Science News
from research organizations

Helping Investigators Gather Crime Evidence From PDAs

Date:
October 6, 2004
Source:
National Institute Of Standards And Technology
Summary:
Tech savvy criminals are just as likely as anyone else to use high-tech devices, such as personal digital assistants (PDAs), to help keep track of their activities. Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs.
Share:
         
Total shares:  
FULL STORY

Tech savvy criminals are just as likely as anyone else to use high-tech devices, such as personal digital assistants (PDAs), to help keep track of their activities. PDAs are relatively inexpensive and highly portable and can store documents, spreadsheets, databases and many other resources usually associated with a laptop or desktop computer. When these devices are used in a crime, law enforcement investigators need to know how to find, properly retrieve and examine the information they store, even if the criminal tried to hide or delete the data.

Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user’s password and gain access to the contents of the device.

NIST’s review of the current state of the art of forensic software, PDA Forensic Tools: An Overview and Analysis (NISTIR 7100), will help investigators better understand the capabilities and limitations of these software tools. Sponsored by the Department of Homeland Security, the study was not intended to be exhaustive or serve as a formal product evaluation but to complement the more rigorous specifications and test methods being developed as part of the Computer Forensics Tool Testing project. The CFTT is a joint effort of NIST, the National Institute of Justice, and law enforcement organizations. For more information on the CFTT, see www.cftt.nist.gov/. The report is available at http://csrc.nist.gov/publications/nistir/index.html#ir7100.

A companion NIST report, which provides more detailed procedures on preserving, examining, analyzing and reporting of digital evidence on PDAs, will be available soon. A draft of this publication, Guidelines on PDA Forensics, is available at http://csrc.nist.gov/publications/drafts.html#sp800-72.


Story Source:

The above story is based on materials provided by National Institute Of Standards And Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute Of Standards And Technology. "Helping Investigators Gather Crime Evidence From PDAs." ScienceDaily. ScienceDaily, 6 October 2004. <www.sciencedaily.com/releases/2004/10/041006085015.htm>.
National Institute Of Standards And Technology. (2004, October 6). Helping Investigators Gather Crime Evidence From PDAs. ScienceDaily. Retrieved April 28, 2015 from www.sciencedaily.com/releases/2004/10/041006085015.htm
National Institute Of Standards And Technology. "Helping Investigators Gather Crime Evidence From PDAs." ScienceDaily. www.sciencedaily.com/releases/2004/10/041006085015.htm (accessed April 28, 2015).

Share This Page:


Computers & Math News
April 28, 2015

Latest Headlines
updated 12:56 pm ET