5 research outputs found

    BlackBerry PlayBook backup forensic analysis

    Get PDF
    © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013. Due to the numerous complicating factors in the field of small scale digital device forensics, physical acquisition of the storage of such devices is often not possible (at least not without destroying the device). As an alternative, forensic examiners often gather digital evidence from small scale digital devices through logical acquisition. This paper focuses on analyzing the backup file generated for the BlackBerry PlayBook device, using the BlackBerry Desktop Management software to perform the logical acquisition. Our work involved analyzing the generated “.bbb” file looking for traces and artifacts of user activity on the device. Our results identified key files that can assist in creating a profile of the device’s usage. Information about BlackBerry smart phone devices connected to the tablet was also recovered

    Blackberry playbook backup forensic analysis

    Get PDF
    Abstract. Due to the numerous complicating factors in the field of small scale digital device forensics, physical acquisition of the storage of such devices is often not possible (at least not without destroying the device). As an alternative, forensic examiners often gather digital evidence from small scale digital devices through logical acquisition. This paper focuses on analyzing the backup file generated for the BlackBerry PlayBook device, using the BlackBerry Desktop Management software to perform the logical acquisition. Our work involved analyzing the generated ".bbb" file looking for traces and artifacts of user activity on the device. Our results identified key files that can assist in creating a profile of the device's usage. Information about BlackBerry smart phone devices connected to the tablet was also recovered

    BlackBerry PlayBook Backup Forensic Analysis

    Get PDF
    Due to the numerous complicating factors in the field of small scale digital device forensics, physical acquisition of the storage of such devices is often not possible (at least not without destroying the device). As an alternative, forensic examiners often gather digital evidence from small scale digital devices through logical acquisition. This paper focuses on analyzing the backup file generated for the BlackBerry PlayBook device, using the BlackBerry Desktop Management software to perform the logical acquisition. Our work involved analyzing the generated “.bbb” file looking for traces and artifacts of user activity on the device. Our results identified key files that can assist in creating a profile of the device’s usage. Information about BlackBerry smart phone devices connected to the tablet was also recovered

    Performance of android forensics data recovery tools

    No full text
    Recovering deleted or hidden data is among the most important duties of forensics investigators. Extensive utilization of smartphones as subject, objects, or tools of crime made them an important part of residual forensics. This chapter investigates the effectiveness of mobile forensic data recovery tools in recovering evidences from a Samsung Galaxy S2 i9100 Android phone. We seek to determine the amount of data that could be recovered using Phone image carver, Access data FTK, Foremost, Diskdigger, and Recover My File forensic tools. The findings reflected the difference between recovery capacities of studied tools showing their suitability in their specialized contexts only
    corecore