Skip to main content

Advertisement

Log in

Digital evidence discovery of networked multimedia smart devices based on social networking activities

Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents unknowingly. Substantively, the detection, prevention, and the related digital forensics of the above scenarios are becoming tremendously urgent both in public and private sectors. Therefore, in this research, we investigate the scenario when state-of-the-art wireless communication technologies are integrated with the networked smart devices where digital evidences may exist and they could be disclosed when appropriate standard operating procedures are suitably applied. Accordingly, in this paper, a PDA with the built-in GPS navigation functionality via the ubiquitous Wi-Fi connection to a popular social networking platform (facebook) is cross examined concerning the related digital evidence collecting and discovering in terms of revealing previous facebook user accounts on the mobile device without shutting off the power. The research provides a generic framework for the digital forensics specialists to contemplate when the networked smart devices are involved in the related criminal investigation cases especially when omnipresent social networking platforms are becoming the new avenue for the escalating, stringent, and heinous cybercrimes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

References

  1. Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing and privacy on the facebook. Lect Notes Comput Sci 4258:36–58

    Article  Google Scholar 

  2. Andrew MW (2007) Defining a process model for forensic analysis of digital evidence devices and storage media. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, SADFE 2007

  3. Asher C, Aumasson JP, Phan RC-W (2009) Security and privacy preservation in human-involved networks, iNetSec. IFIP AICT 309:139–148

    Google Scholar 

  4. Brown R, Pham B, DeVel O (2005) Design of a digital forensics image mining system. KES 2005. Lect Notes Comput Sci 3683:395–404

    Article  Google Scholar 

  5. Chen H, Chung W, Xu J, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Comput 37(4):50–56

    Article  Google Scholar 

  6. Counts S, Fisher KE (2008) Mobile social networking: an information grounds perspective. Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS). IEEE Publication, Waikoloa, Big Island, HI, pp 1–10

  7. Deng C, Lin Y, Ma L, Cao Y (2011) Towards a practical and scalable trusted software dissemination system. J Converg 2(1):53–60

    Google Scholar 

  8. Dominguez-Sal D, Perez-Casany M, Larriba-Pey JL (2010) Cooperative cache analysis for distributed search engines. Int J Inf Technol Commun Converg 1(1):41–65

    Google Scholar 

  9. Dwyer C, Hiltz S, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and Myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, AMCIS

  10. El-Khatib K, Zhang ZE, Hadibi N, Bochmann GV (2004) Personal and service mobility in ubiquitous computing environments. Wirel Commun Mob Comput 4(6):595–607

    Article  Google Scholar 

  11. Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “friends:” social capital and college students use of online social network sites. J Comput Mediat Commun 12:1143–1168

    Article  Google Scholar 

  12. Fengyu D, Xuerong G (2009) An Advanced Location Based Service (A-LBS) on Mobile Social Network. Proc. IEEE International Conference on Broadband Network and Multimedia Technology, ICBNMT 09. IEEE Press, pp. 740-743, October 2009

  13. GPS visualizer. http://www.gpsvisualizer.com

  14. Iqbal MU, Samsung L (2008) Legal and ethical implications of GPS vulnerabilities. J Int Commer Law Technol 3(3):178–187

    Google Scholar 

  15. Joore P (2008) Social aspects of location-monitoring systems: the case of Guide Me and of My-SOS. Soc Sci Inf 47:253–274

    Article  Google Scholar 

  16. Keenan T (2008) On the internet, things never go away completely. IFIP Int Fed Inf Process 262:37–50

    Google Scholar 

  17. Kryvinska N, Thanh DV, Strauss C (2010) Integrated management platform for seamless services provisioning in converged network. Int J Inf Technol Commun Converg 1(1):77–91

    Google Scholar 

  18. Lee S, Kim H, Lee S, Lim J (2005) Digital evidence collection process in integrity and memory information gathering. In: Proceedings of Systematic Approaches to Digital Forensic Engineering. First International Work-shop. Proc. IEEE, pp. 236–247

  19. Simon M, Slay J (2010) Recovery of skype application activity data from physical memory. Proceedings of the 5th international conference on availability, reliability and security. IEEE Publication, Krakow, Poland, pp 283–288

  20. Nan L, Guanling C (2009) Analysis of a location-based social network. Int Conf Comput Sci Eng 4:263–270, August 2009, Vancouver, Canada

    Google Scholar 

  21. Nance K, Hay B, Bishop M (2009) Digital forensics: defining a research agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences. IEEE Press, Waikoloa, HI, USA, Jan 2009

  22. PAPAGO. http://www.mactiontech.com

  23. Schapsis C (2010) Location based social networks links: a list of location based social networks, [online]. http://bdnooz.com/lbsnlocation-based-social-networking-links/

  24. Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In: Proceedings of the ACM 2009 international conference on Supporting group work, Sanibel Island, Florida

  25. Sohn H, Ro YM, Plataniotis KN (2009) Content sharing based on personal information in virtually secured space. Lect Notes Comput Sci 5450:388–400

    Article  Google Scholar 

  26. Strawn C (2009) Expanding the potential for GPS evidence acquisition. Small Scale Digit Device Forensic J 3(1):1–12

    Google Scholar 

  27. Troshynski E, Lee C, Dourish P (2008) Accountabilities of presence: reframing location-based systems. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, Italy

  28. Tsai JY, Kelley P (2009) Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th international conference on Human factors in computing systems, Boston, MA

  29. Walters A, Petroni N (2007) Volatools: integrating volatile memory forensics into the digital investigation process. Blackhat Federal, Washington, DC

  30. Wang JL, Loui M (2009) Privacy and ethical issues in location-based tracking systems. In: Proceedings of the IEEE Symposium on Technology and Society, Phoenix, Arizona

  31. Xiong L, Tan Q (2011) A configurable approach to toleration of soft errors via partial software protection. J Converg 2(1):31–38

    MathSciNet  Google Scholar 

Download references

Acknowledgments

The author would like to acknowledge the funding support of NSC (National Science Council) of Taiwan concerning the grant of Project NSC 101-2221-E-142-009. This research was partially supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2012-0008296).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chu, HC., Yang, SW., Hsu, CH. et al. Digital evidence discovery of networked multimedia smart devices based on social networking activities. Multimed Tools Appl 71, 219–234 (2014). https://doi.org/10.1007/s11042-012-1349-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1349-9

Keywords

Navigation