Article

Expanding The Potential for GPS Evidence Acquisition

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

This paper looks at the use of Global Positioning System (GPS) data for evidence collection and investigation purposes. The number of devices carrying GPS capabilities has increased over the years, investigators can find these to be helpful in deducing the elements of a crime, and criminals may attempt to thwart investigators by manipulating the data found on a GPS device in an effort to gain an advantage to support their activities. This paper discusses the Global Positioning System network, what type of devices and software is related to GPS, and the information that may be collected during an investigation involving GPS receivers.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Some researchers have provided explanations for extracting digital data and evidence from computers (Morley, 2013), but this does not take into account the intricacies of tangible GPS data collection procedure. Little consideration has been given to the lack of and inconsistency of evidential procedures (Strawn, 2009;Lynch and Foote, 2000). Within the scope of QPS policy, this specific topic has not been the subject of any previous research and has not, therefore, presented an opportunity for discussion. ...
... The satellite system is supported by a number of ground stations that monitor the data sent by the satellites and transmit corrective data back to them. An identification code for the particular satellite transmitting a data signal is used by the GPS receiver to decipher the position of the receiver in relation to the satellites (Strawn, 2009). ...
... A search coordinator must understand that a GPS is a computer (Evidence Act 1977 Schedule 3 (QLD) (Austl.). GPS information can be manipulated on a GPS device (Strawn, 2009). Data is processed, stored, received and transmitted within the device and can be altered easily and with less trace than information held on a paper documents such as a statement (Lynch and Foote, 2000). ...
Article
This research focuses on the evidentiary issues of Global Positioning System (GPS) digital data collection in order to achieve consistency both within the Queensland Police Service (QPS) Legislative directives and also in methodical performance with other digital forms in operational and administrative environments. Since digital evidence can be modified, duplicated and/or illegally obtained, the relevance, dependability and admissibility of such evidence needs to be established to achieve court acceptability. This study investigated QPS policy and the evidentiary requirements of digital procedure within Police Search Coordination. Extensive literature was consulted through academic journal data bases, the QPS Intranet, and relevant websites. This study found a significant absence of GPS data capture techniques, resulting in procedural inconsistencies within the QPS Search Coordination. The study highlighted the topic’s relevance, and it is envisaged that consequent recommendations for consistent procedures will minimise occurrences of evidential failure in court situations. Calls for higher standards will require that Search Coordinators understand the transformation of GPS data into admissible evidence.
... Both applications support GPS tracking of friends and family, and they both advertise historical viewing of location data. The operation of location services on mobile devices is wellunderstood by previous studies [5], [6]. Based on this research, it is reasonable to assume GPS data could be found by a forensic analysis tool. ...
... Both iOS and Android devices utilize the GPS in order to receive and transmit location data [6]. GPS was first developed by the United States Department of Defense in 1978. ...
... There are 24 main satellites orbiting the Earth which send radio signals to the ground. GPS-enabled devices read data in order to provide accurate location data [6]. By utilizing GPS data, smartphones are able to provide services such as turn-by-turn navigation and location tracking applications such as the ones described in this study. ...
Preprint
Full-text available
Location sharing applications are becoming increasingly common. These applications allow users to share their own locations and view contacts' current locations on a map. Location applications are commonly used by friends and family members to view Global Positioning System (GPS) location of an individual, but valuable forensic evidence may exist in this data when stored locally on smartphones. This paper aims to discover forensic artifacts from two popular third-party location sharing applications on iOS and Android devices. Industry standard mobile forensic suites are utilized to discover if any locally stored data could be used to assist investigations reliant on knowing the past location of a suspect. Security issues raised regarding the artifacts found during our analysis is also discussed.
... Furthermore, a well-fit forensic model called "waterfall model" was presented in [328], in response to the significant differences among commercial models. This model includes multiple phases to allow a digital investigator to recheck all previous phases during an investigation process, including the preparation and identification phase,weight measurement and customization check phase [337], fingerprints phase, memory card phase [338], geo-location phase [339], [340], [338], and Wi-Fi & Bluetooth phase [341]. However, recently several anti-forensics techniques have been developed to prevent investigators from finding and/or collecting evidence, which necessitates the development of efficient countermeasures to recover valid evidence. ...
... Furthermore, a well-fit forensic model called "waterfall model" was presented in [328], in response to the significant differences among commercial models. This model includes multiple phases to allow a digital investigator to recheck all previous phases during an investigation process, including the preparation and identification phase,weight measurement and customization check phase [337], fingerprints phase, memory card phase [338], geo-location phase [339], [340], [338], and Wi-Fi & Bluetooth phase [341]. However, recently several anti-forensics techniques have been developed to prevent investigators from finding and/or collecting evidence, which necessitates the development of efficient countermeasures to recover valid evidence. ...
Article
Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed.
... pulse) to locations taking the measurement time of both into account. Position data are often given as geographical coordinates, i.e., longitudes and latitudes; application scenarios for such data are diverse and include not only the above mentioned fitness trackers and their private use, but also, e.g., forensics [1], [2] and medical domain [3], [4]. In forensics, position data can be used to discover criminal activities or to detect places where these activities take place, e.g., transshipment points or warehouses of illegal goods like drugs or weapons. ...
Conference Paper
Full-text available
Fitness trackers, smart watches and also smart-phones utilize different types of sensors to track physical activitiesof an active person. These measurements are often combinedwith geographical locations at which the sensors capture datawhich are then transformed to qualitative or quantitative mea-surements. However, for the later analysis the individual positiondata are often too fine-grained and, hence, need to be aggregatedto locations ranging from places similar to the real world tolarger regions, such as districts and whole cities. The CluPlaR(Clustering based Place Recognition) framework enables theaggregation of position data to places and their chronologicalvisits. In this paper, we provide its conceptual foundation andcorresponding algorithm allowing to aggregate chronologicallycollected geographic position data as they have often producedby today’s activity sensors. In detail, we describe the algorithmand corresponding configuration parameters and examine theirinfluence on the aggregation result. The evaluation results showthat the algorithm can be used to efficiently aggregate positiondata, but also that the result depends on the chosen aggregationparameters. In addition to the application of the CluPlaRalgorithm in real application scenarios, future work should focuson the automated determination of the aggregation parameters.
... Talib M. Jawad Abbas 1) RSA Cryptosystem : RSA is an asymmetric encryption algorithm which the size of encrypted data is limited to the key size and regarding the Padding mode, where for Optimal Asymmetric Encryption Padding OAEP is as [21]: ...
Article
Full-text available
Chain of custody plays an important role to determine integrity of digital evidence, because the chain of custody works on a proof that evidence has not been altered or changed through all phases, and must include documentation on how evidence is gathered, transported, analyzed and presented. The aims of this work is first to find out how the chain of custody has been applied to a wide range of models of the digital forensic investigation process for more than ten years. Second, a review of the methods on digitally signing an evidence that achieves the successful implementation of chain of custody through answering a few questions "who, when, where, why, what and how", and thus providing digital evidence to be accepted by the court. Based on the defined aims, an experimental environment is being setup to outline practically an acceptable method in chain of custody procedure. Therefore, we have adopted SHA512 for hashing and regarding encryption RSA and GnuGP is applied where according to the defined requirement a combination of these algorithms could be adopted as a practical method.
...  When: the method applied for this phase could be a "trusted time stamping". RFC 3161 standard define that trusted time stamp is a time stamp issued by a Trusted Third Party (TTP) acting as Time Stamping Authority (TSA) [11]. In this kind of "time system", it must be "external auditors" acting as witness. ...
... For the game to work, the coordinates must be accurate -particularly as we need to compare student submitted coordinates against the original coordinates. GPS receivers are prone to inaccuracy problems and this results occasionally in captured GPS coordinates being inaccurate (Strawn, 2009). A number of solutions have been proposed to deal with this, one of which involves the use of Wi-Fi technology to enable better accuracy and another involves the use of Assisted GPS (AGPS) (Djuknic & Richton, 2001). ...
Article
Full-text available
Campus discovery is an important feature of a university student induction process. Approaches towards campus discovery differ from course to course and can comprise guided tours that are often lengthy and uninspiring, or self-guided tours that run the risk of students failing to complete them. This paper describes a campus self-discovery induction game (Geospatial Crypto Reconnaissance) which aims to make students aware of campus resources and facilities, whilst at the same time allowing students to make friends and complete the game in an enthusing and exciting way. In this paper we describe the game construct, which comprises of a location, message, and artefact , and also the gameplay. Geospatial Crypto Reconnaissance requires students to identify a series of photographs from around the campus, to capture the GPS coordinates of the location of the photograph, to decipher a ciphered message and then to return both the GPS coordinates and the message for each photograph, proving that the student has attended the location. The game had a very high satisfaction score and we present an analysis of student feedback on the game and also provide guidance on how the game can be adopted for less technical cohorts of students.
Chapter
The use of internet along with other technologies that enable wireless connectivity and the expansion and dissemination of the real-time positioning (GPS) in all countries and levels of the population is a great opportunity for entrepreneurship in the field of information technology. This paper shows how the effective channeling of the available information would place decision making at different levels and, regarding different concerns of today's society, connect the online world of the Internet with the physical world. This paper has three parts. The first part shows characteristics of some applications that emerge from individual needs –geosocial networking- and those that arise to improve the functioning of society and of the public interest– like collaborative mapping and augmented reality. In the second part an example of e-enterprise–City 2020 Ltd–is described as well as its use of these sources of opportunities. Finally, the third part analyzes the main socio-ethical problems and some opportunities of location based services.
Chapter
The use of internet along with other technologies that enable wireless connectivity and the expansion and dissemination of the real-time positioning (GPS) in all countries and levels of the population is a great opportunity for entrepreneurship in the field of information technology. This paper shows how the effective channeling of the available information would place decision making at different levels and, regarding different concerns of today's society, connect the online world of the Internet with the physical world. This paper has three parts. The first part shows characteristics of some applications that emerge from individual needs –geosocial networking- and those that arise to improve the functioning of society and of the public interest– like collaborative mapping and augmented reality. In the second part an example of e-enterprise–City 2020 Ltd–is described as well as its use of these sources of opportunities. Finally, the third part analyzes the main socio-ethical problems and some opportunities of location based services.
Conference Paper
One of the main problems in the analysis of Digital Chain of Custody (CoC) in computer forensics is the traceability of the procedure of evidence. Generally, it is obtained by Corps and Forces of State Security and later it is examined and analyzed by forensic information experts. Therefore, the maximum guarantees both judicial and procedural are imperative for information sharing. However, the moment of capturing the proof has been cited as the most critical moment in the CoC. Consequently, in order to meet the exact capture place and right time, Global Positioning Satellite (GPS) has been proposed to be used by some authors. Another problem is created then: the possibility of attacks to capture system, based on jamming (interference) and spoofing (wrong place and time transmission) threats. To prevent the latter, this research work has been developed: the proposal for using encrypted signal of Public Regulated Service (PRS) which it is one of the signals of Galileo satellites. Thereby, the metadata of evidence will contain right and secure geolocation and time.
Article
Digital storage systems (DSS) contain an abundance of geospatial data which can be extracted and analysed to provide useful and complex intelligence insights. This data takes a number of forms such as data within text files, configuration databases and in operating system generated files-each of which require particular forms of processing. This paper investigates the breadth of geospatial data available on DSS, the issues and problems involved in extracting and analysing them and the intelligence insights that the visualisation of the data can provide. We describe a framework to extract a wide range of geospatial data from a DSS and resolve this data into geographic coordinates. © 2014 Springer International Publishing Switzerland. All rights are reserved.
Conference Paper
Full-text available
Traditionaly, a chain of custody (chain of evidence) refers to the chronological documentation , or paper trail, showing storing, controling, transfer, analysis and handling with evidence. Chain of custody plays very important role in digital forensic investigation process. To prove chain of custody, investigators must know all details on how the evidence was handle.„Five W`s (and one H) “must be applied. Life cycle of digital evidence is very complex, and at each stage there is more impact that can violate a chain of custody. Proper chain of custody must include information on how evidence is collected, transported, analyzed, preserved, and handled with. In most countries there is no standard unique protocol or procedures for this. In this paper authors will presents a digital evidence management framework – DEMF, which can im(prove) chain of custody of digital evidence in all stages of digital investigation process. In proposed framework will be used a SHA-2 hash function for digital fingerprint of evidence, biometric characteristics for authentification and identification a personal who handled with evidence, a digital trusted timestamp for determining a “right” time when evidence is discovered or when is accessed to evidence and a gps coordinates for determining a location of evidence. Use of all these factors in the right way provide safe and secure chain of custody, to ensure that digital evidence will be accepted by the court.
Article
Predominantly, because of the pervasiveness of information technology and the affordable and competitive prices of contemporary mobile computing devices, more and more personal navigation devices (PNDs) are substantively embedded with Global Positioning System (GPS) functionality and ubiquitous networks connectivity. Therefore, the digital forensics of PNDs digital evidences becomes an urgent research issue. Meanwhile, Facebook has become a globally foremost social networking service platform. Consequently, the discovery of previous Facebook IDs on PNDs has been focused in some criminal case investigations. This paper conducts the related experiments on a Pocket PC PDA to illustrate the essence of the research. Via the design of the experiments that were carried on the Pocket PC PDA, we concluded previous user(s) information concerning the digital forensics of Facebook user account(s) that might be disclosed on the current mobile computing device. The discussions and conclusions of the paper can provide digital forensics experts as paradigms or frameworks for future related criminal case investigations regarding GPS and social networking when Facebook is involved. Copyright © 2011 John Wiley & Sons, Ltd.
Conference Paper
Full-text available
The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the data extraction is focused on the frequently used device sample of a specific class, as the procedure for many groups of devices can be similar. In the present work a Garmin Dakota 10, a TomTom GO 700, an iPhone 4 (iOS) and a Samsung Galaxy S Plus (Android) is used because they have a wide circulation.
Article
Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents unknowingly. Substantively, the detection, prevention, and the related digital forensics of the above scenarios are becoming tremendously urgent both in public and private sectors. Therefore, in this research, we investigate the scenario when state-of-the-art wireless communication technologies are integrated with the networked smart devices where digital evidences may exist and they could be disclosed when appropriate standard operating procedures are suitably applied. Accordingly, in this paper, a PDA with the built-in GPS navigation functionality via the ubiquitous Wi-Fi connection to a popular social networking platform (facebook) is cross examined concerning the related digital evidence collecting and discovering in terms of revealing previous facebook user accounts on the mobile device without shutting off the power. The research provides a generic framework for the digital forensics specialists to contemplate when the networked smart devices are involved in the related criminal investigation cases especially when omnipresent social networking platforms are becoming the new avenue for the escalating, stringent, and heinous cybercrimes.
Article
Full-text available
Secure adaptation of service composition is crucial for service-oriented applications. An effective adaptation method must improve a composition's adherence to specified behaviour, performance and security guarantees at reasonable cost in terms of computing complexity and time consumption. This chapter discusses current techniques that have been developed to help achieve secure service composition. Based on security verification results, which have been categorised into four patterns in this chapter, a simple heuristics-based adaptation strategy is proposed. This proposal aims at more accurate yet relatively fast secure service adaptation strategy. In order to make direct comparisons of different services, a simple quantification method is also introduced. © 2014 Springer International Publishing Switzerland. All rights are reserved.
Article
Full-text available
Service-Oriented Architectures (SOAs) are becoming a dominant paradigm for the integration of heterogeneous systems. However, SOA-based applications are highly dynamic and liable to change significantly at runtime. This justifies the need for monitoring composed services throughout the lifetime of the service execution. In this chapter we present a novel approach to monitor services at runtime and to ensure that services behave as they have promised. Services are defined as BPMN (Business Process Modelling Notation) processes which can then be monitored during execution. © 2014 Springer International Publishing Switzerland. All rights are reserved.
Article
Mobile communication devices are commonly adopted in contemporary Internet Communication Technology (ICT) era with unparalleled evolving pace. Regrettably, ICT related cybercrimes are rising in an unprecedented speed. Unquestionably, the detection and prevention of the associate information security incidents becomes much more urgent and unarguable both in public sectors as well as private sectors. In this paper, the utilization of a PDA for GPS navigation and Wi-Fi connection to ubiquitous social networking service provider – Facebook are cross examined concerning the related digital evidence collecting and discovering concerning ubiquitous networks and wireless communications, which provides a framework for the associate digital forensics.
Conference Paper
As mobile computing devices becomes pervasive, more and more civilians deposit precious information in mobile phones than desk top PCs especially for Global Logistics Management operators, who heavily depend on Global Position System in order to effectively and efficiently fulfill just-in-time delivery. In this paper, an embedded Global Position System smart phone was applied to travel along the roads trying to disclose the associate digital evidences concerning the locations that the current user had actually been or wish to go via data mining technology. From digital forensics point of view, digital evidences essentially play a critical and decisive role in some cybercriminal or cyber terrorism cases although the diversities of mobile phones and the corresponding operating systems. The paper provides the generic guides and methodologies for the law enforcement agencies or the digital forensics specialists to ponder when they deal with the similar cases. Keywordsdigital forensics–global position system–geotagging–mobile computing device–non-volatile memory–smart phone
Article
The use of internet along with other technologies that enable wireless connectivity and the expansion and dissemination of the real-time positioning (GPS) in all countries and levels of the population is a great opportunity for entrepreneurship in the field of information technology. This paper shows how the effective channeling of the available information would place decision making at different levels and, regarding different concerns of today's society, connect the online world of the Internet with the physical world. This paper has three parts. The first part shows characteristics of some applications that emerge from individual needs -geosocial networking- and those that arise to improve the functioning of society and of the public interest- like collaborative mapping and augmented reality. In the second part an example of e-enterprise-City 2020 Ltd-is described as well as its use of these sources of opportunities. Finally, the third part analyzes the main socio-ethical problems and some opportunities of location based services.
Article
This paper is predominantly a review of literature on the emerging mobile application area known as location-based social networking. The study applies the social informatics framework to the exploratory question of what effect location based social networking may have on relationships between people. The classification model used in the paper relates previous research on location based services and online social networking together. Specifically the wider study is concerned with literature which identifies the impact of technology on trust with respect to friendship. This paper attempts to draw out the motivations behind using location based social networking applications and the implications this may have on individual privacy and more broadly one's social life. It relies heavily on the domain of social informatics with a view to setting a theoretical underpinning to the shaping between context and information and communication technology design.
Article
Full-text available
Global Positioning Systems are becoming increasingly pervasive. The forensic acquisition and analysis of these units is of great interest as it has the potential to yield historic locational data for these units. Analysis of the TomTom one satellite navigation unit has resulted in a method to reliably extract historic data from these devices in a forensically sound manner.
Article
The proliferation of mobile phones in society has led to a concomitant increase in their use in and connected to criminal activity. The examination and analysis of all telecommunications equipment has become an important aid to law enforcement in the investigation of crime. An understanding of the mechanism of the mobile phone network is vital to appreciate the worth of data retrieved during such an examination. This paper describes in principle the way a cellular mobile phone network operates and how the data is processed. In addition it discusses some of the tools available to examine mobile phones and SIM cards and some of their strengths and weaknesses. It also presents a short overview of the legal position of an analyst when examining a mobile phone.
Article
TomTom GPS navigation devices are one of the most popular kinds of satellite navigation devices in the UK, and are increasingly being examined in criminal cases to identify data of evidential value. This article outlines the format of TomTom location records and shows how these can be automatically extracted, enabling deleted location entries to be recovered. In addition, it shows how the type of a record – e.g. home or favourite location – can be determined and how to identify locations where the TomTom has actually been, as opposed to destinations which have been entered into the device. This information has been used in a number of different investigations including cases of kidnap, grooming, murder and terrorism, and can be of vital importance in cases where hundreds or even thousands of location entries are recovered from a TomTom device.
Article
The Global Positioning System (GPS) has slowly permeated into the civilian community and has become an essential accessory for the modern individual. Various commercial applications heavily rely on GPS technology. GPS has also started receiving attention in court cases, where it has been admissible as evidence leading to convictions or proving innocence. However, GPS is a radio-navigation system and is prone to vulnerabilities that may be introduced intentionally or unintentionally. The legal literature has not debated the possibility of human alteration of GPS data in judicial reasoning which raises the prospect of forged GPS data being presented to courts by individuals who have the motive and the technical knowledge to do so. By exposing the weaknesses present, this paper aims to draw the attention of the legal fraternity to these issues which may put the legal system in a dilemma as over-reliance on GPS technology may produce disastrous results, especially when innocence or guilt largely depends on GPS evidence.
XMap 6 GIS software suite
  • Delorme
DeLorme. XMap 6 GIS software suite. Retreived March 22, 2009, from http://www.delorme.com/xmap/
Early Innovations Web site
  • J Early
  • Gpsphotolinker
Early, J. GPSPhotoLinker. Early Innovations Web site. Retreived February 12, 2009, from http://www.earlyinnovations.com/gpsphotolinker/
GPS evidence might drive your case home. Law Technology News
  • C Ball
Ball, C. GPS evidence might drive your case home. Law Technology News. Retreived October 29, 2008, from http://www.law.com/jsp/legaltechnology/PubArticleFriendlyLT.jsp?id=1 202425606808
GPS gis and position tracking technology privacy and law enforcementcomputerforensic-technician.com/wordpress/gps-gis-and-position-trackingtechnology-privacy-and-law-enforcement
  • N M Smith
Smith, N. M. GPS gis and position tracking technology privacy and law enforcement. Retreived February 21, 2009, from http://www.computerforensic-technician.com/wordpress/gps-gis-and-position-trackingtechnology-privacy-and-law-enforcement/
Assisted GPS: A lowinfrastructure approach
  • J Lamance
  • J Jarvinen
  • J Desalas
LaMance, J., Jarvinen, J., & DeSalas, J. Assisted GPS: A lowinfrastructure approach. Retreived March 1, 2002, from http://www.gpsworld.com/gpsworld/article/articleDetail.jsp?id=12287
Pocket GPS tracker jammer from http://www.tayx.co.uk/gmt04-pocket-gps-jammer.html [20] Paraben Corporation.. Device seizure v3
  • Tayx
Tayx, (n.d.). Pocket GPS tracker jammer. Retrieved March 19, 2009, from http://www.tayx.co.uk/gmt04-pocket-gps-jammer.html [20] Paraben Corporation.. Device seizure v3.1. Retreived February 4, 2009, from http://www.parabenforensics.com/catalog/product_info.php?cPath=25&products_id=405
Police turn to secret weapon: GPS device
  • B Hubbard
Hubbard, B. Police turn to secret weapon: GPS device. Retreived August 13, 2008, from http://www.washingtonpost.com/wpdyn/content/article/2008/08/12/AR2008081203275_pf.html
Point 2 point v2.0. Retrieved
  • Paraben Corporation
Paraben Corporation.. Point 2 point v2.0. Retrieved February 22, 2009, from http://www.parabenforensics.com/catalog/product_info.php?products_id=404
Google Code Web site
  • F Schnell
  • Gpicsync
Schnell, F. GPicSync. Google Code Web site. Retreived April 13, 2009, from http://code.google.com/p/gpicsync/
Sources of errors in GPS
  • A Köhne
  • M Wößner
Köhne, A. & Wößner, M. (2007, March 4). Sources of errors in GPS. Retreived
GPS technology doubles as crime-fighting tool
  • C J Williams
Williams, C. J. GPS technology doubles as crime-fighting tool. Retreived November 25, 2008, from http://articles.latimes.com/2008/nov/25/local/me-gps25
DeLorme Earthmate PN series
  • Delorme
DeLorme, (n.d.). DeLorme Earthmate PN series. Retrieved April 19, 2009, from http://shop.delorme.com/OA_HTML/DELibeCCtpSctDspRte.jsp?sectio n=10460
Jobo announces GPS digital camera add-on
  • D Emerick
Emerick, D. (2008, February 5). Jobo announces GPS digital camera add-on. Retrieved March 19, 2009, from http://emerick.blogspot.com/2008_02_01_archive.html [17] GPS tracking, 06-2741 (United States Court of Appeals February 2, 2007).
Location-based services for your mobile
  • L Phifer
Phifer, L. (2006, December 21). Location-based services for your mobile. Retreived March 26, 2009, from http://searchmobilecomputing.techtarget.com/tip/0,289483,sid40_gci123 6097,00.html
TomTom gps device forensics TomTology-GPS forensics
  • B Lemere
  • A Sayers
LeMere, B., & Sayers, A. (2009, January 14). TomTom gps device forensics. Retrieved March 3, 2009, from http://www.forensicfocus.com/tomtom-gps-device-forensics [37] Berla Corporation, (n.d.). TomTology-GPS forensics. Retrieved March 19, 2009, from http://www.berlacorp.com/tomtology.html
Silent witness. Navigation News
  • D Last
Last, D. Silent witness. Navigation News, pp. 10-13. (2009, January/February).
GPS data from landairsea tracking device aids murder investigation of 12-year old
  • Reuters
Reuters. GPS data from landairsea tracking device aids murder investigation of 12-year old. Retreived March 31, 2008, from http://www.reuters.com/article/pressRelease/idUS122531+31-Mar2008+PRN20080331
Sources of errors in GPS from http://www.kowoma.de/en/gps/errors.htm [4] Federal Aviation Administration Wide area augmentation system
  • A Köhne
  • M Wößner
Köhne, A. & Wößner, M. (2007, March 4). Sources of errors in GPS. Retreived April 19, 2009, from http://www.kowoma.de/en/gps/errors.htm [4] Federal Aviation Administration, (2007, June 26). Wide area augmentation system. Retreived April 19, 2009, from http://www.faa.gov/about/office_org/headquarters_offices/ato/service_u nits/techops/navservices/gnss/waas/
24: Delorme XMap with a .jpg image registered and oriented on the map
  • Fig
Fig. 24: Delorme XMap with a.jpg image registered and oriented on the map.