Identifying interception possibilities for WhatsApp communication

11/07/2020
by   Dennis Wijnberg, et al.
0

On a daily basis, law enforcement officers struggle with suspects using mobile communication applications for criminal activities. These mobile applications replaced SMS-messaging and evolved the last few years from plain-text data transmission and storage to an encrypted version. Regardless of the benefits for all law abiding citizens, this is considered to be the downside for criminal investigations. Normal smartphone, computer or network investigations do no longer provide the contents of the communication in real-time when suspects are using apps like WhatsApp, Signal or Telegram. Among them, WhatsApp is one of the most common smartphone applications for communication, both criminal as well as legal activities. Early 2016 WhatsApp introduced end-to-end encryption for all users, immediately keeping law enforcement officers around the world in the dark. Existing research to recuperate the position of law enforcement is limited to a single field of investigation and often limited to post mortem research on smartphone or computer while wiretapping is limited to metadata information. Therefore, it provides only historical data or metadata while law enforcement officers want a continuous stream of live and substantive information. This paper identified that gap in available scenarios for law enforcement investigations and identified a gap in methods available for forensic acquiring and processing these scenarios. In this paper, we propose a forensic approach to create real-time insight in the WhatsApp communication. Our approach is based on the wiretapping, decrypting WhatsApp databases, open source intelligence and WhatsApp Web communication analysis. We also evaluate our method with different scenarios in WhatsApp forensics to prove its feasibility and efficiency.

READ FULL TEXT
research
04/13/2021

Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases

Former US attorney general William Barr and law enforcement colleagues f...
research
02/11/2020

Session: A Model for End-To-End Encrypted Conversations With Minimal Metadata Leakage

Session is an open-source, public-key-based secure messaging application...
research
01/17/2023

Your Day in Your Pocket: Complex Activity Recognition from Smartphone Accelerometers

Human Activity Recognition (HAR) enables context-aware user experiences ...
research
01/13/2021

Screen Recognition: Creating Accessibility Metadata for Mobile Applications from Pixels

Many accessibility features available on mobile platforms require applic...
research
07/27/2023

A Secure Open-Source Intelligence Framework For Cyberbullying Investigation

Cyberbullying has become a pervasive issue based on the rise of cell pho...
research
06/03/2020

Detecting Misinformation on WhatsApp without Breaking Encryption

The popularity of smartphone messaging apps like WhatsApp are revolution...
research
12/27/2018

We all do better when we work together?

This paper evaluates the impact of a RD signal on traffic crossing the m...

Please sign up or login with your details

Forgot password? Click here to reset