Mobile forensics and security apps: Is there anything left to find?

Author(s):  
Matthew Simon
Keyword(s):  
Author(s):  
Connie Justice ◽  
Hunamei Wu ◽  
Evelyn Walton
Keyword(s):  

2010 ◽  
Vol 6 (3-4) ◽  
pp. 136-146 ◽  
Author(s):  
Eoghan Casey ◽  
Michael Bann ◽  
John Doyle

Author(s):  
Firmansyah Gustav Hikmatyar ◽  
Bambang Sugiantoro

As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.


2018 ◽  
pp. 297-308
Author(s):  
Izzat Alsmadi ◽  
Robert Burdwell ◽  
Ahmed Aleroud ◽  
Abdallah Wahbeh ◽  
Mahmood Al-Qudah ◽  
...  
Keyword(s):  

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1431
Author(s):  
Yung Han Yoon ◽  
Umit Karabiyik

The increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an individual. Wearable fitness devices are constantly being released by companies, with new firmware created for each iteration. As technology developers, research and law enforcement must keep pace to take advantage of data that can be used in investigations. The Fitbit line of devices is a popular brand of wearable trackers. This study will investigate what artifacts are generated by the new Fitbit Versa 2 by investigating what data are generated and stored on the smartphone app component of the new device. The artifacts discovered will be related to areas of forensic interest that are relevant to a law enforcement officer or digital forensics practitioner. Previous research and their methodologies used for application and mobile forensics will be used to conduct this research. This study finds the Fitbit Versa 2, and by extension, the Fitbit smartphone application does not store social media message notifications pushed to the tracker by the user’s mobile device. Some credit card information, health-related data, such as heart rate, GPS locations, and other potentially identifying data were found in plaintext. While the exposed data is not enough on its own to pose an immediate serious issue, it can be used as leverage to phish a user for further details.


2016 ◽  
Vol 22 (2) ◽  
pp. 240-254 ◽  
Author(s):  
Niken Dwi Wahyu Cahyani ◽  
Nurul Hidayah Ab Rahman ◽  
William Bradley Glisson ◽  
Kim-Kwang Raymond Choo

Sign in / Sign up

Export Citation Format

Share Document