Abstract
Mobile phones are increasingly a source of evidence in criminal investigations. The evidence on a phone is volatile and can easily be overwritten or deleted. There are many tools that claim to radio isolate a phone in order to preserve evidence. Unfortunately the wireless preservation devices do not always successfully prevent network communication as promised. The purpose of this study was to identify situations where the devices used to protect evidence on mobile phones can fail. There has been little published research on how well these devices work in the field despite the escalating importance of mobile phone forensics. These shielding devices were tested using mobile phones from three of the largest services providers in the U.S. Calls were made to contact the isolated phones using voice, SMS, and MMS at varying distances from the provider’s towers. In the majority of the test cases the phones were not isolated from their networks despite being enclosed in a shielding device. It was found that SMS calls penetrated the shields the most often. Voice calls were the next most likely to penetrate the shields and MMS were the least.
Keywords
cyber, forensics, mobile, cell, phone, shielding, rf
Date of this Version
12-10-2010
Department
Information and Technology
Department Head
Dr. Gary Bertoline
Month of Graduation
December
Year of Graduation
2010
Degree
Master of Science
Head of Graduate Program
Gary Bertoline
Advisor 1 or Chair of Committee
Richard Mislan
Committee Member 1
Richard Mislan
Committee Member 2
Marcus Rogers
Committee Member 3
Anthony Smith