The challenges of seizing and searching the contents of Wi-Fi devices for the modern investigator

To the modern law enforcement investigator, the potential for an offender to have a mobile device on his or her person, who connects to a Wi-Fi network, may afford evidence to place them at a scene, at a particular time. Whilst tools to interrogate mobile devices and Wi-Fi networks, have undergone s...

Full description

Saved in:  
Bibliographic Details
Main Author: Blackman, Dan (Author)
Contributors: Szewczyk, Patryk
Format: Electronic Book
Language:English
Published: 2015
In:Year: 2015
Online Access: Volltext (kostenfrei)
Check availability: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866345435
003 DE-627
005 20250116054858.0
007 cr uuu---uuuuu
008 231019s2015 xx |||||o 00| ||eng c
035 |a (DE-627)1866345435 
035 |a (DE-599)KXP1866345435 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Blackman, Dan  |e VerfasserIn  |4 aut 
245 1 4 |a The challenges of seizing and searching the contents of Wi-Fi devices for the modern investigator 
264 1 |c 2015 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a To the modern law enforcement investigator, the potential for an offender to have a mobile device on his or her person, who connects to a Wi-Fi network, may afford evidence to place them at a scene, at a particular time. Whilst tools to interrogate mobile devices and Wi-Fi networks, have undergone significant development, little research has been conducted with regards to interrogating Wi-Fi routers and the evidence they may contain. This paper demonstrates that multiple inhibiting factors exist for forensic investigators when attempting to extract data from Wi-Fi routers at the scene. Data volatility means the Wi-Fi router cannot be powered down without losing a substantial quantity of data. Third party Wi-Fi enabled devices may connect to or interact with the access point after an event occurs. Multiple models exist, with varying internal architectures, operating systems, and external interfaces. This paper presents steps and considerations for at scene seizure of Wi-Fi devices for law enforcement, to ensure maximum digital forensic evidence is collected. It also lists a series of recommendations to the manufacturers of Wi-Fi devices to facilitate a standardised mechanism to collect forensic evidence, thus making future acquisitions easier and time efficient 
700 1 |a Szewczyk, Patryk  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/41538798.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4392991164 
LOK |0 003 DE-627 
LOK |0 004 1866345435 
LOK |0 005 20231019043730 
LOK |0 008 231019||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE24257544 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw