Digital Forensics and Cyber Crime. 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers

Research Article

BlackBerry PlayBook Backup Forensic Analysis

Download
643 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-39891-9_15,
        author={Mohamed Marzougy and Ibrahim Baggili and Andrew Marrington},
        title={BlackBerry PlayBook Backup Forensic Analysis},
        proceedings={Digital Forensics and Cyber Crime. 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2013},
        month={10},
        keywords={BlackBerry Forensics PlayBook Backup},
        doi={10.1007/978-3-642-39891-9_15}
    }
    
  • Mohamed Marzougy
    Ibrahim Baggili
    Andrew Marrington
    Year: 2013
    BlackBerry PlayBook Backup Forensic Analysis
    ICDF2C
    Springer
    DOI: 10.1007/978-3-642-39891-9_15
Mohamed Marzougy1,*, Ibrahim Baggili2,*, Andrew Marrington1,*
  • 1: Zayed University
  • 2: University of New Haven
*Contact email: Mohamed.Almarzougy@gmail.com, Ibaggili@newhaven.edu, Andrew.Marrington@zu.ac.ae

Abstract

Due to the numerous complicating factors in the field of small scale digital device forensics, physical acquisition of the storage of such devices is often not possible (at least not without destroying the device). As an alternative, forensic examiners often gather digital evidence from small scale digital devices through logical acquisition. This paper focuses on analyzing the backup file generated for the BlackBerry PlayBook device, using the BlackBerry Desktop Management software to perform the logical acquisition. Our work involved analyzing the generated “.bbb” file looking for traces and artifacts of user activity on the device. Our results identified key files that can assist in creating a profile of the device’s usage. Information about BlackBerry smart phone devices connected to the tablet was also recovered.