Tuesday, March 19, 2024

Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis

This article is about collecting metadata from photographs. Metadata is information that is created for every file’s format. Examples of metadata: file created date and time, Tracking Photos, last edited, etc.

In this article, we will take a picture from iPhone and analyze that Image to collect various metadata for collected evidence. Before starting your forensic investigation for images, you should be able to understand EXIF DATA.

For example, if you climb a mountain and take a picture, it stores its GPS location

You can also check the Computer Forensics & Cyber Crime Investigation: Using Open Source Tools

EXIF DATA – Tracking Photos

In the olden days photographers were forced to carry a pen and a notepad with them to record important information such as shutter speed, aperture, and date.

If the image is the only evidence the forensic analyst will find difficulties to find photo-captured data and time etc.

EXIF data which is Exchangeable image file format according to Japan Electronic Industries Development Association /Japan Electronics and Information Technology Industries Association/Camera & Imaging Products Association specifications) is a standard that specifies the formats for images, sound, and ancillary tags used by digital cameras (including smartphones), scanners, and other systems handling image and sound files recorded by digital cameras.

The metadata tags defined in the Exif standard

  • Date and time information: Digital cameras will record the current date and time and save this in the metadata.
  • Camera settings: This includes static information such as the camera model and make, and information that varies with each image orientation rotation, aperture, shutter speed, focal length, metering mode, and ISO speed.
  • Descriptions.
  • Copyright information.

Geolocation

The Exif format has standard tags for location information. As of 2014 many cameras and most mobile phones have a built-in GPS receiver that stores the location information in the Exif header when a picture is taken.

Some other cameras have a separate GPS receiver that fits into the flash connector. By using a map or mapping software.

The process of adding geographic information to a photograph is known as geotagging. Photo-sharing communities like Panoramio or Flickr equally allow their users to upload geocoded pictures or to add geolocation information online.

Privacy and Security

Since the Exif tag contains metadata about the photo, it can pose a privacy problem. For example, a photo taken with a GPS-enabled camera can reveal the exact location and time it was taken. Many users may be unaware that their photos are tagged by default in this manner.

Many users may be unaware that their photos are tagged by default in this manner.

Extracted Metadata from Image

Tracking Photos

Forensics analysts will get information about the mobile model, make, sensing method, bits per sample, etc. You can use online tools to analyze Exif data for your Image.

Image GPS metadata

Tracking Photo's Geolocation with GPS

Exact Latitude and Longitude and GPS Position For Image.

Geolocation of Image in the satellite map

Tracking Photos

So you can use online geo-image locator categorized websites to analyze Images, the illustrated picture above was captured on iPhone 6 and Picture was captured in Kerala, Thiruvananthapuram Zoo, India.

The exact GPS location was traced with Satellite Map. Happy Investigating !!!

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity updates

Website

Latest articles

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hack AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...

Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows

Microsoft has announced an important update for Windows users worldwide in a continuous effort...

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...

New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data

In recent years, personal data security has surged in importance due to digital device...

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles