My phone runs about 200 services at any given time, and I bet yours does too, yet I have not seen these services queried as part of a forensic investigation. Is this because there’s very little worthwhile data there? Is it because it’s too difficult or time-consuming? Is it because all this information is gatheredContinue reading “At Your Service: Timelining Android Usage with System Services”
Category Archives: Uncategorized
Perceptual Hashing: A Shallow-ish Dive
Cryptographic hashing is fundamental to Digital Forensics, we can all agree that – unique identifiers that can be used to locate exact duplicates of a file, without even needing to have the original file. No digital unit in a UK law enforcement agency can run without using CAID. The NSRL, contributed to by NIST andContinue reading “Perceptual Hashing: A Shallow-ish Dive”