A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans
نویسندگان
چکیده
Blackberry RIM devices are arguably one of the more secure platforms for email, calendaring and voice. It is one of the few devices in this arena that has approval for carrying restricted security classifications. Blackberry devices do suffer from the same basic fundamental flaw in that they have a human operator. This research was about the blind purchase of Blackberry devices from auctions. Of the 15 Blackberry examined in this study 3 were able to be fully recovered. They all revealed personal and corporate details about the users of the devices.
منابع مشابه
Forensic analysis of social networking applications on mobile devices
The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests we...
متن کاملSocial Networking Applications on Mobile Devices
The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests we...
متن کاملExploring the enterprise class wireless operating systems: Blackberry operating systems
The Blackberry operating systems with its limited applications. In its application world are emerging to be the most efficient devices. The android operating systems which involves a variety of applications, Blackberry still continues to be the addiction of most of the peoples as indicated by some of the studies. However some of the studies also present the problems witnessed by its users. Rese...
متن کاملWindows Registry Forensics: An Imperative Step in Tracking Data Theft via USB Devices
Owing to the increasing pace of occurrence of crimes in digital world, cyber forensic investigation is becoming a burning topic in the field of information security. Registry is an important location in Windows system that contains footprints of user activities and other configuration data, which may be valuable for forensic investigators in collecting potential evidences from the system. This ...
متن کاملA comparative study of the cleaning effect of various ultrasonic cleaners on new, unused endodontic instruments
BACKGROUND AND AIM: This study was carried out to compare three different ultrasonic cleaner devices in the cleaning process of endodontic instruments by scanning electron microscope (SEM). METHODS: In this study, 120 unused brand new hand and rotary instruments were examined after removing from the sealed package. The instruments were randomly divided into six groups of 20 rotary or hand files...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008