As forensic science advances, various types of anti-forensic technologies are being produced, requiring investigators to open and analyze all videos from the suspect’s storage devices, raising the question of the invasion of privacy during the investigation. To catch distributors of illegally filmed images, many investigation techniques based on an analysis of the file attribute information of the original images have been introduced. Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. Timestamp of obtained logcat could be used as digital evidence in court later. In Table I are the results of the online forensics that were obtained adb logcat. Two methods were used, namely online and offline forensics. The chain of activities for this research was first opening the Google Play Store, conducting the installation process, then proceeding with the sign up and sign in. 1) Application and user activity: The smartphone was in a rooted state, in which all previously mentioned tools had been successfully installed. In each sub-section there is a detailed description of any activities that were performed by Telegram users. The scenarios are application and user activity, contact information, messages Exchange, sharing, and deleted communication. To simplify the analysis, the authors divided this scenario into five broad scenarios branched out into more specific sub scenarios. Broadly speaking, Telegram Messenger has three important files which are Telegram.apk, Directory storage files located in the local memory of the smartphone, and databases of all the activities to be carried out in further testing and analysis. Shows the results of manual digging in this research.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |