1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

Research Article

Voice over IP Forensics.

  • @INPROCEEDINGS{10.4108/e-forensics.2008.2852,
        author={Jill Slay and Matthew Simon},
        title={Voice over IP Forensics.},
        proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia},
        publisher={ACM},
        proceedings_a={E-FORENSICS},
        year={2010},
        month={5},
        keywords={Voice over Internet Protocol  Forensic Computing},
        doi={10.4108/e-forensics.2008.2852}
    }
    
  • Jill Slay
    Matthew Simon
    Year: 2010
    Voice over IP Forensics.
    E-FORENSICS
    ACM
    DOI: 10.4108/e-forensics.2008.2852
Jill Slay1,*, Matthew Simon1,*
  • 1: University of South Australia, Defence and Systems Institute, Mawson Lakes +61883023840
*Contact email: Jill.slay@unisa.edu.au, Matt.simon@defence.gov.au

Abstract

With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This paper presents and discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications