Student Research Paper: Use of Mobile Phones in Crime


New Member
Feb 15, 2009

I am currently attending university and studing the field of computing forensics and as part of my second year i must produce a research paper to present at a confrence.

I have choosen to make the paper on the area of mobile phones and how they are being used in criminal activiaties. Though this is proving quick tricky as i have little access to previous examples of where mobiles are being used.

So if any of you can leave me a post with any links or case you may have dealt with yourself it would be much appreciated.


New Member
Feb 14, 2009
Hey tanner,

Dunno of this will be of much help, but I just finished a Masters in computer forensics and my final thesis was on mobile phone security and vulnerabilities. this covered all the different types of attacks like:

(Bloover app)

There are man in the middle attacks, passive-eaves dropping, etc.

Here is some info I included in my paper, found from McAfee:

Mcafee highlights seven examples of high level mobile phone attacks from 2001 to 2004.

1. DoCoMo 110 Dialer: In mid-2001, hackers found a way to exploit the e-mail applications in several phones. The hack—an incredibly rare event, given NTT DoCoMo’s rock-solid reputation for security— involved an exploitable bug within messaging software. As a result, those who exploited the code could direct the phone to dial the “110”
emergency number, producing a denial of service attack.

2. SMS-Bomb: In April 2002, a Windows-based application flooded SMS (short message service) addresses with messages. It was a cross- platform attack involving PC malware, resulting in denial of service attacks against SMS addresses and related services.

3. Nokia 6210: In February 2003, hackers uncovered the Nokia 6210 exploit, which involved a bug in the parser for vCard (address book) attachments to SMS messages in this phone. The result was denial of service attack that crashed individual phones.

4. Siemens *35/*45: In March 2003, this exploit—similar to the Nokia exploit—leveraged a bug in the SMS handler for these phones. This, too, caused phones to crash and hang.

5. Bluejacking: This short-range spam and prank technique emerged in November 2003, targeting Bluetooth-enabled phones. Hackers beamed “contact” and sometimes nefarious information to other phones within Bluetooth range.

6. Symbian/Cabir Worm: This concept worm, running on the Nokia Series 60 platform, surfaced in June 2004. It used Bluetooth communications to launch denial of service attacks and trigger rapid battery drains.

7. WinCE/Duts Virus: This concept virus for Windows CE generated headlines in July 2004. The virus attaches itself to applications in CE’s root/current folder. Although the virus didn’t have a negative impact, it caused the hacker community to take a closer look at smart phones and handheld devices running Microsoft Corp.’s mobile software.
(Mcafee, 2008)

Another place you could maybe try is some of the mobile phone forums, Nokia, Ericsson etc... I know a lot are developer related, but you never know, there might be somebody there who can point you in the right direction!

Best of luck dude!


New Member
Aug 4, 2008
2005 == 5 cell phones examined
2006 == 26 cell pohnes examined
2007 == 79 cell phones examined
2008 == 149 cell phones examined
3/2/2009 1445 hours waiting to testify on a cell phone examination.

About us

  • Our community began in 2004. Since this time, we have grown to have over 29,000+ members within the DFIR & Cyber Security community.

    We are happy to announce that this forum is now under new ownership with the goal to once again become the main Digital Forensics Forum on the internet for DFIR, OSINT and Cyber Security.

    If you can think of ways to help us improve, please let us know.

    We pride ourselves on offering unbiased, critical discussion among people of all different backgrounds.

    We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu