scholarly journals Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage

2020 ◽  
Vol 12 (11) ◽  
pp. 184
Author(s):  
Furkan Paligu ◽  
Cihan Varol

Digital Evidence is becoming an indispensable factor in most legal cases. However, technological advancements that lead to artifact complexity, are forcing investigators to create sophisticated connections between the findings and the suspects for admissibility of evidence in court. This paper scrutinizes whether IndexedDB, an emerging browser technology, can be a source of digital evidence to provide additional and correlating support for traditional investigation methods. It particularly focuses on the artifacts of the worldwide popular application, WhatsApp. A single case pretest–posttest quasi experiment is applied with WhatsApp Messenger and Web Application to populate and investigate artifacts in IndexedDB storage of Google Chrome. The findings are characterized and presented with their potential to be utilized in forensic investigation verifications. The storage locations of the artifacts are laid out and operations of extraction, conversion and presentation are systematized. Additionally, a proof of concept tool is developed for demonstration. The results show that WhatsApp Web IndexedDB storage can be employed for time frame analysis, demonstrating its value in evidence verification.

NAN Nü ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 237-271
Author(s):  
Guojun Wang

Abstract In late imperial China practitioners of forensic investigation in legal cases were predominantly male. While crime literature frequently features female characters, the question of how this literature represents the gender dimension of forensic knowledge remains unanswered. This paper aims to answer this question with an examination of a number of late imperial era theatrical works that depict how forensic knowledge differed across the male and female divide. It argues court-case literature increasingly valorized male forensic knowledge and its relevance to the state legal system. At the same time, these theatrical pieces signify female forensic knowledge following two literary traditions, namely, the commendation of exemplary women and the condemnation of “wanton women.” Investigating these theatrical works at the interstices between court-case literature, women’s history, and forensic history, this paper suggests that the representations of forensic knowledge in Chinese drama accord with major developments in the history of women and gender in premodern China.


2020 ◽  
Vol 35 (10) ◽  
pp. 2248-2254 ◽  
Author(s):  
Pascal Becker ◽  
Christoph Neff ◽  
Sabine Hess ◽  
Peter Weis ◽  
Detlef Günther

A proof-of-concept for a novel Single-Pulse-LA-ICP-TOFMS based method is shown for the forensic investigation of float glass fragments.


2020 ◽  
Vol 4 (2) ◽  
pp. 41-51
Author(s):  
Wisnu Sanjaya ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

The rapid development of the IT world has covered all aspects of life and among IT technology products is the creation of Operating Systems and Web browser applications. Privacy in the use of IT in the open era is now highly expected, therefore now widely developed Operating Systems and Web browser applications that have facilities to protect user privacy. Linux and TOR Browser is a combination that is widely used in the field of security, but unfortunately many are misused by the person in a crime. The motivation to use both is to eliminate or minimize the digital footprint of the browsing activity so that it will complicate the search of digital evidence in a crime. This research proposes a framework of stages for TOR Browser analysis in Linux Operating System which aims to provide solution in forensic investigation using offline forensic method. The use of offline forensic methods to obtain detailed information from a digital proof on a computer in a off state


Author(s):  
AbdulAkeem O. Otunola ◽  
Abdullateef O. Alabi ◽  
A. T. Abdullateef ◽  
M. K. Lawal ◽  
N. O. Olanipekun

Graduate training is one of the core courses offered in all polytechnics systems in Nigeria, each polytechnic gives orientation programmes and deploys students for industrial training once a year. These processes of pen on paper method throw serious challenges because of time authorization and time frame. Placement of undergraduate students looking for relevant Industrial Training (IT) attachment is becoming worrisome. This research tends to provide a web based solution called Digital Collaborative Framework (DCF) for Students’ Industrial Work Experience Scheme (SIWES) and sustainability in Federal Polytechnic Offa, Nigeria. This is to bridge the gap between educational institutions and the industries subject to training and re-training perspectives. The stakeholders can easily turn DCF into e-administrative tools, then allow students to get industrial placement relevant to their field of studies. The research proposed to develop a productive web application using Codeigniter Php framework. This research will serve as a cloud database to students, staff and other stakeholders and create access to examine, monitor and measure students’ performance at the end of the (SIWES) scheme.


2021 ◽  
Vol 13 (5) ◽  
pp. 78-100
Author(s):  
Ashok Kumar Mohan ◽  
Sethumadhavan Madathil ◽  
Lakshmy K. V.

Investigation of every crime scene with digital evidence is predominantly required in identifying almost all atomic files behind the scenes that have been intentionally scrubbed out. Apart from the data generated across digital devices and the use of diverse technology that slows down the traditional digital forensic investigation strategies. Dynamically scrutinizing the concealed or sparse metadata matches from the less frequent archives of evidence spread across heterogeneous sources and finding their association with other artifacts across the collection is still a horrendous task for the investigators. The effort of this article via unique pockets (UP), unique groups (UG), and unique association (UA) model is to address the exclusive challenges mixed up in identifying incoherent associations that are buried well within the meager metadata field-value pairs. Both the existing similarity models and proposed unique mapping models are verified by the unique metadata association model.


Author(s):  
Tariq Khairallah

Digital Evidence is considered as an important type of evidence in many legal cases. Many legislations have dedicated laws to the collection, handling and admissibility of digital evidence. New technologies and new devices are rapidly being developed, which creates new sources of digital evidence. This presents a challenge to law enforcement agencies and digital investigators to stay up to date with the rapid development in the digital field. This paper discusses a relatively new source of digital evidence which is the evidence extracted from Wearable devices. A Fitbit fitness tracker is one of the most common wearable devices used by many people today. This paper presents a case study whereby data extracted from a Fitbit was used as a digital evidence. The admissibility and the challenges of using Wearables as digital evidence is also discussed.


2021 ◽  
Vol 17 (S5) ◽  
Author(s):  
Damiano Archetti ◽  
Neil P. Oxtoby ◽  
Daniel C. Alexander ◽  
Alberto Redolfi
Keyword(s):  

2019 ◽  
Vol 2 (1) ◽  
pp. 52-60 ◽  
Author(s):  
Reza Montasari ◽  
Richard Hill ◽  
Victoria Carpenter ◽  
Farshad Montaseri

Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions. SNSs are facilitating new forms of social interaction, dialogue, exchange and collaboration. They allow millions of users and organisations worldwide to exchange ideas, post updates and comments or participate in activities and events, while sharing their wider interests. At the same time, such a phenomenon has led to an upsurge in significant criminal activities by perpetrators who are becoming increasingly sophisticated in their attempts to deploy technology to circumvent detection. Digital forensic Examiners (DFEs) often face serious challenges in relation to data acquisition. Therefore, this article aims to analyse the significance of SNSs in DFIs and challenges that DFEs often encounter when acquiring evidence from SNSs. Furthermore, this article describes the steps of the digital forensic investigation process that must be taken to acquire digital evidence that is both authentic and forensically sound.


Sign in / Sign up

Export Citation Format

Share Document