Verification of Recovered Digital Evidence on the Amazon Kindle

  • Thompson M
  • Hansen R
N/ACitations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData’s Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through the USB interface. Files were retrieved and recovered through the USB interface before and after file deletion. These two sets of files were compared to the original set of files. All files retrieved before deletion matched their original counterpart. Not all files recovered after deletion matched their original counterpart. These steps and procedures followed a similar adaptation of the NIST General Test Methodology for Computer Forensic Tools developed by Leshney (2008) for virtual machines

Cite

CITATION STYLE

APA

Thompson, M., & Hansen, R. (2016). Verification of Recovered Digital Evidence on the Amazon Kindle. Journal of Digital Forensics, Security and Law. https://doi.org/10.15394/jdfsl.2016.1386

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free