Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
<p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video commu...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2012-09-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/63 |
id |
doaj-661acece29d34bb4abe466137f7e002d |
---|---|
record_format |
Article |
spelling |
doaj-661acece29d34bb4abe466137f7e002d2020-11-25T00:28:08ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232012-09-0173558211Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital SpeechDavid Irwin0arek dadej1jill slay2University of South AustraliaUniversity of South AustraliaUniversity of South Australia<p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.</p><p>This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.</p><p>A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.</p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/63 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
David Irwin arek dadej jill slay |
spellingShingle |
David Irwin arek dadej jill slay Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech Journal of Digital Forensics, Security and Law |
author_facet |
David Irwin arek dadej jill slay |
author_sort |
David Irwin |
title |
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech |
title_short |
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech |
title_full |
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech |
title_fullStr |
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech |
title_full_unstemmed |
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech |
title_sort |
extraction of electronic evidence from voip: identification & analysis of digital speech |
publisher |
Association of Digital Forensics, Security and Law |
series |
Journal of Digital Forensics, Security and Law |
issn |
1558-7215 1558-7223 |
publishDate |
2012-09-01 |
description |
<p>The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.</p><p>This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.</p><p>A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.</p> |
url |
http://ojs.jdfsl.org/index.php/jdfsl/article/view/63 |
work_keys_str_mv |
AT davidirwin extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech AT arekdadej extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech AT jillslay extractionofelectronicevidencefromvoipidentificationanalysisofdigitalspeech |
_version_ |
1725336855632674816 |