iPod Forensics: Forensically Sound Examination of an Apple iPod

Abstract

.................................................................................................................................... 5 Declaration ................................................................................................................................ 6 Acknowledgements ................................................................................................................... 7 Introduction ............................................................................................................................... 8 Motivation............................................................................................................................. 8 Research Questions ............................................................................................................... 9 Research Goals.................................................................................................................... 10 Literature Review .................................................................................................................... 11 Forensic Computing............................................................................................................ 11 The Need for Standard Operating Procedures ................................................................ 12 Validation of Standard Operating Procedures ................................................................ 13 Digital Investigation............................................................................................................ 14 The Digital Investigation Process ................................................................................... 14 Images and Digital Evidence .......................................................................................... 16 Images ......................................................................................................................... 16 Write Blocking ............................................................................................................ 16 Hashes ......................................................................................................................... 17 Rules of Evidence........................................................................................................ 17 Connecting the Accused with the Offence .................................................................. 18 Co-mingled Data ......................................................................................................... 18 The Trojan Horse Defence .......................................................................................... 18 Evidence of Habituation .............................................................................................. 19 Metadata Analysis .......................................................................................................... 19 iPod Forensics ..................................................................................................................... 20 iPods and Crime.............................................................................................................. 20 Forensic Investigation of the iPod .................................................................................. 21 The Australian Context ....................................................................................................... 22 Investigations........................................................................................................................... 24 Hardware............................................................................................................................. 24 Software .............................................................................................................................. 25

DOI: 10.1109/HICSS.2007.300

Extracted Key Phrases

3 Figures and Tables

Cite this paper

@inproceedings{Slay2007iPodFF, title={iPod Forensics: Forensically Sound Examination of an Apple iPod}, author={Jill Slay and Andrew Przibilla}, booktitle={HICSS}, year={2007} }