TomTom GPS Device Forensics
First published January 2009 Written by Ben LeMere (blemere@gpsforensics.org) & Andy Sayers (asayers@gpsforensics.org) For more information visit GPSForensics.org Introduction: The sales of...
View ArticleSonyEricsson Hidden Evidence
First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com I have discovered that it is possible when manually examining some SonyEricssons (such as “K”...
View ArticleMalicious Phone Call Legislation in the UK
First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com It is being noted that there is an exponential growth in harassing and intimidating calls from...
View ArticleMobile Phone and GPS Forensics – Some Thoughts
First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Mobile telephones are the predominate wireless telecommunications device throughout the world...
View ArticleRecording Telephone Calls
First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com A question that often gets asked is “Can I record a telephone call?” and the answer to that is...
View ArticleChecking Masts – Cell Site Analysis (CSA)
First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Since linking with Jamie Morris at Forensic Focus to create a Mobile Forensics Discussion Forumto...
View ArticleExperimental Testing Of A Forensic Analysis Method On The Tomtom GPS...
First published June 2009 by Dr. Clara Maria Colombini INTRODUCTION The earliest Satellite Navigation Systems were designed for the U.S. military, to locate the position of Polaris submarines. Over the...
View ArticleChallenges of Smart Phone Forensics
by Rob Adams ACE, CDIA+ SALIX Mobile devices have become an essential component of our daily lives. These devices keep us connected and act as so much more than the cell phones and portable music...
View ArticleGeotags: Friend or Foe?
by David Benford Director, Blackstage Forensics I recently wrote a research paper, “Geotag Data: The Modification of Evidence on the Apple iPhone”, based around the possibility of modifying geotag...
View ArticleEvaluating Mobile Telephone Connection Behaviour – Part 2
The Basics of Evaluating Connection Records by Sam Raincock, IT and telecommunications expert witness Connection RecordsWithin the UK, details of past telephone connections are stored by the network...
View ArticleThe Challenges Facing Computer Forensics Investigators in Obtaining...
David W. Bennett August 20, 2011 The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations There are a number of electronic...
View ArticleiPhone Tracking – from a forensic point of view
- Introduction - iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all...
View ArticleMobile Phone Forensic Challenges
Introduction A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts. More often it is not enough to be an experienced expert in...
View ArticleAndroid Forensics
Smartphones are changing the IT and Communication landscape vastly. A Smartphone can do almost every good thing a computer can do. Today most of the corporate employee access and manage their...
View ArticleMobile Device Geotags & Armed Forces
In recent years it has been noticeable that the amount of people carrying a smart phone has increased exponentially. This is down to their low price and availability; even children as young as 12 have...
View ArticleGeo-tag Forensics
Introduction A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some...
View ArticleBitcoin Forensics – A Journey into the Dark Web
There has been a lot of buzz around Tor, Bitcoin, and the so-called “dark web” (or “deep web”) since the FBI shut down the underground website “Silk Road” on Oct 1st. As many of you already know, Tor...
View ArticleBitcoin Forensics Part II: The Secret Web Strikes Back
In last week’s post, we talked about Bitcoin, Tor and some of the hidden websites only accessible via Tor, such as Silk Road, which was shut down by the FBI on October 1st. Well, just over a month...
View ArticleWebmail Forensics – Digging deeper into Browsers and Mobile Applications
Almost everyone who uses the Internet has a web-based email account. Many people have two or more, so the likelihood of a forensic investigator coming across a case involving webmail communication is...
View ArticleCapturing RAM Dumps and Imaging eMMC Storage on Windows Tablets
Oleg Afonin, Danil Nikolaev, Yuri Gubanov © Belkasoft Research 2015 While Windows desktops and laptops are relatively easy to acquire, the same cannot be said about portable Windows devices such as...
View Article