skip to main content
10.1145/3543434.3543459acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

A Study on Privacy Protection of Mobile Evidence in Relation to Criminal Investigative Procedures

Published:14 September 2022Publication History

ABSTRACT

The growth of mobile devices used in our daily lives can mean more than one type of digital forensic targets may exist. Unlike desktop computers and file servers, mobile devices are more often used in daily life and contain precise and detailed personal information. Accordingly, if a mobile device is confiscated and digital forensic procedures are conducted, various private information may be disclosed during the investigation process. Moreover, privacy exposure from the investigative agency is not the entire risk. For example, privacy exposure may occur when evidence is released outside the investigation agency or possibly when other case managers arbitrarily read the evidence. Additional risks may arise during storage process as well. Privacy is a fundamental right of the people protected by the Constitution. Thus, if under the confines of the law, infringement or privacy limitations are necessary then it should be done to the minimum extent possible. In this paper, we will study 1) the laws relating to digital forensic procedures in Korea, the United States, the E.U., 2) examine the types of private information that can be exposed through mobile devices, and 3) suggest passcode (which is a first-generation cryptography, based on authentication) and other encryption methods, more specifically public-key and isomorphic encryption to protect the privacy of mobile evidence.

References

  1. Goldfoot Josh. 2011. The Physical Computer and the Fourth Amendment, 16 Berkeley J. Crim. L. 112 (2011) / Berkeley Journal of Criminal Law, Vol. 16, Issue 1 (2011), pp. 112-167. Available at : http://heinonline.org/HOL/Page?handle=hein.journals/bjcl16&div=Google ScholarGoogle Scholar
  2. Wankyu Lee. 2015. The Method of the Presence of the Possessor in the Seizing Process and the Seizure of the Material for the Irrelevant Crime, Contemporary Review of Criminal Law (CRCL.PS) 48 (2015): 90-158, Supreme Prosecutors' Office, 2015.Google ScholarGoogle Scholar
  3. Federal Bureau of Investigation Internet Crime Complaint Center. 2020. Internet Crime Report 2020, Federal Bureau of Investigation. Available at : https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdfGoogle ScholarGoogle Scholar
  4. Min-a Kim. 2021. Legislative Cases of the US, UK, and France Related to the Search and Seizure of Digital Evidence, Latest Legislative Information Volume 157, National Assembly Library, Korea.Google ScholarGoogle Scholar
  5. Supreme Court en banc Order 2011Mo1839 Dated July 16, 2015, Available at : https://library.scourt.go.kr/kor/judgment/eng_judg_view.jspGoogle ScholarGoogle Scholar
  6. Authenticated U.S. Government Information GPO. 1992. FOURTH AMENDMENT SEARCH AND SEIZURE CONTENTS, 1197-1270, Available at: https://www.govinfo.gov/content/pkg/GPO-CONAN-1992/pdf/GPO-CONAN-1992-10-5.pdfGoogle ScholarGoogle Scholar
  7. Emily Berman, Digital Searches, the Fourth Amendment, and the Magistrates' Revolt, 68 Emory L. J. 49(2018). Available at: https://scholarlycommons.law.emory.edu/elj/vol68/iss1/2Google ScholarGoogle Scholar
  8. Sara J. Dennis, Regulating Search Warrant Execution Procedure for Stored Electronic Communications, 86 Fordham L. Rev. 3033 (2018). Available at: https://ir.lawnet.fordham.edu/flr/vol86/iss6/21Google ScholarGoogle Scholar
  9. Byung-min Park. 2021. Research on improving search and seizure of digital evidence : focusing on discussions of legislative measures, Judicial Policy Research Institute Research Book, (2021), 1-453Google ScholarGoogle Scholar
  10. BVerfG 2 BvR 1027/02 (Zweiter Senat) - Beschluss v. 12. 4. 2005. Available at: https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/DE/2005/04/rs20050412_2bvr102702.htmlGoogle ScholarGoogle Scholar
  11. Jared Olson. 2021. DFIR Advanced Smartphone Forensics, SANS DFIR. Available at : https://www.sans.org/posters/dfir-advanced-smartphone-forensics/Google ScholarGoogle Scholar
  12. Android Source. 2020. Full Disk Encryption. Retrieved Feb 16, 2022 from https://source.android.google.cn/security/encryption/full-disk?hl=koGoogle ScholarGoogle Scholar
  13. Joe Miller. 2014. Google and Apple to introduce default encryption. BBC News. Retrieved Feb 16, 2022 from https://www.bbc.com/news/technology-29276955Google ScholarGoogle Scholar
  14. Heather Mahalik. 2014. Open Source Mobile Device Forensics. Basis Technology Retrieved Feb 16, 2022 from https://www.nist.gov/system/files/documents/forensics/6-Mahalik_OSMF.pdfGoogle ScholarGoogle Scholar
  15. R.I. Ferguson, Karen Renaud, Sara Wilford, Alastair Irons. 2019. PRECEPT: a framework for ethical digital forensics investigations, Journal of Intellectual Capital Vol. 21 No. 2, 2020 pp. 257-290. DOI 10.1108/JIC-05-2019-0097Google ScholarGoogle ScholarCross RefCross Ref
  16. Zack Whittaker. 2016. Leaked files show what a Cellebrite phone extraction report looks like. ZDNet. Retrieved Feb 16, 2022 from https://www.zdnet.com/google-amp/article/israeli-firm-cellebrite-grab-phone-data-seconds/Google ScholarGoogle Scholar
  17. Expert Witness Disk Image, ASR SMART, https://www.loc.gov/preservation/digital/formats/fdd/fdd000407.shtmlGoogle ScholarGoogle Scholar
  18. ACCESSDATA. 2020. Imager User guide. ACCESSDATA. Retrieved Feb 16, 2022 from https://accessdata.com/product-download/ftk-imager-version-4-5Google ScholarGoogle Scholar
  19. Joachim Metz. 2020. EWF specification, Retrieved Feb 16, 2022 from https://github.com/libyal/libewf/blob/main/documentation/Expert%20Witness%20Compression%20Format%20(EWF).asciidocGoogle ScholarGoogle Scholar
  20. Michael Cohen, Simson Garfinkel, BradleySchatz. 2009. Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow, Digital Investigation Volume 6, Supplement, September 2009, Pages S57-S68. Available at : https://www.sciencedirect.com/science/article/pii/S1742287609000401Google ScholarGoogle Scholar
  21. Sally Vandeven. 2014. Forensic Images: For Your Viewing Pleasure, SANS, Retrieved Feb 16, 2022 from https://sansorg.egnyte.com/dl/HvbeBjwKSyGoogle ScholarGoogle Scholar
  22. Behrouz Forouzan. 2007. Cryptography & Network Security, McGraw-Hill Publishing, 2007, 1- 748pGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  23. Cheon Jeong-hee, Eo Yun-hee and Kim Jae-yun. 2018, "Privacy-Preserving Finance Data Analysis Based on Homomorphic Encryption", Financial Information Research, vol.7, no.1 pp.33-60. Available from: doi:10.35214/rfis.7.1.201802.002Google ScholarGoogle ScholarCross RefCross Ref
  24. van Dijk M., Gentry C., Halevi S., Vaikuntanathan V. (2010) Fully Homomorphic Encryption over the Integers. In: Gilbert H. (eds) Advances in Cryptology – EUROCRYPT 2010. EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13190-5_2Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Study on Privacy Protection of Mobile Evidence in Relation to Criminal Investigative Procedures
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              dg.o 2022: DG.O 2022: The 23rd Annual International Conference on Digital Government Research
              June 2022
              499 pages
              ISBN:9781450397490
              DOI:10.1145/3543434

              Copyright © 2022 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 September 2022

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate150of271submissions,55%
            • Article Metrics

              • Downloads (Last 12 months)36
              • Downloads (Last 6 weeks)5

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader