METHOD TO DETECT SUSPICIOUS INDIVIDUALS THROUGH MOBILE DEVICE DATA

Authors

DOI:

https://doi.org/10.18372/2225-5036.29.18075

Keywords:

mobile forensics, iOS, suspicious individual’s detection method, Bluetooth

Abstract

In today's technologically advanced era, the ubiquitous use of smart mobile devices has become a significant aspect of daily life, thereby presenting a valuable opportunity for investigative purposes. These devices, when equipped with the right tools and subjected to thorough inspection methodologies, can yield a treasure trove of concealed information, which can be crucial in various investigative scenarios. Among these devices, the Apple iPhone stands out due to its widespread popularity and adoption across a diverse global user base. Its advanced features and user-friendly characteristics have made it a preferred choice for a wide array of individuals, ranging from students and teachers to business professionals and individuals from various other fields. This widespread usage underscores the importance of understanding the nuances of iPhone data in investigative contexts. This article delves into the intricate concept of identifying a potentially dangerous person by leveraging the data available on these smart devices. It meticulously discusses the importance of context in categorizing an individual as potentially dangerous and sheds light on the various factors that play a pivotal role in this classification process. To aid in this endeavor, the article introduces a comprehensive diagram that outlines the step-by-step procedure for assessing the potential danger posed by an individual. Furthermore, the article explores the fundamental techniques of mobile device forensics, particularly focusing on devices operating on the iOS platform. It presents the findings from practical research, offering insights into the type of data that can be extracted during a forensic investigation of these devices. A novel approach is proposed for classifying individuals as potentially dangerous based on the analysis of Bluetooth data obtained from their mobile devices. This method is elucidated through the presentation of pseudocode, which details the algorithmic steps involved in this classification process. To enhance the effectiveness of this method, the article suggests incorporating additional data sources. These include information pertaining to saved Wi-Fi networks that the device has connected to and GPS coordinates that have been logged during the operation of various system applications inherent to the iOS operating system. Finally, the article emphasizes the critical need for the practical implementation and rigorous testing of this proposed method. It underscores the importance of validating and refining the approach to ensure its effectiveness and reliability in identifying potentially dangerous individuals through the forensic analysis of mobile device data. This comprehensive approach not only broadens the scope of mobile device forensics but also contributes significantly to the field of security and investigative research.

References

Schuster, A.M., Cotten, S.R. & Meshi, D. Estab-lished Adults, Who Self-Identify as Smartphone and/or Social Media Overusers, Struggle to Balance Smartphone Use for Personal and Work Purposes. J Adult Dev 30, pp. 78-89 (2023).

Use Bluetooth and Wi-Fi in Control Center, https://support.apple.com/en-us/102412.

Shytierra Gaston, Rod K. Brunson, David O. Ayeni. Suspicious places make people suspicious: Offic-ers’ perceptions of place-based conditions in racialized drug enforcement, 2022. https://doi.org/10.1111/1745-9133.12606.

Kasperowski, D., & Hagen, N. (2022). Making particularity travel: Trust and citizen science data in Swedish environmental governance. Social Studies of Science, 52(3), pp. 447-462. https://doi.org/10.1177/0306312722¬1085241.

P.V. Bindu, P. Santhi Thilagam, Mining social networks for anomalies: Methods and challenges, Jour-nal of Network and Computer Applications, Volume 68, 2016, pp. 213-229.

Lokanan, Mark & Maddhesia, Vikas Kumar. (2023). Predicting Suspicious Money Laundering Trans-actions using Machine Learning Algorithms. 10.21203/ rs.3.rs-2530874/v1.

Kenyon, J., Binder, J. F., & Baker-Beall, C. (2023). Online radicalization: Profile and risk analysis of individuals convicted of extremist offences. Legal and Criminological Psychology, 28, pp. 74-90.

Guidelines on Mobile Device Forensics, NIST Special Publication 800-101 Revision 1, 2014, http:// dx.doi.org/10.6028/NIST.SP.800-101r1.

M. -H. wu, T. -C. Chang and Y. Li-Min, "Digi-tal Forensics Security Analysis on iOS Devices," in Jour-nal of Web Engineering, vol. 20, no. 3, pp. 775-794, May 2021, doi: 10.13052/jwe1540-9589.20310.

iMazing – iOS backups management tool, https://imazing.com/.

SQLite database, https://www.sqlite.org/.

. Digital Forensics, https://bitsplease4n6.wordpress.com/.

. Becker, Johannes & Li, David & Starobinski, David. (2019). Tracking Anonymized Bluetooth Devices. Proceedings on Privacy Enhancing Technologies. 2019. pp. 50-65. 10.2478/popets-2019-0036.

. Bluetooth Special Interest Group (SIG). Core Specifications, 2018.

. Martin Woolley. Bluetooth Technology Pro-tecting Your Privacy, 2015.

. Heinrich, Alexander & Stute, Milan & Hol-lick, Matthias. (2020). DEMO: BTLEmap: Nmap for Bluetooth Low Energy.

. Vasylyshyn, S., Susukailo, V., Opirskyy, I., Kurii, Y., & Tyshyk, I. (2023). A model of decoy system based on dynamic attributes for cybercrime investiga-tion. Eastern-European Journal of Enterprise Technolo-gies, 1(9 (121), pp. 6-20. https: // doi.org / 10.15587/1729-4061. 2023. 273363.

. Susukailo, V., Opirskyy, I., Vasylyshyn, S. Analysis of the attack vectors used by threat actors dur-ing the pandemic // 2020 IEEE 15th International Sci-entific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2020 - Proceedings, 2020, 2, С. 261-264.

Published

2023-12-25

Issue

Section

Software & Hardware Architecture Security