skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 241152   Add to Shopping cart   Find in a Library
  Title: Test Results for Mobile Device Acquisition Tool: Secure View 3v3.8.0
  Document URL: PDF 
  Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
  Date Published: 02/2013
  Page Count: 151
  Annotation: This NIJ Special Report presents the results from testing Mobile Device Acquisition Tool: Secure View version 3.8.0 and reports the results from testing against the Smart Phone Tool Test Assertions and Test Plan.
  Abstract: This NIJ report presents the results from testing Mobile Device Acquisition Tool: Secure View version 3.8.0 conducted through the Computer Forensics Tool Testing (CFTT) program. The testing covered several areas about the tool: device connectivity, personal information management (PIM) data, acquisition of stand-alone files, acquisition of Internet-related data, acquisition of SIM subscriber-related data, non-ASCII characters (internal phone memory), and non-ASCII characters (SIM memory). The tool was tested for its ability to obtain data from the internal memory of mobile devices and subscriber identity modules (SIMs). The testing revealed that, for the most part, the tool was able to acquire data from the internal memory of the devices tested. A list of devices tested is included in the report. A few anomalies did occur with the data acquisition, however they were specific to certain devices. Some of these anomalies included inability to establish connectivity to the mobile device (Noki 6350); data truncation and unreported graphic files (iPhone4 and BlackBerry Torch); Internet-related data not reported (iPhone4); service provider names not reported (SIMs); and contacts and text messages containing the non-ASCII characters not reported incorrectly (BlackBerry Torch). The information in this report is divided into five sections: 1) a summary of the results from the test runs; 2) justification for the selection of test cases from the set of possible cases defined in the test plan; 3) detailed description of the anomalies found during testing; 4) lists of hardware and software used to run the test cases; and 5) a description of each test case run, including the test assertions used in the case, the expected results, and the actual results. Tables
  Main Term(s): Computer aided investigations
  Index Term(s): Telephone communications ; Telephone equipment ; Computer hardware systems ; Computer privacy and security ; Computer software ; Forensics/Forensic Sciences ; Mobile digital communications ; Computer evidence ; Forensic engineering ; NIJ grant-related documents
  Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
  Grant Number: 2003-IJ-R-029
  Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
  Type: Test/Measurement
  Country: United States of America
  Language: English
  Note: Test results from other tools and the CFTT tool methodology can be found on NIJ’s computer forensics tool testing Web page,
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.