scholarly journals DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III

2017 ◽  
Vol 22 ◽  
pp. S3-S14 ◽  
Author(s):  
Devon R. Clark ◽  
Christopher Meffert ◽  
Ibrahim Baggili ◽  
Frank Breitinger
Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 343
Author(s):  
Yansi Keim ◽  
Yung Han Yoon ◽  
Umit Karabiyik

New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source.


2021 ◽  
Vol 3 (4) ◽  
Author(s):  
Alex Akinbi ◽  
Ehizojie Ojie

AbstractIn the quest for a panacea to ensure digital privacy, many users have switched to using decentralized open-source Extensible Messaging and Presence Protocol multi-client instant messaging (IM) apps for secure end-to-end communication. In this paper, we present a forensic analysis of the artefacts generated on Android smartphones by Conversations and Xabber apps. We identified databases maintained by each app and external Secure Digital card directories that store local copies of user metadata. We analysed each app’s storage locations for forensic artefacts and how they can be used in a forensic investigation. The results in this paper show a detailed analysis of forensic files of interest which can be correlated to identify the local user’s multiple IM accounts and contact list, contents of messages exchanged with contacts, deleted files, time, and dates in the order of their occurrence. The contributions of this research include a comprehensive description of artefacts, which are of forensic interest, for each app analysed.


Author(s):  
Edward G. Bartick ◽  
John A. Reffner

Since the introduction of commercial Fourier transform infrared (FTIR) microscopic systems in 1983, IR microscopy has developed as an important analytical tool in research, industry and forensic analysis. Because of the frequent encounter of small quantities of physical evidence found at crime scenes, spectroscopic IR microscopes have proven particularly valuable for forensic applications. Transmittance and reflectance measurements have proven very useful. Reflection-absorption, specular reflection, and diffuse reflection have all been applied. However, it has been only very recently that an internal reflection (IRS) objective has been commercially introduced.The IRS method, also known as attenuated total reflection (ATR), has proven very useful for IR analysis of standard size samples. The method has been applied to adhesive tapes, plastic explosives, and general applications in the analysis of opaque materials found as evidence. The small quantities or uncontaminated areas of specimens frequently found requiring forensic analysis will often be directly applicable to microscopic IRS analysis.


Author(s):  
Fadi P. Deek ◽  
James A. M. McHugh
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document