Abstract
Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents unknowingly. Substantively, the detection, prevention, and the related digital forensics of the above scenarios are becoming tremendously urgent both in public and private sectors. Therefore, in this research, we investigate the scenario when state-of-the-art wireless communication technologies are integrated with the networked smart devices where digital evidences may exist and they could be disclosed when appropriate standard operating procedures are suitably applied. Accordingly, in this paper, a PDA with the built-in GPS navigation functionality via the ubiquitous Wi-Fi connection to a popular social networking platform (facebook) is cross examined concerning the related digital evidence collecting and discovering in terms of revealing previous facebook user accounts on the mobile device without shutting off the power. The research provides a generic framework for the digital forensics specialists to contemplate when the networked smart devices are involved in the related criminal investigation cases especially when omnipresent social networking platforms are becoming the new avenue for the escalating, stringent, and heinous cybercrimes.
References
Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing and privacy on the facebook. Lect Notes Comput Sci 4258:36–58
Andrew MW (2007) Defining a process model for forensic analysis of digital evidence devices and storage media. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, SADFE 2007
Asher C, Aumasson JP, Phan RC-W (2009) Security and privacy preservation in human-involved networks, iNetSec. IFIP AICT 309:139–148
Brown R, Pham B, DeVel O (2005) Design of a digital forensics image mining system. KES 2005. Lect Notes Comput Sci 3683:395–404
Chen H, Chung W, Xu J, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Comput 37(4):50–56
Counts S, Fisher KE (2008) Mobile social networking: an information grounds perspective. Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS). IEEE Publication, Waikoloa, Big Island, HI, pp 1–10
Deng C, Lin Y, Ma L, Cao Y (2011) Towards a practical and scalable trusted software dissemination system. J Converg 2(1):53–60
Dominguez-Sal D, Perez-Casany M, Larriba-Pey JL (2010) Cooperative cache analysis for distributed search engines. Int J Inf Technol Commun Converg 1(1):41–65
Dwyer C, Hiltz S, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and Myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, AMCIS
El-Khatib K, Zhang ZE, Hadibi N, Bochmann GV (2004) Personal and service mobility in ubiquitous computing environments. Wirel Commun Mob Comput 4(6):595–607
Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “friends:” social capital and college students use of online social network sites. J Comput Mediat Commun 12:1143–1168
Fengyu D, Xuerong G (2009) An Advanced Location Based Service (A-LBS) on Mobile Social Network. Proc. IEEE International Conference on Broadband Network and Multimedia Technology, ICBNMT 09. IEEE Press, pp. 740-743, October 2009
GPS visualizer. http://www.gpsvisualizer.com
Iqbal MU, Samsung L (2008) Legal and ethical implications of GPS vulnerabilities. J Int Commer Law Technol 3(3):178–187
Joore P (2008) Social aspects of location-monitoring systems: the case of Guide Me and of My-SOS. Soc Sci Inf 47:253–274
Keenan T (2008) On the internet, things never go away completely. IFIP Int Fed Inf Process 262:37–50
Kryvinska N, Thanh DV, Strauss C (2010) Integrated management platform for seamless services provisioning in converged network. Int J Inf Technol Commun Converg 1(1):77–91
Lee S, Kim H, Lee S, Lim J (2005) Digital evidence collection process in integrity and memory information gathering. In: Proceedings of Systematic Approaches to Digital Forensic Engineering. First International Work-shop. Proc. IEEE, pp. 236–247
Simon M, Slay J (2010) Recovery of skype application activity data from physical memory. Proceedings of the 5th international conference on availability, reliability and security. IEEE Publication, Krakow, Poland, pp 283–288
Nan L, Guanling C (2009) Analysis of a location-based social network. Int Conf Comput Sci Eng 4:263–270, August 2009, Vancouver, Canada
Nance K, Hay B, Bishop M (2009) Digital forensics: defining a research agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences. IEEE Press, Waikoloa, HI, USA, Jan 2009
PAPAGO. http://www.mactiontech.com
Schapsis C (2010) Location based social networks links: a list of location based social networks, [online]. http://bdnooz.com/lbsnlocation-based-social-networking-links/
Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In: Proceedings of the ACM 2009 international conference on Supporting group work, Sanibel Island, Florida
Sohn H, Ro YM, Plataniotis KN (2009) Content sharing based on personal information in virtually secured space. Lect Notes Comput Sci 5450:388–400
Strawn C (2009) Expanding the potential for GPS evidence acquisition. Small Scale Digit Device Forensic J 3(1):1–12
Troshynski E, Lee C, Dourish P (2008) Accountabilities of presence: reframing location-based systems. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, Italy
Tsai JY, Kelley P (2009) Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th international conference on Human factors in computing systems, Boston, MA
Walters A, Petroni N (2007) Volatools: integrating volatile memory forensics into the digital investigation process. Blackhat Federal, Washington, DC
Wang JL, Loui M (2009) Privacy and ethical issues in location-based tracking systems. In: Proceedings of the IEEE Symposium on Technology and Society, Phoenix, Arizona
Xiong L, Tan Q (2011) A configurable approach to toleration of soft errors via partial software protection. J Converg 2(1):31–38
Acknowledgments
The author would like to acknowledge the funding support of NSC (National Science Council) of Taiwan concerning the grant of Project NSC 101-2221-E-142-009. This research was partially supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2012-0008296).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chu, HC., Yang, SW., Hsu, CH. et al. Digital evidence discovery of networked multimedia smart devices based on social networking activities. Multimed Tools Appl 71, 219–234 (2014). https://doi.org/10.1007/s11042-012-1349-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1349-9