Abstract
Cellular phones are becoming ubiquitous. As of March 2005, there were more than 180 million cellular subscribers in the United States, over 60% of the population. Cellular devices invariably contain information that can aid criminal investigations. Nevertheless, extracting evidence from cellular phones is quite uncommon in the United States. The principal reasons are the lack of awareness and training on the part of law enforcement agents and the limited availability of inexpensive tools for extracting and analyzing evidence. This paper describes a toolkit for extracting and analyzing data from SIM cards, which are used for cryptographic authentication, key generation and data storage in GSM cellular phones.
Chapter PDF
Similar content being viewed by others
References
B. Carrier, Defining digital forensic examination and analysis tools, International Journal of Digital Evidence, vol. 1(4), 2003.
European Telecommunications Standards Institute, 3GPP TS 24.011 v6.0.0 (2003-09), 3rd Generation Partnership Project, Technical Specification Group Core Network; Point-to-Point (PP) Short Message Service (SMS) Support on Mobile Radio Interface (Release 6), 2003.
European Telecommunications Standards Institute, 3GPP TS 23.039 v6.1.0 (2004-09), 3rd Generation Partnership Project, Technical Specification Group Terminals, Alphabets and Language-Specific Information (Release 6), 2004.
European Telecommunications Standards Institute, 3GPP TS 23.040 v5.5.0 (2004-09), 3rd Generation Partnership Project, Technical Specification Group Terminals, Technical Realization of Short Message Service (SMS), (Release 6), 2004.
European Telecommunications Standards Institute, ETSI TS 102 221 v7.0.0 (2004-12), Smart Cards, UICC-Terminal Interface, Physical and Logical Characteristics (Release 7), 2004.
European Telecommunications Standards Institute, ETSI TS 151 011 v4.11.0 (2004-03), Digital Cellular Telecommunications System (Phase 2+), Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface (3GPP TS 51.011 Version 4.11.0 Release 4), 2004.
P. Hawkins, Macintosh forensics analysis using OS X (www.sans.org/rr/papers/34/269.pdf), 2002.
International Telecommunications Union, List of E.212 mobile country codes (www.numberingplans.com).
M. Karim and M. Sarraf, W-CDMA and cdma2000 for 3G Mobile Networks, McGraw-Hill Professional, Martinsburg, Virginia, 2002.
V. Klíma, Finding MD5 collisions — A toy for a notebook (eprint.iacr.org/2005/075), 2005.
K. Mandia and C. Prosise, Incident Response: Investigating Computer Crime, McGraw-Hill, Berkeley, California, 2001.
M. Oestreicher, JPCSC: JNI-wrapper for PCSC (www.zurich.ibm.com/jcop/download/tools/data/jpcsc-0.7.txt).
PC/SC Working Group, Interoperability specification for ICCs and personal computer systems (www.pcscworkgroup.com), 2004.
W. Rankl and W. Effing, Smart Card Handbook, John Wiley, Chippenham Wiltshire, Great Britain, 2003.
N. Sollenberger, N. Seshadri and R. Cox, The evolution of IS-136 TDMA for third-generation wireless services, IEEE Personal Communications Magazine, vol. 6(3), pp. 8–18, 1999.
X. Wang, Y. Yin and H. Yu, Collision search attacks on SHA1 (theory.csail.mit.edu/~yiqun/shanote.pdf), 2005.
X. Wang and H. Yu, How to break MD5 and other hash functions (www.infosec.sdu.edu.cn/paper/md5-attack.pdf), 2005.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Swenson, C., Manes, G., Shenoi, S. (2006). Imaging and Analysis of GSM SIM Cards. In: Pollitt, M., Shenoi, S. (eds) Advances in Digital Forensics. DigitalForensics 2005. IFIP — The International Federation for Information Processing, vol 194. Springer, Boston, MA. https://doi.org/10.1007/0-387-31163-7_17
Download citation
DOI: https://doi.org/10.1007/0-387-31163-7_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30012-2
Online ISBN: 978-0-387-31163-0
eBook Packages: Computer ScienceComputer Science (R0)