METHOD TO DETECT SUSPICIOUS INDIVIDUALS THROUGH MOBILE DEVICE DATA
DOI:
https://doi.org/10.18372/2225-5036.29.18075Keywords:
mobile forensics, iOS, suspicious individual’s detection method, BluetoothAbstract
In today's technologically advanced era, the ubiquitous use of smart mobile devices has become a significant aspect of daily life, thereby presenting a valuable opportunity for investigative purposes. These devices, when equipped with the right tools and subjected to thorough inspection methodologies, can yield a treasure trove of concealed information, which can be crucial in various investigative scenarios. Among these devices, the Apple iPhone stands out due to its widespread popularity and adoption across a diverse global user base. Its advanced features and user-friendly characteristics have made it a preferred choice for a wide array of individuals, ranging from students and teachers to business professionals and individuals from various other fields. This widespread usage underscores the importance of understanding the nuances of iPhone data in investigative contexts. This article delves into the intricate concept of identifying a potentially dangerous person by leveraging the data available on these smart devices. It meticulously discusses the importance of context in categorizing an individual as potentially dangerous and sheds light on the various factors that play a pivotal role in this classification process. To aid in this endeavor, the article introduces a comprehensive diagram that outlines the step-by-step procedure for assessing the potential danger posed by an individual. Furthermore, the article explores the fundamental techniques of mobile device forensics, particularly focusing on devices operating on the iOS platform. It presents the findings from practical research, offering insights into the type of data that can be extracted during a forensic investigation of these devices. A novel approach is proposed for classifying individuals as potentially dangerous based on the analysis of Bluetooth data obtained from their mobile devices. This method is elucidated through the presentation of pseudocode, which details the algorithmic steps involved in this classification process. To enhance the effectiveness of this method, the article suggests incorporating additional data sources. These include information pertaining to saved Wi-Fi networks that the device has connected to and GPS coordinates that have been logged during the operation of various system applications inherent to the iOS operating system. Finally, the article emphasizes the critical need for the practical implementation and rigorous testing of this proposed method. It underscores the importance of validating and refining the approach to ensure its effectiveness and reliability in identifying potentially dangerous individuals through the forensic analysis of mobile device data. This comprehensive approach not only broadens the scope of mobile device forensics but also contributes significantly to the field of security and investigative research.
References
Schuster, A.M., Cotten, S.R. & Meshi, D. Estab-lished Adults, Who Self-Identify as Smartphone and/or Social Media Overusers, Struggle to Balance Smartphone Use for Personal and Work Purposes. J Adult Dev 30, pp. 78-89 (2023).
Use Bluetooth and Wi-Fi in Control Center, https://support.apple.com/en-us/102412.
Shytierra Gaston, Rod K. Brunson, David O. Ayeni. Suspicious places make people suspicious: Offic-ers’ perceptions of place-based conditions in racialized drug enforcement, 2022. https://doi.org/10.1111/1745-9133.12606.
Kasperowski, D., & Hagen, N. (2022). Making particularity travel: Trust and citizen science data in Swedish environmental governance. Social Studies of Science, 52(3), pp. 447-462. https://doi.org/10.1177/0306312722¬1085241.
P.V. Bindu, P. Santhi Thilagam, Mining social networks for anomalies: Methods and challenges, Jour-nal of Network and Computer Applications, Volume 68, 2016, pp. 213-229.
Lokanan, Mark & Maddhesia, Vikas Kumar. (2023). Predicting Suspicious Money Laundering Trans-actions using Machine Learning Algorithms. 10.21203/ rs.3.rs-2530874/v1.
Kenyon, J., Binder, J. F., & Baker-Beall, C. (2023). Online radicalization: Profile and risk analysis of individuals convicted of extremist offences. Legal and Criminological Psychology, 28, pp. 74-90.
Guidelines on Mobile Device Forensics, NIST Special Publication 800-101 Revision 1, 2014, http:// dx.doi.org/10.6028/NIST.SP.800-101r1.
M. -H. wu, T. -C. Chang and Y. Li-Min, "Digi-tal Forensics Security Analysis on iOS Devices," in Jour-nal of Web Engineering, vol. 20, no. 3, pp. 775-794, May 2021, doi: 10.13052/jwe1540-9589.20310.
iMazing – iOS backups management tool, https://imazing.com/.
SQLite database, https://www.sqlite.org/.
. Digital Forensics, https://bitsplease4n6.wordpress.com/.
. Becker, Johannes & Li, David & Starobinski, David. (2019). Tracking Anonymized Bluetooth Devices. Proceedings on Privacy Enhancing Technologies. 2019. pp. 50-65. 10.2478/popets-2019-0036.
. Bluetooth Special Interest Group (SIG). Core Specifications, 2018.
. Martin Woolley. Bluetooth Technology Pro-tecting Your Privacy, 2015.
. Heinrich, Alexander & Stute, Milan & Hol-lick, Matthias. (2020). DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
. Vasylyshyn, S., Susukailo, V., Opirskyy, I., Kurii, Y., & Tyshyk, I. (2023). A model of decoy system based on dynamic attributes for cybercrime investiga-tion. Eastern-European Journal of Enterprise Technolo-gies, 1(9 (121), pp. 6-20. https: // doi.org / 10.15587/1729-4061. 2023. 273363.
. Susukailo, V., Opirskyy, I., Vasylyshyn, S. Analysis of the attack vectors used by threat actors dur-ing the pandemic // 2020 IEEE 15th International Sci-entific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2020 - Proceedings, 2020, 2, С. 261-264.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.