Research Article
Voice over IP Forensics.
@INPROCEEDINGS{10.4108/e-forensics.2008.2852, author={Jill Slay and Matthew Simon}, title={Voice over IP Forensics.}, proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia}, publisher={ACM}, proceedings_a={E-FORENSICS}, year={2010}, month={5}, keywords={Voice over Internet Protocol Forensic Computing}, doi={10.4108/e-forensics.2008.2852} }
- Jill Slay
Matthew Simon
Year: 2010
Voice over IP Forensics.
E-FORENSICS
ACM
DOI: 10.4108/e-forensics.2008.2852
Abstract
With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This paper presents and discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications
Copyright © 2008–2024 ICST