scholarly journals Forensic Analysis of Social Networking Applications on an Android Smartphone

2021 ◽  
Vol 2021 ◽  
pp. 1-36
Author(s):  
Anoshia Menahil ◽  
Waseem Iqbal ◽  
Mohsin Iftikhar ◽  
Waleed Bin Shahid ◽  
Khwaja Mansoor ◽  
...  

Smartphone users spend a substantial amount of time in browsing, emailing, and messaging through different social networking apps. The use of social networking apps on smartphones has become a dominating part of daily lives. This momentous usage has also resulted in a huge spike in cybercrimes such as social harassing, abusive messages, vicious threats, broadcasting of suicidal actions, and live coverage of violent attacks. Many of such crimes are carried out through social networking apps; therefore, the forensic analysis of allegedly involved digital devices in crime scenes and social apps installed on them can be helpful in resolving criminal investigations. This research is aimed at performing forensic investigation of five social networking apps, i.e., Instagram, LINE, Whisper, WeChat, and Wickr on Android smart phones. The essential motivation behind the examination and tests is to find whether the data resides within the internal storage of the device or not after using these social networking apps. Data extraction and analysis are carried out using three tools, i.e., Magnet AXIOM, XRY, and Autopsy. From the results of these experiments, a considerable amount of essential data was successfully extracted from the examined smartphone. This useful data can easily be recovered by forensic analysts for future examination of any crime situation. Finally, we analyzed the tools on the basis of their ability to extract digital evidences from the device and their performance are examined with respect to NIST standards.

2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


Author(s):  
Jaya B. Lakshmi ◽  
M L. Avinash Tejasvi ◽  
Anulekha Avinash ◽  
Chanchala H. P. ◽  
Priyanka Talwade ◽  
...  

AbstractDNA is present in most of the cells in our body, which is unique in each and every individual, and we leave a trail of it everywhere we go. This has become an advantage for forensic investigators who use DNA to draw conclusion in identification of victim and accused in crime scenes. This review describes the use of genetic markers in forensic investigation and their limitations.


2020 ◽  
Vol 13 (2) ◽  
pp. 20-37
Author(s):  
Simon Park

This paper describes the usage of Instagram (the social networking platform) in sophomore English classes at a private Japanese university. Instagram was used to help students prepare for their study abroad semester. Students created private Instagram accounts and used this platform for group exercises with a mixed group of students and staff at potential study abroad sites in the United States of America. The participants posted images and video of their daily lives and routines at their schools, and created posts based on tasks set by the instructor. Group members were then encouraged to ask each other questions and communicate through Instagram. The study found that Instagram usage has the potential to help students prepare linguistically and culturally for study abroad semesters. The paper recommends follow-up studies that use Instagram and other social networking sites to help students prepare culturally and linguistically for study abroad semesters. This has implications for language teachers who are teaching prospective study abroad students or are interested in incorporating technology into their classes, as well as coordinators of study abroad programs interested in modernizing their study abroad orientation programs. この論文では、日本の私立大学の 2 年生の英語クラスでの Instagram(SNS)の使 用法について説明します。 Instagram は、学生が留学の準備をするのを助けるため に使用されました。学生はプライベート Instagram アカウントを作成し、このプラ ットフォームを使用して、米国の潜在的な留学サイトで学生とスタッフの混合グル ープとのグループ演習を行いました。参加者は、学校での日常生活の画像や動画を 投稿し、講師が設定したタスクに基づいて投稿を作成しました。その後、グループ のメンバーはお互いに質問し、Instagram を介してコミュニケーションすることが 奨励されました。調査では、Instagram の使用により、学生が留学学期に向けて言 語的および文化的に準備するのに役立つ可能性があることがわかりました。この論 文では、Instagram やその他の SNS を使用して、学生が留学に向けて文化的および 言語的に準備するのに役立つ追跡調査を推奨しています。これは、将来の留学学生 を教えている、またはクラスにテクノロジーを組み込むことに関心のある語学教 師、および留学オリエンテーションプログラムの近代化に関心のある留学プログラ ムのコーディネーターに影響を及ぼします。


Author(s):  
Maryam Salahshour ◽  
Halina Mohamed Dahlan ◽  
Noorminshah A. Iahad

Social networking tools have become an integral part of our daily lives. Recently, a new type of Social Networking Sites (SNSs) namely Academic Social Networking sites (ASNSs) has attracted global users. There is perceived usefulness on the impact of ASNSs on patterns of academic research activities. However, it remains unclear why some researchers do not use ASNSs at all. The purpose of this paper is therefore to explore the ASNSs usage among Malaysian academic researchers and to investigate benefits, specific purpose, drivers and barriers of using ASNSs. A total of 210 completed cases were collected through paper-based and online-based questionnaire. In order to show the outcome of the research, descriptive interpretation of data is performed. The overall findings of this research indicate that there is low rate of ASNSs usage among researchers. In addition, the results show that colleagues, attitude toward technology and communication benefits are the drivers to use ASNSs and trust, privacy and security are the common barriers regarding to use ASNSs.


2021 ◽  
Vol 37 (1) ◽  
pp. 207-217
Author(s):  
Clara Matheus Nogueira

William Shakespeare is one of the greatest authors of the English language and is present in multiple school curricula. However, reading Shakespeare in classrooms can be a challenge for both teachers and students. In schools, adaptations from literature to social media platforms, such as #dream40, a production by the Royal Shakespeare Company, remain not fully explored. In this paper, this production is presented as a possible ally in the effort of bringing the English canon closer to the students’ reality, making the Bard more engaging and accessible, since this production uses mechanics that are part of most students’ daily lives on social networking platforms, such as the hashtag that appears in the title of this production; besides, #dream40 is closely aligned with our contemporary paradigm of worldview.


2011 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
John Haggerty ◽  
Alexander J. Karran ◽  
David J. Lamb ◽  
Mark Taylor

The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation.


Author(s):  
Rob Kitchin

How can we begin to grasp the scope and scale of our new data-rich world, and can we truly comprehend what is at stake? This book explores the intricacies of data creation and charts how data-driven technologies have become essential to how society, government and the economy work. Creatively blending scholarly analysis, biography and fiction, the book demonstrates how data are shaped by social and political forces, and the extent to which they influence our daily lives. The book begins with an overview of the sociality of data. Data-driven endeavours are as much a result of human values, desires, and social relations as they are scientific principles and technologies. The data revolution has been transforming work and the economy, the nature of consumption, the management and governance of society, how we communicate and interact with media and each other, and forms of play and leisure. Indeed, our lives are saturated with digital devices and services that generate, process, and share vast quantities of data. The book reveals the many, complex, contested ways in which data are produced and circulated, as well as the consequences of living in a data-driven world. The book concludes with an exploration as to what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data sovereignty'. Ultimately, the book reveals our data world to be one of potential danger, but also of hope.


The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.


Sign in / Sign up

Export Citation Format

Share Document