1,590 research outputs found

    A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices

    Get PDF
    Portable and wearable computing devices such as smart watches, navigation units, mobile phones, and tablet computers commonly ship with Global Navigation Satellite System (GNSS) supported locational awareness. Locational functionality is no longer limited to navigation specific devices such as satellite navigation devices and location tracking systems. Instead the use of these technologies has extended to become secondary functionality on many devices, including mobile phones, cameras, portable computers, and video game consoles. The increase in use of location aware technology is of use to forensic investigators as it has the potential to provide historic locational information. The evidentiary value of these devices to forensic investigators is currently limited due to the lack of available forensic tools and published methods to properly acquire and analyse these data sources. This research addresses this issue through the synthesis of common processes for the development of forensic procedure to acquire and interpret historic locational data from embedded, locationally aware devices. The research undertaken provides a framework for the generation of forensic procedure to enable the forensic extraction of historical locational data. The framework is device agnostic, relying instead on differential analysis and structured testing to produce a validated method for the extraction of locational history. This framework was evaluated against five devices, selected on a basis of market penetration, availability and a stage of deduplication. The examination of the framework took place in a laboratory developed specifically for the research. This laboratory replicates all identified sources of location data for the devices selected. In this case the laboratory is able to simulate cellular (2G and 3G), GNSS (NAVSTAR and GLONASS), and Wi-Fi locationing services. The laboratory is a closed-sky facility, meaning that the laboratory is contained within a faraday cage and all signals are produced and broadcast internally. Each selected device was run through a series of simulations. These simulations involved the broadcast of signals, replicating the travel of a specific path. Control data was established through the use of appropriate data recording systems, for each of the simulated location signals. On completion of the simulation, each device was forensically acquired and analysed in accordance with the proposed framework. For each experiment carried out against the five devices, the control and experimental data were compared. In this examination any divergence less than those expected for GNSS were ignored. Any divergence greater than this was examined to establish cause. Predictable divergence was accepted and non-predictable divergence would have been noted as a limitation. In all instances where data was recovered, all divergences were found to be predictable. Post analysis, the research found that the proposed framework was successful in producing locational forensic procedure in a non-device specific manner. This success was confirmed for all the devices tested

    Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges

    Get PDF
    Vehicles are currently being developed and sold with increasing levels of connectivity and automation. As with all networked computing devices, increased connectivity often results in a heightened risk of a cyber security attack. Furthermore, increased automation exacerbates any risk by increasing the opportunities for the adversary to implement a successful attack. In this paper, a large volume of publicly accessible literature is reviewed and compartmentalised based on the vulnerabilities identified and mitigation techniques developed. This review highlighted that the majority of research is reactive and vulnerabilities are often discovered by friendly adversaries (white-hat hackers). Many gaps in the knowledge base were identified. Priority should be given to address these knowledge gaps to minimise future cyber security risks in the connected and autonomous vehicle sector

    Driving whilst using in-vehicle information systems (IVIS): benchmarking the impairment to alcohol

    Get PDF
    Using the lane change task (LCT) a comparison of driving performance was made between normal (baseline) driving, driving whilst using an in-vehicle information system (IVIS) and driving while intoxicated at the UK blood alcohol level (80 mg per 100 ml). The results provided clear evidence for impaired performance of the LCT when performing an IVIS task in comparison to both baseline (LCT alone) and alcohol conditions. However, the LCT was found to be insensitive to the effects of alcohol in the absence of a secondary task. It is concluded that LCT performance can be impaired more when undertaking certain IVIS tasks than by having a blood alcohol level at the UK legal limit but the LCT requires further development before it can be used as a convincing proxy for the driving task

    A systematic literature review on the relationship between autonomous vehicle technology and traffic-related mortality.

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. ์ตœํƒœํ˜„.The society is anticipated to gain a lot from Autonomous Vehicles (AV), such as improved traffic flow and a decrease in accidents. They heavily rely on improvements in various Artificial Intelligence (AI) processes and strategies. Though some researchers in this field believe AV is the key to enhancing safety, others believe AV creates new challenges when it comes to ensuring the security of these new technology/systems and applications. The article conducts a systematic literature review on the relationship between autonomous vehicle technology and traffic-related mortality. According to inclusion and exclusion criteria, articles from EBSCO, ProQuest, IEEE Explorer, Web of Science were chosen, and they were then sorted. The findings reveal that the most of these publications have been published in advanced transport-related journals. Future improvements in the automobile industry and the development of intelligent transportation systems could help reduce the number of fatal traffic accidents. Technologies for autonomous cars provide effective ways to enhance the driving experience and reduce the number of traffic accidents. A multitude of driving-related problems, such as crashes, traffic, energy usage, and environmental pollution, will be helped by autonomous driving technology. More research is needed for the significant majority of the studies that were assessed. They need to be expanded so that they can be tested in real-world or computer-simulated scenarios, in better and more realistic scenarios, with better and more data, and in experimental designs where the results of the proposed strategy are compared to those of industry standards and competing strategies. Therefore, additional study with improved methods is needed. Another major area that requires additional research is the moral and ethical choices made by AVs. Government, policy makers, manufacturers, and designers all need to do many actions in order to deploy autonomous vehicles on the road effectively. The government should develop laws, rules, and an action plan in particular. It is important to create more effective programs that might encourage the adoption of emerging technology in transportation systems, such as driverless vehicles. In this regard, user perception becomes essential since it may inform designers about current issues and observations made by people. The perceptions of autonomous car users in developing countries like Azerbaijan haven't been thoroughly studied up to this point. The manufacturer has to fix the system flaw and needs a good data set for efficient operation. In the not-too-distant future, the widespread use of highly automated vehicles (AVs) may open up intriguing new possibilities for resolving persistent issues in current safety-related research. Further research is required to better understand and quantify the significant policy implications of Avs, taking into consideration factors like penetration rate, public adoption, technological advancements, traffic patterns, and business models. It only needs to take into account peer-reviewed, full-text journal papers for the investigation, but it's clear that a larger database and more documents would provide more results and a more thorough analysis.์ž์œจ์ฃผํ–‰์ฐจ(AV)๋ฅผ ํ†ตํ•ด ๊ตํ†ต ํ๋ฆ„์ด ๊ฐœ์„ ๋˜๊ณ  ์‚ฌ๊ณ ๊ฐ€ ์ค„์–ด๋“œ๋Š” ๋“ฑ ์‚ฌํšŒ๊ฐ€ ์–ป๋Š” ๊ฒƒ์ด ๋งŽ์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๊ทธ๋“ค์€ ๋‹ค์–‘ํ•œ ์ธ๊ณต์ง€๋Šฅ(AI) ํ”„๋กœ์„ธ์Šค์™€ ์ „๋žต์˜ ๊ฐœ์„ ์— ํฌ๊ฒŒ ์˜์กดํ•œ๋‹ค. ์ด ๋ถ„์•ผ์˜ ์ผ๋ถ€ ์—ฐ๊ตฌ์ž๋“ค์€ AV๊ฐ€ ์•ˆ์ „์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ์—ด์‡ ๋ผ๊ณ  ๋ฏฟ์ง€๋งŒ, ๋‹ค๋ฅธ ์—ฐ๊ตฌ์ž๋“ค์€ AV๊ฐ€ ์ด๋Ÿฌํ•œ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ /์‹œ์Šคํ…œ ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ณด์•ˆ์„ ๋ณด์žฅํ•˜๋Š” ๊ฒƒ๊ณผ ๊ด€๋ จํ•˜์—ฌ ์ƒˆ๋กœ์šด ๋ฌธ์ œ๋ฅผ ์•ผ๊ธฐํ•œ๋‹ค๊ณ  ๋ฏฟ๋Š”๋‹ค. ์ด ๋…ผ๋ฌธ์€ ์ž์œจ์ฃผํ–‰์ฐจ ๊ธฐ์ˆ ๊ณผ ๊ตํ†ต ๊ด€๋ จ ์‚ฌ๋ง๋ฅ  ์‚ฌ์ด์˜ ๊ด€๊ณ„์— ๋Œ€ํ•œ ์ฒด๊ณ„์ ์ธ ๋ฌธํ—Œ ๊ฒ€ํ† ๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค. ํฌํ•จ ๋ฐ ์ œ์™ธ ๊ธฐ์ค€์— ๋”ฐ๋ผ EBSCO, ProQuest, IEEE Explorer ๋ฐ Web of Science์˜ ๊ธฐ์‚ฌ๋ฅผ ์„ ํƒํ•˜๊ณ  ๋ถ„๋ฅ˜ํ–ˆ๋‹ค.์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋Š” ์ด๋Ÿฌํ•œ ์ถœํŒ๋ฌผ์˜ ๋Œ€๋ถ€๋ถ„์ด ๊ณ ๊ธ‰ ์šด์†ก ๊ด€๋ จ ์ €๋„์— ๊ฒŒ์žฌ๋˜์—ˆ์Œ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋ฏธ๋ž˜์˜ ์ž๋™์ฐจ ์‚ฐ์—…์˜ ๊ฐœ์„ ๊ณผ ์ง€๋Šฅํ˜• ๊ตํ†ต ์‹œ์Šคํ…œ์˜ ๊ฐœ๋ฐœ์€ ์น˜๋ช…์ ์ธ ๊ตํ†ต ์‚ฌ๊ณ ์˜ ์ˆ˜๋ฅผ ์ค„์ด๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋‹ค. ์ž์œจ์ฃผํ–‰ ์ž๋™์ฐจ ๊ธฐ์ˆ ์€ ์šด์ „ ๊ฒฝํ—˜์„ ํ–ฅ์ƒ์‹œํ‚ค๊ณ  ๊ตํ†ต ์‚ฌ๊ณ ์˜ ์ˆ˜๋ฅผ ์ค„์ผ ์ˆ˜ ์žˆ๋Š” ํšจ๊ณผ์ ์ธ ๋ฐฉ๋ฒ•์„ ์ œ๊ณตํ•œ๋‹ค. ์ถฉ๋Œ, ๊ตํ†ต, ์—๋„ˆ์ง€ ์‚ฌ์šฉ, ํ™˜๊ฒฝ ์˜ค์—ผ๊ณผ ๊ฐ™์€ ์ˆ˜๋งŽ์€ ์šด์ „ ๊ด€๋ จ ๋ฌธ์ œ๋“ค์€ ์ž์œจ ์ฃผํ–‰ ๊ธฐ์ˆ ์— ์˜ํ•ด ๋„์›€์„ ๋ฐ›์„ ๊ฒƒ์ด๋‹ค. ํ‰๊ฐ€๋œ ๋Œ€๋ถ€๋ถ„์˜ ์—ฐ๊ตฌ์— ๋Œ€ํ•ด ๋” ๋งŽ์€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์‹ค์ œ ๋˜๋Š” ์ปดํ“จํ„ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์‹œ๋‚˜๋ฆฌ์˜ค, ๋” ์ข‹๊ณ  ํ˜„์‹ค์ ์ธ ์‹œ๋‚˜๋ฆฌ์˜ค, ๋” ์ข‹๊ณ  ๋” ๋งŽ์€ ๋ฐ์ดํ„ฐ, ๊ทธ๋ฆฌ๊ณ  ์ œ์•ˆ๋œ ์ „๋žต ๊ฒฐ๊ณผ๊ฐ€ ์‚ฐ์—… ํ‘œ์ค€ ๋ฐ ๊ฒฝ์Ÿ ์ „๋žต์˜ ๊ฒฐ๊ณผ์™€ ๋น„๊ต๋˜๋Š” ์‹คํ—˜ ์„ค๊ณ„์—์„œ ํ…Œ์ŠคํŠธ๋  ์ˆ˜ ์žˆ๋„๋ก ํ™•์žฅ๋˜์–ด์•ผ ํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๊ฐœ์„ ๋œ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•œ ๋˜ ๋‹ค๋ฅธ ์ฃผ์š” ๋ถ„์•ผ๋Š” AV์˜ ๋„๋•์ , ์œค๋ฆฌ์  ์„ ํƒ์ด๋‹ค. ์ •๋ถ€, ์ •์ฑ… ์ž…์•ˆ์ž, ์ œ์กฐ์—…์ฒด ๋ฐ ์„ค๊ณ„์ž๋Š” ๋ชจ๋‘ ์ž์œจ ์ฃผํ–‰ ์ฐจ๋Ÿ‰์„ ํšจ๊ณผ์ ์œผ๋กœ ๋„๋กœ์— ๋ฐฐ์น˜ํ•˜๊ธฐ ์œ„ํ•ด ๋งŽ์€ ์กฐ์น˜๋ฅผ ์ทจํ•ด์•ผ ํ•œ๋‹ค. ์ •๋ถ€๋Š” ํŠนํžˆ ๋ฒ•, ๊ทœ์น™, ์‹คํ–‰ ๊ณ„ํš์„ ๊ฐœ๋ฐœํ•ด์•ผ ํ•œ๋‹ค. ์šด์ „์ž ์—†๋Š” ์ฐจ๋Ÿ‰๊ณผ ๊ฐ™์€ ์šด์†ก ์‹œ์Šคํ…œ์—์„œ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ ์˜ ์ฑ„ํƒ์„ ์žฅ๋ คํ•  ์ˆ˜ ์žˆ๋Š” ๋ณด๋‹ค ํšจ๊ณผ์ ์ธ ํ”„๋กœ๊ทธ๋žจ์„ ๋งŒ๋“œ๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ, ์„ค๊ณ„์ž์—๊ฒŒ ํ˜„์žฌ ์ด์Šˆ์™€ ์‚ฌ๋žŒ์— ์˜ํ•œ ๊ด€์ฐฐ์„ ์•Œ๋ ค์ค„ ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ์‚ฌ์šฉ์ž ์ธ์‹์ด ํ•„์ˆ˜์ ์ด ๋œ๋‹ค.์ œ์กฐ์—…์ฒด๋Š” ์‹œ์Šคํ…œ ๊ฒฐํ•จ์„ ์ˆ˜์ •ํ•ด์•ผ ํ•˜๋ฉฐ ํšจ์œจ์ ์ธ ์ž‘๋™์„ ์œ„ํ•ด ์ข‹์€ ๋ฐ์ดํ„ฐ ์„ธํŠธ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ๋ฉ€์ง€ ์•Š์€ ๋ฏธ๋ž˜์—, ๊ณ ๋„๋กœ ์ž๋™ํ™”๋œ ์ฐจ๋Ÿ‰(AV)์˜ ๊ด‘๋ฒ”์œ„ํ•œ ์‚ฌ์šฉ์€ ํ˜„์žฌ์˜ ์•ˆ์ „ ๊ด€๋ จ ์—ฐ๊ตฌ์—์„œ ์ง€์†์ ์ธ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ํฅ๋ฏธ๋กœ์šด ์ƒˆ๋กœ์šด ๊ฐ€๋Šฅ์„ฑ์„ ์—ด์–ด์ค„ ์ˆ˜ ์žˆ๋‹ค. ๋ณด๊ธ‰๋ฅ , ๊ณต๊ณต ์ฑ„ํƒ, ๊ธฐ์ˆ  ๋ฐœ์ „, ๊ตํ†ต ํŒจํ„ด ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชจ๋ธ๊ณผ ๊ฐ™์€ ์š”์†Œ๋ฅผ ๊ณ ๋ คํ•˜์—ฌ Avs์˜ ์ค‘์š”ํ•œ ์ •์ฑ… ์˜ํ–ฅ์„ ๋” ์ž˜ ์ดํ•ดํ•˜๊ณ  ์ •๋Ÿ‰ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์กฐ์‚ฌ๋ฅผ ์œ„ํ•ด ๋™๋ฃŒ ๊ฒ€ํ† ๋ฅผ ๊ฑฐ์นœ ์ „๋ฌธ ์ €๋„ ๋…ผ๋ฌธ๋งŒ ๊ณ ๋ คํ•˜๋ฉด ๋˜์ง€๋งŒ, ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๊ฐ€ ์ปค์ง€๊ณ  ๋ฌธ์„œ๊ฐ€ ๋งŽ์•„์ง€๋ฉด ๋” ๋งŽ์€ ๊ฒฐ๊ณผ์™€ ๋” ์ฒ ์ €ํ•œ ๋ถ„์„์ด ์ œ๊ณต๋  ๊ฒƒ์ด ๋ถ„๋ช…ํ•˜๋‹ค.Abstract 3 Table of Contents 6 List of Tables 7 List of Figures 7 List of Appendix 7 CHAPTER 1: INTRODUCTION 8 1.1. Background 8 1.2. Purpose of Research 13 CHAPTER 2: AUTONOMOUS VEHICLES 21 2.1. Intelligent Traffic Systems 21 2.2. System Architecture for Autonomous Vehicles 22 2.3. Key components in AV classification 27 CHAPTER 3: METHODOLOGY AND DATA COLLECTION PROCEDURE 35 CHAPTER 4: FINDINGS AND DISCUSSION 39 4.1. RQ1: Do autonomous vehicles reduce traffic-related deaths 40 4.2. RQ2: Are there any challenges to using autonomous vehicles 63 4.3. RQ3: As a developing country, how effective is the use of autonomous vehicles for reducing traffic mortality 72 CHAPTER 5: CONCLUSION 76 5.1. Summary 76 5.2. Implications and Recommendations 80 5.3. Limitation of the study 91 Bibliography 93 List of Tables Table 1: The 6 Levels of Autonomous Vehicles Table 2: Search strings Table 3: Inclusion and exclusion criteria List of Figures Figure 1: Traffic Death Comparison with Europe Figure 2: Research strategy and study selection process List of Appendix Appendix 1: List of selected articles์„

    A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection

    Get PDF
    A modern vehicle has a complex internal architecture and is wirelessly connected to the Internet, other vehicles, and the infrastructure. The risk of cyber attacks and other criminal incidents along with recent road accidents caused by autonomous vehicles calls for more research on automotive digital forensics. Failures in automated driving functions can be caused by hardware and software failures and cyber security issues. Thus, it is imperative to be able to determine and investigate the cause of these failures, something which requires trustable data. However, automotive digital forensics is a relatively new field for the automotive where most existing self-monitoring and diagnostic systems in vehicles only monitor safety-related events. To the best of our knowledge, our work is the first systematic literature review on the current research within this field. We identify and assess over 300 papers published between 2006 - 2021 and further map the relevant papers to different categories based on identified focus areas to give a comprehensive overview of the forensics field and the related research activities. Moreover, we identify forensically relevant data from the literature, link the data to categories, and further map them to required security properties and potential stakeholders. Our categorization makes it easy for practitioners and researchers to quickly find relevant work within a particular sub-field of digital forensics. We believe our contributions can guide digital forensic investigations in automotive and similar areas, such as cyber-physical systems and smart cities, facilitate further research, and serve as a guideline for engineers implementing forensics mechanisms

    Evaluation of the utility and performance of an autonomous surface vehicle for mobile monitoring of waterborne biochemical agents

    Get PDF
    Real-time water quality monitoring is crucial due to land utilization increases which can negatively impact aquatic ecosystems from surface water runoff. Conventional monitoring methodologies are laborious, expensive, and spatio-temporally limited. Autonomous surface vehicles (ASVs), equipped with sensors/instrumentation, serve as mobile sampling stations that reduce labor and enhance data resolution. However, ASV autopilot navigational accuracy is affected by environmental forces (wind, current, and waves) that can alter trajectories of planned paths and negatively affect spatio-temporal resolution of water quality data. This study demonstrated a commercially available solar powered ASV equipped with a multi-sensor payload ability to operate autonomously to accurately and repeatedly maintain established A-B line transects under varying environmental conditions, where lateral deviation from a planned linear route was measured and expressed as cross-track error (XTE). This work provides a framework for development of spatial/temporal resolution limitations of ASVs for real-time monitoring campaigns and future development of in-situ sampling technologies

    Garmin satnav forensic methods and artefacts: an exploratory study.

    Get PDF
    Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users everywhere they go, and potentially recording the entirety of their whereabouts. As such, they represent invaluable assets to forensic practitioners. Amongst the different brands, Garmin and Tom-Tom are by far the most widespread, and are regularly encountered as part of investigations. GPS forensics is a relatively new field of study, in which tools and methodologies are very reliant upon the device itself. Whereas several tools and methodologies have been developed to address Tom-Tom devices, the lack of knowledge concerning Garmin devices may lead to investigators missing evidence. This thesis aims to explore forensic methods applicable to Garmin devices, and highlight locational artefacts located on them, which may be of use in a digital investigation. To do so, three series of experiments have been designed and performed, intending to document the behaviour of the device, the methods to acquire and analyse its content efficiently, and the reliability of the data recovered. This thesis shows successful acquisition of data from a range of Garmin devices. It also demonstrates that various forensic artefacts can be recovered from Garmin devices, with the results compared to similar research into Tom-Tom GPS devices. This highlights that Garmin devices potentially have a greater forensic potential than Tom-Tom devices, as it was found they typically hold up to 6 month of their userโ€™s daily locations, regardless of whether the navigation was in use or not. Using carving techniques and file signatures discovered through the project, this thesis shows how to recover further location tracking data from unallocated clusters. However, it also highlights that such information should be considered carefully, since the work also demonstrates that the data can be manipulated using anti-forensic techniques

    Garmin satnav forensic methods and artefacts: an exploratory study.

    Get PDF
    Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users everywhere they go, and potentially recording the entirety of their whereabouts. As such, they represent invaluable assets to forensic practitioners. Amongst the different brands, Garmin and Tom-Tom are by far the most widespread, and are regularly encountered as part of investigations. GPS forensics is a relatively new field of study, in which tools and methodologies are very reliant upon the device itself. Whereas several tools and methodologies have been developed to address Tom-Tom devices, the lack of knowledge concerning Garmin devices may lead to investigators missing evidence. This thesis aims to explore forensic methods applicable to Garmin devices, and highlight locational artefacts located on them, which may be of use in a digital investigation. To do so, three series of experiments have been designed and performed, intending to document the behaviour of the device, the methods to acquire and analyse its content efficiently, and the reliability of the data recovered. This thesis shows successful acquisition of data from a range of Garmin devices. It also demonstrates that various forensic artefacts can be recovered from Garmin devices, with the results compared to similar research into Tom-Tom GPS devices. This highlights that Garmin devices potentially have a greater forensic potential than Tom-Tom devices, as it was found they typically hold up to 6 month of their userโ€™s daily locations, regardless of whether the navigation was in use or not. Using carving techniques and file signatures discovered through the project, this thesis shows how to recover further location tracking data from unallocated clusters. However, it also highlights that such information should be considered carefully, since the work also demonstrates that the data can be manipulated using anti-forensic techniques
    • โ€ฆ
    corecore