Examining artifacts generated by setting Facebook Messenger as a default SMS application on Android: implication for personal data privacy

dc.contributor.authorNtonja, Morris
dc.contributor.authorAshawa, Moses
dc.date.accessioned2021-01-12T15:47:05Z
dc.date.available2021-01-12T15:47:05Z
dc.date.issued2020-11-04
dc.description.abstractThe use of mobile devices and social media applications in organized crime is increasingly increasing. Facebook Messenger is the most popular social media applications used globally. Unprecedented time is spent by many interacting globally with known and unknown individuals using Facebook. During their interaction, personal information is uploaded. Thus, crafting a myriad of privacy trepidation to users. While there are researches performed on the forensic artifacts’ extraction from Facebook, no research is conducted on setting Facebook Messenger applications as a default messaging application on Android. Two Android mobile devices were used for data generation and Facebook Messenger account was created. Disc imaging and data partition were examined and accessed to identify changes in the orca database of the application package using DB browser. The data were then generated using unique words which were used for conducting key searches. The research discovered that mqtt_log_event0.txt of the Com.Facebook.orca/Cache directory stores chat when messenger is set as a default messaging app. The research finding shows that chats are recorded under messages tab together with SMS of data/data/com.facebook.orca/databases/smstakeover_db and data/data/com.facebook.orca/databases/threads_db. This indicates that only smstakeover_db stores SMS messaging information when using messenger application. It is observed that once the user deletes a sent SMS message, the phone number and the deleted time stamp remained in the data/data/com.facebook.orca/databases/smstakeover_db database in the address_table are recoverable. The results suggest that anonymization of data is essential if Facebook chats are to be shared for further research into social media contenten_UK
dc.identifier.citationNtonja M, Ashawa M. (2020) Examining artifacts generated by setting Facebook Messenger as a default SMS application on Android: implication for personal data privacy. Security and Privacy, Volume 3, Issue 6, Article number 128en_UK
dc.identifier.issn2475-6725
dc.identifier.urihttps://doi.org/10.1002/spy2.128
dc.identifier.urihttp://dspace.lib.cranfield.ac.uk/handle/1826/16164
dc.language.isoenen_UK
dc.publisherWileyen_UK
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjecttimestampen_UK
dc.subjectthird-party applicationen_UK
dc.subjectSMS take overen_UK
dc.subjectFacebook Messengeren_UK
dc.subjectdefault SMS applicationen_UK
dc.titleExamining artifacts generated by setting Facebook Messenger as a default SMS application on Android: implication for personal data privacyen_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Examining_artifacts_generated_by_setting_Facebook_Messenger_as_a_default_SMS-2020.pdf
Size:
3.13 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: