| Literature DB >> 28445486 |
Abdulalem Ali1,2, Shukor Abd Razak1, Siti Hajar Othman1, Arafat Mohammed1, Faisal Saeed1.
Abstract
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely dispersed. The wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to ambiguity in the concepts and terminologies of the mobile forensics domain. This paper developed an approach for mobile forensics domain based on metamodeling. The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM). In addion, it contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Furthermore, it reduces the difficulty and ambiguity in the mobile forensics domain. A validation process was performed to ensure the completeness and correctness of the MFM. The validation was conducted using two techniques for improvements and adjustments to the metamodel. The last version of the adjusted metamodel was named MFM 1.2.Entities:
Mesh:
Year: 2017 PMID: 28445486 PMCID: PMC5433730 DOI: 10.1371/journal.pone.0176223
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Worldwide device shipments in year 2014[3].
Mobile phone digital crimes [11].
| Crime | Description | Evidence Source |
|---|---|---|
| By sending any type of (text, sexual, photo, video) messages that contain harassing and threatening words. | -Message box—Calendars. | |
| Criminals using mobile phones to distribute drugs and coordinate activities between them. | -Messages box—Calendars. | |
| | Dangerous actions against civilians to achieve political, organization goals by using mobile phones as a bomb (e.g.: Mumbai terrorist attack 2008, and commuter trains in Madrid in 2004, or using the mobile to coordinate activities and share information). | -Cell site locations—Call history. |
| | Using mobile banking app features to send fake information that looks like an original to the victims. | - Internet history logs. |
Fig 2Metamodeling process.
MF model collection and classification.
| Model | Year published | Cover Phase | ||||
|---|---|---|---|---|---|---|
| Preservation | Acquisition | Examination & Analysis | Reporting | |||
| 1 | Developing Process for Mobile Device Forensics
[ | 2009 | X | X | X | X |
| 2 | Symbian smartphones forensic process model
[ | 2009 | X | X | X | X |
| 3 | Windows Mobile Forensic Process Model [ | 2007 | X | X | X | X |
| 4 | Smartphone Forensic Investigation Process Model
[ | 2012 | X | X | X | X |
| 5 | Smart-Phone DEFSOP [ | 2011 | X | X | X | X |
| 6 | Enhanced Mobile Forensic Process Model [ | 2013 | X | X | X | X |
| 7 | Framework for iPhone Forensic [ | 2011 | X | X | X | X |
| 8 | Mobile Forensics using the Harmonised Digital
Forensic Investigation Process [ | 2014 | X | X | X | X |
| 9 | A quantitative approach to Triaging in Mobile
Forensics [ | 2011 | X | X | X | X |
| 10 | A Theoretical Process Model for Smartphones
[ | 2013 | X | X | X | X |
| 11 | Mobile Smart Device Investigation Process
[ | 2015 | X | X | X | X |
| 12 | Conceptual Evidence Collection and Analysis
Methodology for Android Devices [ | 2015 | X | X | X | X |
| 13 | Mobile Forensic Investigation Life Cycle
Process [ | 2016 | X | X | X | X |
| 14 | An Android Social App Forensics Adversary Model
[ | 2016 | X | X | X | X |
| 15 | Android cache taxonomy and forensic process
[ | 2015 | X | X | X | X |
| 16 | Thumbnail forensic recovery process for Android
devices [ | 2015 | X | X | X | X |
| 17 | Integrated Digital Forensic Investigation Model
for smartphone [ | 2016 | X | X | X | X |
| 18 | Framework of Digital Forensics for the Samsung
Star Series Phone [ | 2011 | X | X | X | X |
| 19 | Guidelines on Mobile Device Forensics [ | 2013 | X | X | X | X |
| 20 | Mobile Forensics Model [ | 2016 | X | X | X | X |
| 21 | An Approach for Mobile Forensics Analysis
[ | 2015 | X | X | X | X |
| 1 | Digital evidence extraction and documentation
from mobile devices [ | 2013 | X | |||
| 2 | ANDROPHSY–Forensic Framework for Android [ | 2015 | X | X | X | |
| 3 | Mobile Forensic Adversary Model [ | 2015 | X | |||
| 4 | A Mobile Forensics Model Based on Social
Relations [ | 2014 | X | |||
| 5 | Evidence Data Collection through iPhone
Forensic [ | 2012 | X | X | ||
| 6 | A General Collection Methodology for Android
Devices [ | 2013 | X | X | ||
| 7 | Forensic analysis and security assessment of
Android m-banking apps [ | 2016 | X | X | ||
| 8 | Logical acquisition and analysis of data from
android mobile devices [ | 2015 | X | X | ||
| 9 | Smartphone Forensics: A Proactive Investigation
Scheme [ | 2011 | X | X | ||
| 10 | CDCD-5 an Improved Mobile Forensics Model
[ | 2012 | X | X | ||
| 1 | Testing the Harmonised Digital Forensic
Investigation Process Model-Using an Android Mobile Phone
[ | 2013 | X | X | X | X |
| 2 | Advances of Mobile Forensic Procedures in
Firefox OS [ | 2014 | X | X | X | |
| 3 | Acquisition and Analysis of Digital Evidence in
Android Smartphones [ | 2011 | X | X | X | |
| 4 | Generic Process Model for Smartphones Live
Memory Forensics [ | 2014 | X | X | X | X |
| 5 | Digital Forensics Process of Smartphone Devices
[ | 2011 | X | X | X | X |
| 6 | Guidelines on Cell Phone Forensics [ | 2007 | X | X | X | X |
| 7 | Smart Handheld Device Digital Evidence Forensic
Procedures [ | 2013 | X | X | X | |
| 8 | Systematic Digital Forensic Investigation Model
[ | 2011 | X | X | X | X |
| 9 | The Forensic Process Analysis of Mobile Device
[ | 2015 | X | X | X | |
| 10 | A Unified Forensic Investigation Framework of
Smartphones [ | 2013 | X | X | X | |
Fig 3Concept extraction process.
Concept extraction.
| Model | Concept | Total |
|---|---|---|
| Developing Process for Mobile Device Forensics
[ | Procedure, Chain of Custody, Information, Incident, Identification, Legal Authority, Search Warrant, Removable Data Storage, Mobile Device, Source, Potential Evidence, Forensic Tool, Documentation, Preparation, Drivers, Isolation, Faraday Bag, Radio Frequency Shielding, Extraction, Physical Memory Dump, logical Acquisition, Manual Extraction, Flash Memory Chip, Examination Data, Analyst, Examiner, File System, Verification, Hash Value, Integrity, Presentation, Prosecutor, Court, Investigator, Audience, Evidence, Jury, Archiving, Finding, Experience, Photographing, Backup, Equipment, Physical Acquisition, Unlocking Bootloader, Airplane Mode, Network Provider | 47 |
| Symbian smartphones forensic process model
[ | Preparation, Identification, Initial Information, Mobile Device, Forensic Tool, Policy, Analysis Data, Integrity, Pattern matching, Examination Data, Interpretation, Presentation, Review, Result, Evidence, Removable Media | 16 |
| Windows Mobile Forensic Process Model [ | Preparation, Recording, Photographing, Sketching, Crime, Crime Scene, Investigator, Evidence Source, Assessment Crime, Authorization, Search Warrant, Experience, Mobile Device, PackagingAndSealing, Transportation and Storage, Jurisdictional Law, Chain of Custody, Integrity, People, External Storage Media, Survey, Recognition, Potential Evidence, Search Plan, Securing Scene, Environmental Circumstance, Shock, Humidity, Temperature, Victims, Suspect, Witness, Forensic Specialist, KeywordSearch, Documentation, Communication Shielding, Evidence Collection, Volatile Evidence, Non-Volatile Evidence, Forensic Tool, Instigation Procedure, Examination Data, Data Filtering, Validation, Pattern Matching, Tampering, Hashing Technique, Recovering Data, Analysis Data, Investigative Team, Reconstructing Event, Timeframe Analysis, Hidden Data Analysis, Application and File Analysis, Interpretation, Presentation, Results, Audience, Law Enforcement, Technical Expert, Legal Expert, Corporate Management, Court of Law, Conclusion, Evidence, Jury, Police Investigation, Review, Legal Constraint, Investigation strategy, Backup, Equipment, Source, Unlocking Bootloader | 76 |
| Smartphone Forensic Investigation Process Model
[ | Tool, Crime Scene, Search Warrant, Knowledge, Mobile Device, PackagingAndSealing, Transportation and Storage, Investigation Procedure, Legal Constraint, Legal Jurisdictional, Suspect, Authorization, Integrity, Investigator, Chain of Custody, Recording, Photographing, KeywordSearch, Crime-scene Mapping, Documentation, Tampering, Victim, Witness, Communication Shielding, Environmental Effect, Shock, Humidity, Temperature, Volatile Evidence, Non-volatile Evidence, External Storage, Cell Site Analysis, Law Enforcement, Examination Data, Data Filtering, Validation, Pattern Matching, Recovering Data, Forensic Specialist, Hashing Technique, Analysis Data, Reconstructing Event, Timeframe Analysis, Hidden Data Analysis, Application and File Analysis, Interpretation, Presentation, Audience, Technical Expert, Legal Expert, Jury, Corporate Management, Court of Law, Police Investigation, Conclusion, Review, Result, Systematic Strategy, Forensic Laboratory, Securing Scene, Airplane Mode, Cell Site Analysis, Local Service Provider | 66 |
| Smart-Phone DEFSOP [ | Legislation, Documentation, Crime, People, Preparation, Mobile Device, Investigator, Searching Place, Forensic Tool, Integrity, Collecting information, Detaining Evidence, Analysis Data, Mobile Calendar, Call History, Message, Voicemail, Memory Card, Acquired Data, Crime Scene, Court, Result, Copy of Evidence, Judge, Equipment Identification, Presentation, Laboratory | 27 |
| Enhanced Mobile Forensic Process Model [ | Preparation, Authorization, Search Warrant, Recording, Photographing, Sketching, Planning, Tool, Securing Scene, Survey, Recognition, Forensic Specialist, Device Mode, PackagingAndSealing, Transportation and Storage, Signal Isolation, Acquired Data, Hand-held device, Evidence, Laboratory Evidence, Volatile Evidence, Investigative Team, Examination Data, Analysis Data, Evidence, Backup, Hidden Data, Reconstructing Event, Presentation, Chain of Custody, Review, Audience, Result, Law Enforcement, Corporate Management, Legal Expert, Court Ruling, Crime, Seizure, Forensic Examiner | 41 |
| Framework for iPhone Forensic [ | Tool, Forensic Investigator, Data Integrity, Logical Acquisition, Physical Acquisition, Suspect Device, Data Analysis, Text Evidence, Network Evidence, Audio-Visual Evidence, Online Activity Evidence, User Activity Evidence, Software, Backup, Retrieved Evidence, Evidence, Authority, Crime Scene, Cellular Provider | 19 |
| Mobile Forensics using the Harmonised Digital
Forensic Investigation Process [ | Investigation Procedures, Incident, Identification, First Responder, Investigator, Planning, Techniques, Preparation Equipment, Documentation, Incident Scene, Chain of Custody, Extraction, Evidence, Authorization, Investigative Team, Photographing, Recording Scene, Potential Evidence, Integrity, Transportation and Storage, Shock, Acquired Data, Logical Acquisition, Physical Acquisition, Analysis Data, Reconstructing Scene, Recovery, Evidence, Interpretation, Expert witness’s testimony, Presentation, Timestamp, Stakeholders, jury, Accused, Lawyers, Prosecutor, Validity, Investigation Conclusion, Decision, Laboratory, Retrieved Data, Internal Memory | 45 |
| A quantitative approach to Triaging in Mobile
Forensics [ | Device Identification, Crime Scene, Extraction, Data Triaging, Technique, Analysis Data, Evidence, Forensics Lab, Extracted Data, Investigator, Mobile Content, Mobile Phone | 13 |
| A Theoretical Process Model for Smartphones
[ | Transportation and Storage, Device, Isolation, Investigator, Faraday Bag, Documentation, Classification, Case, Forensic Tool, Suspect, Victim, Collecting Facts, Information Device, Forensic Examiner, Potential Evidence, Backup, Examination Data, Investigation Procedures, Analysis Data, Extracting Data, Evidence, Hashing Method, Verification, Internal Components, Removable Component, Interpretation, Presentation, Result, Stakeholder, Law Enforcement, Source | 31 |
| Mobile Smart Device Investigation Process
[ | Incident Detection, Crime Scene, Preparation, Sketching, Photographing, Recording, Chain of Custody, Target Device, First Responder, Assessment Incident, Investigation Plan, Potential Evidence, People, Forensic Personnel, Investigation Strategy, Identification, Isolating, Pattern Matching, Search Warrant, Documentation, Device Power, Recovering Data, Acquisition Method, Manual Acquisition, Logical Acquisition, Physical Acquisition, Integrity, Duplicate Evidence, Examination Data, Search, Filtering, Hidden Data, Visibility, Traceability, Validating, Evidence, Tool, External Evidence, Analysis Data, Reconstructing Event, Conclusion, Legal Expert, Investigator, Presentation, Summarizing, Court, Physical Evidence, Response Strategy, Acquired Data, Source, Rooting | 53 |
| Conceptual Evidence Collection and Analysis
Methodology for Android Devices [ | Procedure, Practitioner, Device, Faraday Bag, Photographing, Seizure, Practice, Disable Device Radio, Internal Memory, Physical Evidence, Filtering, Physical Collection, Device State, Potential Evidence, Forensic Procedure, Extraction, Suspect, Non-volatile Evidence, Integrity, Flash Memory, Forensic Tool, Organization, Hashing Algorithm, External Storage, Analysis Technique, Examination Data, Analysis Data, Evidence, KeywordSearch, Verification, Presentation, Finding, Court, Backup, Unlocking Bootloader, Airplane Mode, Rooting | 39 |
| Mobile Forensic Investigation Life Cycle
Process [ | Seizure, Identification, Planning, Preparation, Disable Network, Acquiring Mobile, Faraday Bag, Internal Memory, External Memory, Transportation and Storage, Laboratory, Crime, Storage Media, Chain of Custody, Data Analysis, Examination Forensic, Presentation, Legal Authority, Capturing, KeywordSearch, Source | 21 |
| An Android Social App Forensics Adversary Model
[ | Logical Forensic, Physical Forensic, Forensic Analysis, Tool, Examination, Evidence, Investigator, Findings, Android Phone, Internal Device Memory, Personal Information, Rooting | 12 |
| Android cache taxonomy and forensic process
[ | Law Enforcement, Forensic Examination, Classification, Forensic Practitioner, Practice, Forensic Analysis, Internal Storage, Mobile Device, Presentation, Court, Extraction, External Storage, Rooting | 13 |
| Thumbnail forensic recovery process for Android
devices [ | Identification, Mobile Device, Potential Evidence, Flash Memory, Tampering, Evidence, Physical Acquisition, Logical Acquisition, Manual Acquisition, Data Recovery, Extraction, Analysis Data, Hashing, Integrity, Matching, Presentation, Source, Unlocking Bootloader | 19 |
| Integrated Digital Forensic Investigation
Framework for smartphone [ | Preparation, Notification, Authorization, Seized Device, Incident Response, Securing Scene, Documentation, Crime, Scene, Event Triggering, Transportation and Storage, Communication Shielding, Volatile Evidence, Non-Volatile Evidence, Examination Data, Analysis Data, Reconstruction, Hashing, Presentation, Conclusion, Dissemination, Decision, Investigator | 24 |
| Framework of Digital Forensics for the Samsung
Star Series Phone [ | Preparation, Authorization, Forensic Examination, Transportation and Storage, Practice, Search, Seizure, Warrant, Witness, Evidence, Authority, First Responder, Crime Scene, Investigator, Equipment, Investigation Procedure, Disable Signal, Phone State, Live Acquisition, Manual Acquisition, Logical Acquisition, Capturing, Analysis Data, Presentation, Collected Data | 25 |
| Guidelines on Mobile Device Forensics [ | Mobile Device, Identification, Securing Scene, Evaluating Scene, Potential Digital Evidence, Procedure, Seizure Device, Integrity, Preparing, Search, Documentation, Recording, Photographing, Evidence Collection, Memory Volatility, PackagingAndSealing, Transporting and Storing Evidence, Isolation, Faraday Cage, Decision, Filtering, Law Enforcement, Validation, Hidden Data Analysis, Equipment, Removable Media, Verification, Interviewing, Internal Memory, Forensic Examiner, Capturing, Forensic Specialist, Forensic Laboratory, Acquisition Method, Logical Acquisition, Physical Acquisition, Manual Extraction, Extraction, Recovering, Search Warrant, Forensic Tool, Examination Data, Copy of Evidence, Forensic Analyst, Potential Evidence, Suspect, Analysis Data, Hash Value, Application and File Analysis, Timeframe Analysis, Court of Law, Results, Evidence, Jurisdiction, Scene, Conclusion, Acquired Data, KeywordSearch, Source, Airplane Mode, Cell Site Analysis, Network Provider | 62 |
| Mobile Forensics Model [ | Preparation, People, Investigation Team, First Responder, Securing Scene, Crime scene, Systematic Strategy, Legal Constraint, Evidence, Chain of Custody, Integrity, Cut Network Communication, Acquisition Method, Manual Acquisition, Logical Acquisition, Physical Acquisition, Mobile Device, Internal Memory, Non-Volatile Evidence, Volatile Evidence, Documentation, Legal Authority, Photographing, Examiner, Investigation, Transportation and Storage, Procedure, Humidity, Temperature, Environmental Effect, Forensics Lab, Examination Data, Collected Evidence, Copy of Evidence, Data Filtering, Validation, Detecting, Recovering Data, Forensics Tool, Analysis Data, Time frame Analysis, Presentation, Court of Law, Decision, Crime, Culprit, Evidence, Review, investigator, Result | 52 |
| An Approach for Mobile Forensics Analysis
[ | Investigator, Seizure, Wireless Network Off, Faraday Cage, Suspect, Crime Scene, Documentation, Forensic Lab, Tool, Forensic Analyst, Analysis, Forensic Analysis, External Memory, Forensic Examiner, Hash Function, Integrity, Presentation, Result, Audience, Collected Data, Evidence, Internal Memory, Source, Airplane Mode | 24 |
A sample of selection of common concepts.
| No | Common Concept | Concepts | Frequency | Generality | Definition |
|---|---|---|---|---|---|
| 1 | Chain of Custody | Chain of Custody | 9 | 1 | 1 |
| Crime | Incident | 2 | 1 | 1 | |
| Case | 1 | 0 | 0 | ||
| Crime | 6 | 1 | 1 | ||
| 3 | Securing Scene | Securing Scene | 6 | 1 | 1 |
| 4 | Identification | Identification | 8 | 1 | 1 |
| Recognition | 2 | 1 | 1 | ||
| Classification | 2 | 1 | 1 |
Legend: (Frequency) = number of occurrence of a concept among models; (Generality) = 1 if the concept is a general, otherwise = ‘0’; (Definition) = ‘1’ if the concept has a definition, otherwise = ‘0’.
Sample of concept definitions.
| Concept | Definition |
|---|---|
| Chain of Custody | A process that tracks the movement of evidence through its collection, preservation, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred. |
| Documentation | A continuous activity required in all the stages and used for documenting the crime Scene (Photographing, Sketching, and Recording). |
| Extraction | A process to acquire data from mobile phone using acquisition methods which are manual acquisition, logical acquisition, and physical acquisition. |
| PhysicalAcquisition | A process to facilitate the examiner to search the contents of the removable media and potentially recover deleted files. |
| ForensicExaminer | Has ability to gather information about the individuals, determine the exact nature of the events that occurred, construct a timeline of events, uncover information that explains the motivation for the offense and discover what tools are used. |
Classification of concepts.
| MF Phase | Concepts |
|---|---|
| Crime; InvestigationProcedure; ChainOfCustody; LegalAuthority; SearchWarrant; MobileDevice; PotentialEvidence; Documentation; Preparation; Isolation; FaradayBag; Investigator; CrimeScene; Authorization; People; Packaging&Sealing; TransportingAndStorage; Identification; Planning; Shock; Humidity; Temperature; Victim; Suspect; Witness; Recording; Photographing; Sketching; InvestigationStrategy; SecuringScene; FirstResponder; Equipment; Collection; ForensicsLab; AirplaneMode; Source; Rooting; UnlockingBootloader; CellSiteAnalysis; NetworkProvider | |
| Documentation; ChainOfCustody; PhysicalAcquisition; LogicalAcquisition; ManualAcquisition; VolatileEvidence; Non-VolatileEvidence; AcquiredData; AcquisitionMethod; Imaging; InternalMemory; ExternalStorage; ForensicTool; Backup; Extraction; PotentialEvidence; MobileDevice; ForensicExaminer; Hashing; Integrity | |
| AcquiredData; Documentation; ChainOfCustody; Verification; Integrity; PatternMatching; ForensicSpecialist; DataFiltering; Validation; Tampering; RecoveringData; ReconstructingEvent; TimeframeAnalysis; HiddenDataAnalysis; ApplicationandFileAnalysis; ForensicsLab; ExaminedData; ForensicTool; Evidence AnalysisData; ExaminationData; KeywordSearch | |
| Documentation; ChainOfCustody; Presentation; CourtOfLaw; Audience; LawEnforcement; TechnicalExpert; LegalExpert; Jury; Conclusion; Interpretation; Review; Result; Decision; Evidence; Archiving; Investigator |
Fig 4MFM 1.0: Preservation -phase class of concepts.
Fig 7MFM 1.0: Reporting -phase class of concepts.
Fig 5MFM 1.0: Acquisition -phase class of concepts.
Examples of relationships among concepts in MFM.
| Concept 1 | Relationship | Concept 2 | Metamodel Phase |
|---|---|---|---|
| Investigator | Association—‘follows | InvestigationProcedure | Preservation / see |
| MobileDevice | Association—‘Requires’ | Isolation | Preservation / see |
| SearchWarrant | Specialisation—‘IsAKindOf’ | Authorization | Preservation / see |
| FaradayBag | Aggregation—‘isAGroupOf’ | Isolation | Preservation / see |
| Evidence | Association—‘Requires’ | Presentation | Reporting/ see |
| Audience | Aggregation—‘isAGroupOf’ | CourtOfLaw | Reporting/ see |
| ForensicSpecialist | Association—‘Conducts’ | ExaminationData | Examination & Analysis/ see |
| MobileDevice | Association—‘Contains | PotentialEvidence | Acquisition/ see |
| ForensicTool | Aggregation—‘isAGroupOf’ | ForensicsLab | Examination & Analysis/ see |
| InternalMemory | Specialisation—‘IsAKindOf’ | VolatileEvidence | Acquisition/ see |
| ForensicTool | Association—‘Requires’ | Preparation | Acquisition to Preservation (inter phases)
see Figs |
| Evidence | Association—‘Requires’ | Collection | Reporting to Preservation (inter phases) see
Figs |
Four new added concepts based on validation through comparison with10 models of Set V1.
| Concept | MFM Phase | Definition |
|---|---|---|
| Hypothesis | Preservation | Gives an idea to the investigator what evidence must be collected and he can choose the appropriate tool according to type of mobile phone |
| Imaging | Acquisition | Use software to copy all electronic data on a device, performed in a manner that ensures the information is not altered |
| DataExamined | Examination & Analysis | Output of examination process |
| Archiving | Reporting | A necessary process to retain the data in a useable format for the ongoing court process, future reference, and for record keeping requirements |
Fig 8A validated version of preservation -phase class of concepts.
Fig 11A validated version of reporting -phase class of concepts.
List of relationships added to MFM.
| Concept 1 | Relationship | Concept 2 | MFM Phase |
|---|---|---|---|
| Investigator | Association—‘Creates’ | Hypothesis | Preservation |
| MobileDevice | Association—‘Requires’ | Imaging | Acquisition |
| ExaminationData | Association—‘Produces’ | DataExamined | Examination & Analysis |
| Evidence | Association—‘Requires’ | Archiving | Reporting |
Fig 12A validated version of preservation -phase class of concepts.
Frequency result of preservation-phase concepts.
| MFM1.1 | Model Set V2 | Concept | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |||
| 1 | Crime | √ | √ | √ | √ | √ | √ | √ | ||||
| 2 | InvestigationProcedure | √ | √ | √ | √ | √ | √ | |||||
| 3 | ChainOfCustody | √ | √ | √ | √ | √ | ||||||
| 4 | LegalAuthority | √ | √ | √ | ||||||||
| 5 | SearchWarrant | √ | √ | √ | √ | √ | ||||||
| 6 | MobileDevice | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 7 | Source | √ | √ | √ | √ | √ | ||||||
| 8 | PotentialEvidence | √ | √ | √ | √ | |||||||
| 9 | Documentation | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 10 | Preparation | √ | √ | √ | √ | √ | √ | |||||
| 11 | Isolation | √ | √ | √ | √ | √ | √ | √ | ||||
| 12 | FaradayBag | √ | √ | √ | √ | |||||||
| 13 | Investigator | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 14 | CrimeScene | √ | √ | √ | √ | √ | √ | √ | ||||
| 15 | Authorization | √ | √ | √ | √ | |||||||
| 16 | People | √ | √ | √ | ||||||||
| 17 | PackagingAndSealing | √ | √ | √ | √ | √ | ||||||
| 18 | TransportationAndStorage | √ | √ | √ | √ | √ | ||||||
| 19 | Identification | √ | √ | √ | √ | √ | √ | √ | √ | |||
| 20 | Planning | √ | √ | √ | √ | |||||||
| 21 | Shock | √ | √ | |||||||||
| 22 | Humidity | √ | √ | √ | ||||||||
| 23 | Temperature | √ | √ | √ | ||||||||
| 24 | Victim | √ | √ | √ | ||||||||
| 25 | Suspect | √ | √ | √ | √ | √ | √ | |||||
| 26 | UnlockingBootloader | √ | √ | √ | ||||||||
| 27 | Witness | √ | √ | √ | ||||||||
| 28 | Recording | √ | √ | √ | √ | |||||||
| 29 | AirplaneMode | √ | √ | |||||||||
| 30 | Photographing | √ | √ | √ | √ | |||||||
| 31 | Sketching | √ | √ | |||||||||
| 32 | CellSiteAnalysis | √ | √ | |||||||||
| 33 | InvestigationStrategy | √ | √ | |||||||||
| 34 | NetworkProvider | √ | √ | √ | ||||||||
| 35 | SecuringScene | √ | √ | √ | √ | |||||||
| 36 | FirstResponder | √ | √ | |||||||||
| 37 | Rooting | √ | √ | √ | ||||||||
| 38 | Equipment | √ | √ | √ | ||||||||
| 39 | ForensicLab | √ | √ | √ | √ | √ | ||||||
| 40 | EnvironmentalEffect | √ | ||||||||||
| 41 | Hypothesis | √ | √ | √ | ||||||||
Frequency result of reporting -phase concepts.
| MFM1.1 | Model Set V2 | Concept | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |||
| 1 | Presentation | √ | √ | √ | √ | √ | √ | |||||
| 2 | Documentation | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 3 | ChainOfCustody | √ | √ | √ | √ | √ | ||||||
| 4 | CourtOfLaw | √ | √ | √ | √ | √ | √ | |||||
| 5 | Archiving | √ | √ | |||||||||
| 6 | Audience | √ | √ | √ | √ | |||||||
| 7 | LawEnforcemen | √ | √ | √ | √ | |||||||
| 8 | TechnicalExpert | √ | ||||||||||
| 9 | LegalExpert | √ | ||||||||||
| 10 | Jury | √ | √ | √ | ||||||||
| 11 | Conclusion | √ | √ | √ | ||||||||
| 12 | Investigator | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 13 | Interpretation | √ | √ | √ | ||||||||
| 14 | Review | √ | √ | √ | ||||||||
| 15 | Result | √ | √ | √ | √ | √ | √ | |||||
| 16 | Decision | √ | √ | |||||||||
| 17 | Evidence | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | |
Frequency result of acquisition -phase concepts.
| 1 | ChainOfCustody | √ | √ | √ | √ | √ | ||||||
| 2 | Documentation | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 3 | PhysicalAcquisition | √ | √ | √ | √ | |||||||
| 4 | LogicalAcquisition | √ | √ | √ | √ | |||||||
| 5 | ManualAcquisition | √ | √ | |||||||||
| 6 | MobileDevice | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 7 | VolatileEvidence | √ | √ | √ | ||||||||
| 8 | PotentialEvidence | √ | √ | √ | √ | |||||||
| 9 | Non-VolatileEvidence | √ | √ | |||||||||
| 10 | AcquiredData | √ | √ | √ | ||||||||
| 11 | AcquisitionMethod | √ | √ | √ | ||||||||
| 12 | InternalMemory | √ | √ | √ | √ | √ | ||||||
| 13 | ExternalStorage | √ | √ | √ | √ | |||||||
| 14 | Imaging | √ | √ | √ | √ | √ | ||||||
| 15 | ForensicTool | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | |
| 16 | Backup | √ | √ | √ | √ | √ | ||||||
| 17 | ForensicExaminer | √ | √ | √ | ||||||||
| 18 | ForensicsLab | √ | √ | √ | √ | √ | ||||||
| 19 | Extraction | √ | √ | √ | ||||||||
| 20 | Hashing | √ | √ | √ | √ | |||||||
| 21 | Integrity | √ | √ | √ | √ | √ | √ | √ | ||||
Frequency result of examination and analysis -phase concepts.
| MFM1.1 | Model Set V2 | Concept | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |||
| 1 | AcquiredData | √ | √ | √ | ||||||||
| 2 | Documentation | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 3 | ChainOfCustody | √ | √ | √ | √ | √ | ||||||
| 4 | Evidence | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | |
| 5 | Verification | √ | √ | |||||||||
| 6 | Hashing | √ | √ | √ | √ | |||||||
| 7 | Integrity | √ | √ | √ | √ | √ | √ | √ | ||||
| 8 | PatternMatching | √ | ||||||||||
| 9 | ForensicSpecialist | √ | √ | √ | √ | |||||||
| 10 | DataFiltering | √ | √ | |||||||||
| 11 | Validation | √ | √ | |||||||||
| 12 | RecoveringData | √ | √ | √ | √ | |||||||
| 13 | ReconstructingEvent | √ | √ | |||||||||
| 14 | TimeframeAnalysis | √ | √ | |||||||||
| 15 | HiddenDataAnalysis | √ | √ | |||||||||
| 16 | AnalysisData | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | |
| 17 | ExaminationData | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||
| 18 | ApplicationandFileAnalysis | √ | √ | |||||||||
| 19 | ForensicsLab | √ | √ | √ | √ | √ | ||||||
| 20 | ExaminedData | √ | √ | |||||||||
| 21 | ForensicTool | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | |
| 22 | √ | √ | √ | √ | ||||||||
| 23 | Tampering | |||||||||||
Degree of confidence of concepts for MFM after frequency-based selection.
| DoC Classification | MFM Concepts |
|---|---|
| Crime, MobileDevice, Documentation, Isolation, Investigator, CrimeScene, ForensicTool, Integrity, AnalysisData, ExaminationData, Evidence, Identification | |
| InvestigationProcedure, ChainOfCustody, SearchWarrant, Source, Preparation, PackagingAndSealing, TransportationAndStorage, Suspect, ForensicLab, InternalMemory, Imaging, Backup, ForensicsLab, Result, Presentation, CourtOfLaw, | |
| LegalAuthority, PotentialEvidence, FaradayBag, Authorization, People, Planning, Humidity, Temperature, Victim, Witness, Recording, Photographing, SecuringScene, Equipment, Hypothesis, PhysicalAcquisition, LogicalAcquisition, VolatileEvidence, AcquiredData, AcquisitionMethod, ExternalStorage, ForensicExaminer, NetworkProvider, Extraction, Hashing, UnlockingBootloader, ForensicSpecialist, Rooting, RecoveringData, Audience, LawEnforcemen, Jury, Conclusion, Interpretation, Review, | |
| Shock, Sketching, InvestigationStrategy, FirstResponder, ManualAcquisition, Non-VolatileEvidence, Verification, HiddenDataAnalysis, Validation, ReconstructingEvent, TimeframeAnalysis, ApplicationandFileAnalysis, ExaminedData, Decision, AirplaneMode, Archiving, KeywordSearch, CellSiteAnalysis | |
| EnvironmentalEffect (√), PatternMatching
(√), TechnicalExpert (√), LegalExpert
(√), | |
Fig 15A validated version of reporting -phase class of concepts.