Forensic analysis of newer TomTom devices |
| |
Affiliation: | 1. Bundeskriminalamt, Thaerstrasse 11, 65193 Wiesbaden, Germany;2. Netherlands Forensic Institute, Department of Digital Technology and Biometry, P.O. Box 24044, 2490 AA The Hague, Netherlands;1. Forensics, Australian Federal Police, P.O. Box 401, Canberra, ACT 2601, Australia;2. School of Environment and Science, Griffith University, Nathan, Qld 4111, Australia;3. Queensland Health Forensic and Scientific Services, Coopers Plains, Qld 4108, Australia;1. Xinjiang Police College, Urumqi 830013, China;2. Institute of Metal Research, Chinese Academy of Sciences, Shenyang 110016, China;3. Criminal Investigation Police University of China, Shenyang 110854, China;1. Van’t Hoff Institute for Molecular Sciences, Faculty of Science, University of Amsterdam, PO Box 94157, 1090 GD Amsterdam, The Netherlands;2. Netherlands Forensic Institute, P.O. Box 24044, 2490 AA The Hague, The Netherlands;3. CLHC, Amsterdam Center for Forensic Science and Medicine, University of Amsterdam, P.O. Box 94157, 1090 GD Amsterdam, The Netherlands |
| |
Abstract: | Today many investigations involve TomTom devices due to the wide-spread use of these navigation systems. The process of acquiring a memory dump from the first generation of TomTom devices was relatively easy by utilising the USB-connection and standard forensic tools. Newer devices, however, do not provide this or any other readily available data connection, making the task much more complex. In addition to existing and relatively complex chip-extraction procedures, an easier data acquisition method was developed without the need to de-solder flash memory chips. The presence of new files and the differences in data formats found in these devices meant that new methods of data analysis and decoding also needed to be developed. |
| |
Keywords: | Forensic Memory acquisition Memory analysis Navigation system GPS TomTom ISP |
本文献已被 ScienceDirect 等数据库收录! |
|