±Partners and Sponsors
New Today: 7
New Yesterday: 7
· Webmail Forensics – Digging deeper into Browsers and Mobile Applications
· Operation Endeavour: The Tip of the Iceberg?
· Forensic analysis of the ESE database in Internet Explorer 10
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
· Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
· Bitcoin Forensics Part II: The Secret Web Strikes Back
±Follow Forensic Focus
Case studies involving smartphone EXIF data
Subforums: Mobile Telephone Case Law
I'm doing my final year project on the forensic value of EXIF data, including geolocation data, plus how it can be amended to mislead investigators.
I'm looking for case studies where EXIF data (either smartphone or camera) or geolocation data has been used for malicious purposes, or to aid an investigation.
I know Dave Benford has done a lot of work in this field and I've already tapped him for info, but I was hoping the community might be able to point me in the right direction
It is quite common for iPhones seized by Police to have pictures of the criminals standing in front of large marijuana plantations they have set up in remote bush locations.
These guys would often be arrested on unrelated matters, the phones would be examined and these nice photos would be checked for geo data which we could plot into google maps then forward the information to the local detectives to go and do what they needed to do.
This was also very common for guys smoking and using drugs inside their own homes. With the amazing accuracy of the GPS data on iPhones it was often enough to get search warrants for houses as well.
Just a few of my own experiences
- Senior Member