Abstract

Mobile phones are increasingly a source of evidence in criminal investigations. The evidence on a phone is volatile and can easily be overwritten or deleted. There are many tools that claim to radio isolate a phone in order to preserve evidence. Unfortunately the wireless preservation devices do not always successfully prevent network communication as promised. The purpose of this study was to identify situations where the devices used to protect evidence on mobile phones can fail. There has been little published research on how well these devices work in the field despite the escalating importance of mobile phone forensics. These shielding devices were tested using mobile phones from three of the largest services providers in the U.S. Calls were made to contact the isolated phones using voice, SMS, and MMS at varying distances from the provider’s towers. In the majority of the test cases the phones were not isolated from their networks despite being enclosed in a shielding device. It was found that SMS calls penetrated the shields the most often. Voice calls were the next most likely to penetrate the shields and MMS were the least.

Keywords

cyber, forensics, mobile, cell, phone, shielding, rf

Date of this Version

12-10-2010

Department

Information and Technology

Department Head

Dr. Gary Bertoline

Month of Graduation

December

Year of Graduation

2010

Degree

Master of Science

Head of Graduate Program

Gary Bertoline

Advisor 1 or Chair of Committee

Richard Mislan

Committee Member 1

Richard Mislan

Committee Member 2

Marcus Rogers

Committee Member 3

Anthony Smith

Share

COinS