•  
  •  
 

Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an advantage over participants with a criminal justice background. Study participants were volunteers ranging in age from 20 to over 60 and had a variety of backgrounds and prior work experience. Volunteers completed a timed trial comprised of four timed subtasks. Results were compared for both quality and speed in task. Qualitative, quantitative and observational data were gathered throughout the course of this study. Data gathered by this research study indicated that while students in the campus cohort were able to complete the subject trial within a 10% variance of those in the workshop cohort, the quality of the tasks completed was not within the 10% variance.

References

Al-Zarouni, M. (2007). Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. Proceedings of the 5th Australian Digital Forensics Conference, Edith Cowan University, P. Perth Western Australia: Research Online.

Al-Zarouni, M. (2006). Mobile handset forensic evidence: a challenge for law enforcement. 4th Australian Digital Forensics Conference. Perth Western Autralia: Research Onlin.

Bergslien, E. (2006). Teaching to avoid the "CSI effect": keeping the science in forensic science. Journal of Chemical Education, 83 (5), 690-691.

Breeuwsma, M., de Johngh, M., Klaver, C., van der Knijff, R., & Roeloffs, M. (2007). Forensic data recovery from flash memory. Small Scale Digital Device Forensics Journal, 1 (1), 1-17.

Campbell, M. (2012, December 27). Apple Insider. Retrieved December 31, 2012, from appleinsider.com: http://appleinsider.com/articles/12/12/27/christmas-2012-17m-ios-and-android-device-activated-87-jump-in-app-store-downloads

Cantrell, G. (2012). Creation and resting of a semi-automated digital triage process model. Mississippi State University.

Casey, E., Bann, M., & Doyle, J. (2010). Introduction to window mobile forensics. Digital Investigation, 6, pp. 136-146.

Elder, R. (2012, May-June). Chip-off and JTAG analysis for mobile device forensics. Evidence Magazine, 10 (3), pp. 10-15.

Garfinkel, S., Farrell, P., Rousseu, F., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. Digital Investigations, 6 (S), pp. 2-11.

Hoog, A. (2011). Android forensics: investigation, analysis and mobile security for google android. Waltham, MA, USA: Syngress.

Houck, M. (2006). CSI: Reality. Scientific American, 295 (1), 84-89.

Irons, A., Stephens, P., & Ferguson, R. (2009, April 2). Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigations, 6, pp. 82-90.

Jonathan Clark. (2000). Forensic Telecommunications Services. Retrieved January 15, 2013, from About FTS: http://www.forensicts.co.uk

Kessler, G., & Shirling, M. E. (2006). The design of an undergraduate degree program in computer & digital forensics. Journal of Digital Forensics, Security and Law, 1 (3), 37-50.

Mardis, M. A. (2006, September/October). "The CSI effect": science learning, and the school library. Knowledge Quest, 35 (1), pp. 12-17.

Matthews, W. (2013, January 12). Southwest Regional Computer Crime Institute Director. (J. R. Through, Interviewer)

McCarthy, P. (2005). Forensic analysis of mobile phones. University of South Australia, School of Computer and Information Science. Mawson Lakes: University of South Australia.

Muncaster, P. (2013, May 27). The Register. Retrieved June 4, 2013, from www.theregister.com.uk: http://www.theregister.co.uk/2013/05/27/lenovo_us_smartphone_launch/

Reisinger, D. (2011, June 28). news.cnet.com. Retrieved December 31, 2012, from cnet.com: http://news.cnet.com/8301-13506_3-20074956-17/google-500000-android-devices-activated-each-day/

Roane, K. R. (2005, April 25). The CSI effect. U.S. News & World Report, 138 (15), pp. 48-54.

Rogers, M. K., & Seigfried, K. (2004, January 6). The future of computer forensics: a needs analysis survey. Computers & Security, 23, pp. 12-16.

Russell Brewis. (2012). Forensic Telecommunications Services. Retrieved January 12, 2012, from forensicts: http://www.forensicts.co.uk/SubCategory.aspx?ID=80&SMID=103

Science Daily. (2009, January 1). Retrieved December 31, 2012, from sciencedaily.com: http://www.sciencedaily.com/videos/2009/0104-digital_evidence.htm

Wassenaar, D., Woo, D., & Wu, P. (2009). A eertificate program in computer forensics. Consortium for Computing Sciences in Colleges: Southwestern Conference.24, pp. 158-167. University of Maryland University College Europe.

DOI

https://doi.org/10.15394/jdfsl.2017.1420

Share

COinS
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.