Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

<p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video commu...

Full description

Bibliographic Details
Main Authors: David Irwin, arek dadej, jill slay
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2012-09-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/63
id doaj-661acece29d34bb4abe466137f7e002d
record_format Article
spelling doaj-661acece29d34bb4abe466137f7e002d2020-11-25T00:28:08ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232012-09-0173558211Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital SpeechDavid Irwin0arek dadej1jill slay2University of South AustraliaUniversity of South AustraliaUniversity of South Australia<p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.</p><p>This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.</p><p>A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.</p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/63
collection DOAJ
language English
format Article
sources DOAJ
author David Irwin
arek dadej
jill slay
spellingShingle David Irwin
arek dadej
jill slay
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
Journal of Digital Forensics, Security and Law
author_facet David Irwin
arek dadej
jill slay
author_sort David Irwin
title Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
title_short Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
title_full Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
title_fullStr Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
title_full_unstemmed Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
title_sort extraction of electronic evidence from voip: identification & analysis of digital speech
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2012-09-01
description <p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.</p><p>This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.</p><p>A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.</p>
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/63
work_keys_str_mv AT davidirwin extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech
AT arekdadej extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech
AT jillslay extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech
_version_ 1725336855632674816