5G Forensics

Reference Resource Supporting the Science of Forensic Mobile Network Analysis (Partial)


  • American Society for Testing and Materials (ASTM)(2018), Standard Terminology for Digital and Multimedia Evidence. Retrieved on December 15, 2018 from https://compass.astm.org/EDIT/html annot.cgi?E2916+13#s00007
  • American Society for Testing and Materials (ASTM)(2018). ASTM E3016-18 Standard Guide for Establishing Confidence in Digital and Multimedia Evidence Forensic Results by Error Mitigation Analysis. Retrieved on January 4, 2019, from https://www.astm.org/Standards/E3016.htm
  • Bonomi, Silvia & Casini, Marco & Ciccotelli, Claudio. (2018). B-CoC: A Block-chain-based Chain of Custody for Evidences Management in Digital Forensics. Retrieved on June 6, 2019, from https://www.researchgate.net/publication/326681814 B-CoC A Block-chain-based Chain of Custody for Evidences Management in Digital Forensics
  • Cisco (2011). The Case for IP Backhaul -The Internet Protocol Journal, Volume 14, No. 3. Retrieved on January 4, 2019, from https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-53/143-backhaul.html
  • Curran,Kevin, Harran, Martin, & Farrelly, William. (2017). A method for verifyingintegrity & authenticating digital media.Letterkenny Institute of Technology, Donegal, Ireland, Ulster University, Derry, United Kingdom. Retrieved on June 6, 2019, from https://doi.org/10.1016/j.aci.2017.05.006
  • European Telecommunications Standards Institute (ETSI). (2005). Universal Mobile Telecommunications System (UMTS); Telecommunication management; Charging management; Charging architecture and principles (3GPP TS 32.240 version 6.2.0 Release 6) Retrieved on January 4, 2019,from http://www.etsi.org/deliver/etsits/132200 132299/132240/06.02.00 60/ts 132240v060200p.pdf
  • European Telecommunications Standards Institute (ETSI). (2014) Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Charging management; Diameter charging applications. Retrieved on January 4, 2019, from https://www.etsi.org/deliver/etsi-ts/132200-132299/132299/09.17.00-60/ts-132299v091700p.pdf
  • European Telecommunications Standards Institute (ETSI). (2016). Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunications management; Charging management; Charging Data Record (CDR) file format and transfer (#GPP TS version 13.2.0 Release 13). Retrieved on January 4, 2019, from http://www.etsi.org/deliver/etsits/132200_132299/132297/13.02.0060/ts_132297v130200p.pdf
  • European Telecommunications Standards Institute (ETSI). (2017). ETSI Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Charging management; Charging Data Record (CDR) parameter description. Retrieved on January 4, 2019, from http://www.etsi.org/deliver/etsi ts/132200132299/132298/12.06.00_60/ts132298v120600p.pdf
  • Gramoli, Vincent & Staples, Mark. (2018). Block-chain Standard: Can We Reach Consensus?. IEEE Communications Standards Magazine. 2. 16-21. 10.1109/M-COMSTD.2018.1800022.
  • International Organization for Standardization (ISO)(2012). Information technology | Security techniques | Guidelines for identification, collection, acquisition and preservation of digital evidence. Retrieved on January 4, 2019, from https://www.iso.org/obp/ui/#iso:std:isoiec:27037:ed-1:v1:en
  • Internet Engineering Task Force (IETF)(2002). Guidelines for Evidence Collection and Archiving. Retrieved on January 4, 2019, from http://www.ietf.org/rfc/rfc3227.txt
  • Internet Engineering Task Force (IETF)(2005). Common Format and MIME Type for Comma-Separated Values (CSV) Files. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc4180
  • Internet Engineering Task Force (IETF)(2011). Fundamental Elliptic Curve Cryptography Algorithms. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc6090
  • Internet Engineering Task Force (IETF)(2016). Elliptic Curves for Security. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc7748
  • Lone, Auqib Hamid & Mir, Roohie Naaz,. (2019). Forensic-chain: Block-chain based digital forensics chain of custody with PoC in Hyperledger Composer. Department of Computer Science and Engineering, NIT Srinagar, Jammu and Kashmir, 190006, India. Retrieved on June 6, 2019, from https://www.sciencedirect.com /science/arti-cle/pii/S174228761830344X
  • Minor, J. B. (2015). A method of validating cellular carrier records accuracy, U.S. Patent No. 9,113,307. Washington, DC: U.S. Patent and Trademark Office. Retrieved on January 4, 2019, from https://www.google.com/patents/US9113307
  • Minor, John B. (2017) "Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology," Journal of Digital Forensics, Security and Law: Vol. 12: No. 2, Article 7. DOI: https://doi.org/10.15394/jdfsl.2017.1474 Retrieved on January 4, 2019, from https://commons.erau.edu/jdfsl/vol12/iss2/7
  • National Institute of Standards and Technology (NIST)(2000). DIGITAL SIGNATURE STANDARD (DSS). Retrieved on December 14, 2019, from https://csrc.nist.gov/csrc/media/publications/fips/186/2/archive/2000-01-27/documents/fips186-2.pdf
  • National Institute of Standards and Technology (NIST)(2007). Guidelines on Cell Phone Forensics. Retrieved on December 14, 2019, from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf
  • National Institute of Standards and Technology (NIST)(2006). Guide to Integrating Forensic Techniques into Incident Response. Retrieved on December 14, 2019, from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf
  • Openchain. (2019) Openchain is an open source distributed ledger technology. Retrieved on January 4, 2019, from https://www.openchain.org/
  • Pennsylvania Superior Court. (PSC)(2016). Commonwealth of Pennsylvania vs. Bryant Jones, No. 865 WDA 2015 (page 17). Retrieved on January 4, 2019, from http://www.pacourts.us/assets/opinions/Superior/out/J-S37012-16m.pdf
  • Peredo, Oscar & Deschamps, Romain. (2017). Time Accuracy Analysis of Post-Mediation Packet-Switched Charging Data Records for Urban Mobility Applications. Retrieved on January 4, 2019, from https://www.researchgate.net/publication/316921278 Time Accuracy Analysis of Post-Mediation Packet-Switched Charging Data Records for Urban Mobility Applications
  • Scientific Working Group on Digital Evidence (SWGDE)(2017). SWGDE Recommendations for Cell Site Analysis. Retrieved on January 4, 2019, from https://www.swgde.org/documents/CurrentDocuments/SWGDE Recommendations for Cell site Analysis.
  • The National Domestic Communications Assistance Center. (NDCAC)(2018).Retrieved on January 4, 2019, from https://ndcac.fbi.gov/
  • United States Courts Federal Rules of Evidence (FRE).(2019). Exception to the Rule Against Hearsay. Retrieved on January 4, 2019, from https://www.rulesofevidence.org/article-viii/rule-803/
  • LTE: User Equipment (UE) States, Jyotsna Agrawal, Dr. P. Mor, Dr. J.M. Keller, Dr. P. Dubey, International Advanced Research Journal in Science, Engineering and Technology, Vol. 3, Special Issue 4, November 2016, See - https://iarjset.com/upload/2016/si/SITES-16/IARJSET-SITES%206.pdf
  • JDSU Drive Testing LTE Whitepaper, February 2012, See - http://www.jdsu.com/ProductLiterature/drivetesting_lte_wp_nsd_tm_ae.pdf
  • Heterogeneous Cellular Networks, Rose Qingyang Hu, Yi Qian, June 2013, Publisher(s): Wiley, ISBN: 9781119999126, Chapter 9 - Connected-mode Mobility in LTE Heterogeneous Networks by Carl Weaver and Pantelis Monogioudis with Alcatel-Lucent, USA
  • Minor, John B. (2019) "Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research," Journal of Digital Forensics, Security and Law: Vol. 14 , Article 5. DOI: https://doi.org/10.15394/jdfsl.2019.1608 Available at: https://commons.erau.edu/jdfsl/vol14/iss2/5
  • https://www.etsi.org/deliver/etsi_ts/136100_136199/136101/10.02.01_60/ts_136101v100201p.pdf
  • 5G PPP Architecture Working Group. (2016, July). View on 5G architecture, Version 1.0. Retrieved from https://5g-ppp.eu/wpcontent/ uploads/2014/02/5G-PPP-5GArchitecture- WP-July-2016.pdf
  • Ali, K.A.A. (2009) Directional cell breathing – A framework for congestion control and load balancing in broadband wireless networks. Retrieved on January 30, 2017, from http://www.collectionscanada.gc.ca/obj/th esescanada/vol2/OKQ/TC-OKQ-1813.pdf
  • Andleeb, M., & Ali, S.A. (2015). A study on the hourly behavior of key performance indicators of global system for mobile communications, Journal of Emerging Trends in Computing and Information Sciences, 6(3). Retrieved from http://www.cisjournal.org/journalofcomput ing/archive/vol6no3/vol6no3_6.pdf
  • Atticus, Volume 26 Number 2 (2014, Summer), Privacy on the Line, New York State Association of Criminal Defense Lawyers, pp24-35. Retrieved from https://issuu.com/nysacdl/docs/atticuswcc
  • Ayers, R., Brothers, S., & Jansen, W. (2014). Guidelines on mobile device forensics. National Institute of Standards and Technology (NIST) Special Publication 800-101, Revision 1. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialP ublications/NIST.SP.800-101r1.pdf
  • Bahl, P. (V.), Hajiaghayi, M.T., Jain, K., Mirrokni, S.V., Qiu, L., & Saberi, A. (2007, February). Cell breathing in wireless LANs: Algorithms and evaluation. IEEE Transactions on Mobile Computingˆ, 6(2). Retrieved from https://www.cs.utexas.edu/~lili/papers/pu b/TMC2006.pdf
  • Blank, Aaron (2011) The Limitations and Admissibility of Using Historical Cellular Site Data to Track the Location of a Cellular Phone, XVIII RICH. J.L. & TECH. 3. Retrieved from http://jolt.richmond.edu/v18i1/article3.pdf.
  • Building Industry Consulting Service International (BICSI). (2015). Distributed antenna system (DAS) design and implementation best practices. American National Standards Institute (ANSI)/BICSI 006-2015. Retrieved on December 5, 2016, from http://www.bicsi.org/book_details.aspx?B ook=BICSI-006-CM-15-v5&d=0
  • European Telecommunications Standards Institute (ETSI). (2017). ETSI Conformance Testing Web page. Retrieved on March 2, 2017, from http://www.etsi.org/technologiesclusters/ technologies/testing
  • Federal Communications Commission (FCC). (n.d.). Universal licensing system Web site. Retrieved on December 5, 2016, from http://wireless.fcc.gov/uls/index.htm
  • Federal Communications Commission (FCC). (2001, January). Fact sheet: FCC wireless 911 requirements. Retrieved on January 25, 2017, from https://transition.fcc.gov/pshs/services/91 1- services/enhanced911/archives/factsheet_r equirements_012001.pdf
  • Federal Communications Commission (FCC). (2013, October 1). Cellular Geographic Service Area (CGSA). CFR 22.911. Retrieved from https://www.gpo.gov/fdsys/pkg/CFR- 2013-title47-vol2/pdf/CFR-2013-title47- vol2-sec22-911.pdf
  • Federal Communications Commission (FCC). (2015, January 29). Wireless E911 location accuracy requirements. PS Docket No. 07- 114. Retrieved on December 5, 2016, from https://apps.fcc.gov/edocs_public/attach match/FCC-15-9A1.pdf
  • Federal Communications Commission (FCC). (2016, October 25). Understanding wireless telephone coverage areas. Retrieved on December 14, 2016, from https://www.fcc.gov/consumers/guides/understanding-wireless-telephone-coverageareas
  • Freescale Semiconductor. (2009, February). Wireless Base Station Evolution. Networking and Multimedia Group, Document Number: WBSEVOLWP Rev. 1. Retrieved from http://www.nxp.com/assets/documents/da ta/en/white-papers/WBSEVOLWP.pdf
  • Hamid, M., & Kostanic, I. (2013). Path Loss Models for LTE and LTE-A Relay Stations. Universal Journal of Communications and Network, 1, 119-126. DOI: 10.13189/ujcn.2013.010401.
  • Hata, M. (1980, August). Empirical formula for propagation loss in land mobile radio services. IEEE Transactions on Vehicular Technology, 29(3), 317-325. DOI: 10.1109/T-VT.1980.23859.
  • Hoy, J. (2015). Forensic Radio Survey Techniques for Cell Site Analysis. Chichester, West Sussex, UK: John Wiley & Sons. Hussain, I. (2005). Understanding high availability of IP and MPLS networks, network and service outages. Cisco Press. Retrieved on December 5, 2016, from http://www.ciscopress.com/articles/article. asp?p=361409&seqNum=4
  • Internet Engineering Task Force (IETF). (n.d.a). Deterministic networking Networking (detnet) Working groupGroup. (ND). Internet Engineering Task Force. Retrieved on January 15, 2017, from https://datatracker.ietf.org/wg/detnet/documents
  • Internet Engineering Task Force (IETF). (n.d.b)., Signaling Transport (sigtran) Working Group. Retrieved on December 14, 2016, from https://datatracker.ietf.org/wg/sigtran/documents/
  • Lee, William W.C. Y. (1995). cell coverage for signal and traffic In S. S. Chapman Second Edition, Mobile Cellular Telecommunications: Analog and Digital Systems, 2nd. ed. (pp.103-156). New York, NY: McGraw-Hill.
  • Lee, William W.C. Y. (2005). Cell coverage and antennas in Third Edition, Wireless and Cellular Telecommunications, 3rd. ed. (pp.349-424). New York, NY: McGraw-Hill.
  • MobileComm Professionals, Inc. (2015). Integrated approach to wireless engineering. Retrieved on February 2, 2017, from http://www.mcpsinc.com/downloads/Mobi leComm_Corporate_Profile.pdf
  • National Aeronautics and Space Administration (NASA). (2016, August 10). Wave behaviors. Science Mission Directorate. Retrieved on March 2, 2017, from http://science.nasa.gov/ems/03_behaviors
  • O’Malley, T.A. (2011, November). Using historical cell site analysis evidence in criminal trials, The United States Attorney’s Bulletin, 59(6), 16. Retrieved on December 5, 2016, from https://www.justice.gov/sites/default/files /usao/legacy/2011/11/30/usab5906.pdf
  • Okamura, Y., Ohmori, E., Kawano, T., & Fukuda, K. (1968, September-October). Field Strength and its Variability in VHF and UHF Land-Mobile Radio Service. Review of the Electrical Communication Laboratory, 16(9-10), 825-873.
  • Ouyang, Y. & Falla, M.H. (2010, March). A performance analysis for UMTS packet switched network based of multivariate KPIs., International Journal of Next- Generation Networks (IJNGN), 2(1), 80-94. Retrieved on December 5, 2016, from https://arxiv.org/ftp/arxiv/papers/1003/1 003.5438.pdf
  • SWGDE (2017, February 21). Establishing confidence in digital forensic results by error mitigation analysis, Version 1.6, Retrieved on March 1, 2017, from https://www.swgde.org/documents/Curren t%20Documents/SWGDE%20Establishing %20Confidence%20in%20Digital%20Forensi c%20Results%20by%20Error%20Mitigation %20Analysis
  • Tart, M., Brodie, I., Gleed, N., & Matthews, J. (2012). Historic cell site analysis - Overview of principles and survey methodologies. Digital Investigation, 8(3-4), 185-193. Retrieved on December 5, 2016, from https://viewfromll2.files.wordpress.com/20 15/07/tart-et-al-2012.pdf
  • United Kingdom Accreditation Service. (2016, May). Accreditation for Forensic Cell Site Analysis – Pilot Update, ISO/IEC 17025. Retrieved on December 5, 2016, from https://www.ukas.com/news/isoiec-17025- accreditation-for-forensic-cell-site-analysispilot- update-may-2016/
  • United Kingdom Forensic Science Regulator. (2016, June 9). Codes of Practice and Conduct - Appendix: Digital Forensics - Cell Site Analysis. Retrieved on December 5, 2016, from https://www.gov.uk/government/uploads/ system/uploads/attachment_data/file/528 197/FSR-C- 135_Cell_Site_Analysis_Issue_1.pdf
  • Xu, X., Broustis, I., Ge, Z., Govindan, R., Mahimkar, A., Shankaranarayanan, N.K., & Wang, J. (2015). Magus: Minimizing Cellular Service Disruption during Network Upgrades, In Proceeding of the UCLA Engineering SIGCOMM 2015 Conference Presentation. doi:10.1145/2716281.2836106