purdue University, May, 2008

  9. Yu, X., Jiang, L.H., Shu, H., Yin, Q., Liu, T.M.: A process model for forensic analysis of Symbian smart phones, Advances in Software Engineering. Commun Comput Inf Sci 59, 86–93 (2009)

    Article  Google Scholar 

  10. Harrill, D.C., Mislan, R.P.: A small scale digital device forensics ontology. Small Scale Digit Forensics J 1(1), 1–7 (2007)

    Google Scholar 

  11. Distefano, A., Me, G.: An overall assessment of mobile internal acquisition tool. Digit Investig 5(Suppl 1), s121–s127 (2008)

    Article  Google Scholar 

  12. Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks, Communications, IET, 4(7), 894–903 (2010)

  13. Ng, P.C., Edwards, D.J., Liew, S.C.: Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks, Communications. IET 3(11), 1736–1746 (2009)

    Article  Google Scholar 

  14. Hwang, R.H., Hsu, W.H., Chen, W.E.: WiMAX Integrated Communications, Communications. IET 4(9), 1037–1038 (2010)

    Article  Google Scholar 

  15. Savoldi, A., Gubian, P.: Data recovery from Windows CE based handheld devices. In: Advances in Digital Forensics IV, Springer, Boston, Massachusetts, pp. 219–230 (2008)

  16. Mokhonoana, P.M., Olivier, M.S.: Acquisition of a Symbian smart phone’s content with an on-phone forensic tool. In: Proceedings of the Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007), Sugar Beach Resort, Mauritius, September 2007, pp. 1–7 (2007)

  17. Savoldi, A., Gubian, P.: Symbian forensics: an overview. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, August 2008, pp. 529–533 (2008)

  18. Savoldi, A., Gubian, P.: Issues in Symbian S60 platform forensics. J Commun Comput 6(3), 16–22 (2009)

    Google Scholar 

Download references

Acknowledgments

This research is supported by the National Science Council (NSC) of Taiwan and a result of the Project NSC 99-2221-E-029-024.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han-Chieh Chao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chu, HC., Deng, DJ. & Chao, HC. Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics. Multimedia Systems 17, 341–349 (2011). https://doi.org/10.1007/s00530-010-0216-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-010-0216-7

Keywords