Watch Out! Smartwatches as criminal tool and digital forensic investigations

by   Seungjae Jeon, et al.

In the rapidly advancing technological landscape, smartwatches have materialized as multifunctional devices integral to our daily routines. Smartwatches store a substantial amount of personal information, potentially serving as repositories of digital evidence. Thus, digital forensic researchers have devoted considerable effort to exploring smartwatch forensic techniques. However, it has been observed that prior studies have primarily treated smartwatches as mere storage mediums for digital evidence, neglecting their potential role in criminal activities. This paper presents the information leakage perpetrated through smartwatches. We represent crime scenarios in an environment where smartphones are not available, considering that the perception that smartphones can be used as tools for criminal behavior prevails in many organizations, while the potential of similar-use smartwatches is often overlooked. We detail mechanisms for information leakage via file transfer and camera control using smartwatches. Additionally, we present methods to investigate each crime incident through smartwatch forensics. Finally, we describe the limitations of post-incident responses and propose proactive measures to prepare for potential crimes involving smartwatches. Keywords: Information Leakage, Smartwatch Forensics, Android Forensics, Mobile Device Management, Security Policy


page 3

page 4

page 5


EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis

Crimes, both physical and cyber, increasingly involve smartphones due to...

Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

The use of mobile devices in knowledge-intensive organizations while eff...

Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

Information and knowledge leakage has become a significant security risk...

Investigating Protected Health Information Leakage from Android Medical Applications

As smartphones and smartphone applications are widely used in a healthca...

Open Source Android Vulnerability Detection Tools: A Survey

Since last decade, smartphones have become an integral part of everyone'...

Research Protocol for the Google Health Digital Well-being Study

The impact of digital device use on health and well-being is a pressing ...

Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator

Digital harms are widespread in the mobile ecosystem. As these devices g...

Please sign up or login with your details

Forgot password? Click here to reset