Google Glass Forensics Blog 1

Introduction

 

Google Glass is a revolutionary new technology that has and will continue to change people’s lives. Google Glass is an extension of your phone that allows you to take pictures, send messages, navigate to different places, search the web, etc. with the sound of your voice. Since Google Glass has not been released to the general public yet, it would be very beneficial to conduct research to see how it operates and how it stores data before its official release date. This could aid law enforcement or other forensic examiners in the field

 

 

A Little Background Research

 

Not much research has been done on the forensic aspects of Google Glass as of yet, but there has been some research conducted by students at the LCDI alongside Jonathan Rajewski. See the LCDI’s blog post on it here: http://computerforensicsblog.champlain.edu/2013/11/13/google-glass-forensics/ or Rajewski’s article and powerpoint here: http://www.jonrajewski.com/cyberblog/2013/11/14/pfic-2013-forensic-analysis-of-google-glass-slides/.

 

 

What Do We Hope to Accomplish?

 

  1. Does Google Glass store data on its internal storage?

  2. If so, what data (pictures, videos, voice recordings, text messages, etc.) does Google Glass store in its internal storage?

  3. Does Google Glass store network settings?

  4. Does Google Glass store device information for the mobile device that it is connected to?

  5. Does Google Glass have a file system or is it just flash memory?

  6. Google Glass has applications that you can install. What kind of data do these applications store on Glass?

  7. How does Glass Store this data?

  8. Does the application data get stored on the mobile device that Glass is connected to as well?

 

 

How we will do it?

 

For this project we will be analyzing a pair of Google Glass. We will connect the Glass to an available Android phone and generate data (take pictures, videos, navigate, search the web, etc.) with the Glass. We will also install the currently available applications to the device and generate data with the apps. We will then attempt to acquire the Glass with EnCase, Forensic Toolkit (FTK), and Cellebrite. We will analyze the data as if it were a forensic case, to see what information/data we can find.

 

 

Equipment

 

  • An active Android cell phone

  • A pair of Google Glass

  • EnCase and/or FTK

  • Cellebrite UFED Touch Pro

 

Colby Lahaie

 

More Research Projects
MMORPG Chat Forensics Final Report
Mobile App Analysis Part 3
Building a Visualization Tool for mac_apt