The document discusses analyzing GPS data from devices forensically. It provides examples of examining GPS data from devices like Garmin, TomTom, and Magellan using EnCase forensic software. Key information that can be extracted includes travel paths, trackpoints, waypoints, routes, saved locations, photos/videos, and other location-related data. The document demonstrates how to acquire the devices, extract relevant files, and view the data in tools like Google Earth to analyze travel histories and locations of interest.
Presentation on applications of AI in the geospatial domain at the Fourth Edition of AI in Practice (6th November 2019, Startup Village, Amsterdam, The Netherlands)
Erik Van Der Zee, Enterprise Architect, Geodan
A spatial database, or geodatabase is a database that is optimized to store and query data
that represents objects defined in a geometric space. Most spatial databases allow representing simple geometric objects such as points, lines and polygons.
A 1-day short course developed for visiting guests from Tecsup on network forensics, prepared in a day : ]
The requirements/constraints were 5-7 hours of content and that the target audience had very little forensic or networking knowledge. [For that reason, flow analysis was not included as an exercise, discussion of network monitoring solutions was limited, and the focus was on end-node forensics, not networking devices/appliances themselves]
Thermal remote sensing measures electromagnetic radiation emitted from the surface of objects to estimate their temperature. It detects thermal properties rather than reflected solar radiation. Measurements provide the radiant temperature, which depends on the kinetic temperature and emissivity. Thermal remote sensing is used for applications like environmental monitoring, geology, agriculture, and urban planning by analyzing surface temperatures from satellites or aircraft.
This document summarizes a presentation about working with ArcGIS Online. It discusses ArcGIS Online as an integrated part of ArcGIS that allows users to create and share intelligent web maps on any device. The presentation demonstrates how to use ArcGIS.com to search data, create web maps, and embed maps in websites. It also shows how to use templates to showcase maps in a public gallery. The road ahead section discusses upcoming enhancements to ArcGIS Online, including hosting and portals for organizations to collaborate on maps and data in the cloud.
geoinformatics handbook:it contains all open source software and commerical software of remote sensing,gis and photogrammerty and also all free data sources.free data sources such as DEM and LIDAR
Geographic Information Systems (GIS) allow users to store, visualize, and analyze spatial data in digital formats. GIS can be used to ask questions about the location of things, what happens at locations, and how things are spatially related. Spatial data can be represented using vector models of discrete data like points, lines, and polygons, or raster models of continuous data like elevation or land cover which have no clear edges. Real world entities may have both discrete and continuous qualities, and different GIS data structures are suited to representing each type of data.
Presentation on applications of AI in the geospatial domain at the Fourth Edition of AI in Practice (6th November 2019, Startup Village, Amsterdam, The Netherlands)
Erik Van Der Zee, Enterprise Architect, Geodan
A spatial database, or geodatabase is a database that is optimized to store and query data
that represents objects defined in a geometric space. Most spatial databases allow representing simple geometric objects such as points, lines and polygons.
A 1-day short course developed for visiting guests from Tecsup on network forensics, prepared in a day : ]
The requirements/constraints were 5-7 hours of content and that the target audience had very little forensic or networking knowledge. [For that reason, flow analysis was not included as an exercise, discussion of network monitoring solutions was limited, and the focus was on end-node forensics, not networking devices/appliances themselves]
Thermal remote sensing measures electromagnetic radiation emitted from the surface of objects to estimate their temperature. It detects thermal properties rather than reflected solar radiation. Measurements provide the radiant temperature, which depends on the kinetic temperature and emissivity. Thermal remote sensing is used for applications like environmental monitoring, geology, agriculture, and urban planning by analyzing surface temperatures from satellites or aircraft.
This document summarizes a presentation about working with ArcGIS Online. It discusses ArcGIS Online as an integrated part of ArcGIS that allows users to create and share intelligent web maps on any device. The presentation demonstrates how to use ArcGIS.com to search data, create web maps, and embed maps in websites. It also shows how to use templates to showcase maps in a public gallery. The road ahead section discusses upcoming enhancements to ArcGIS Online, including hosting and portals for organizations to collaborate on maps and data in the cloud.
geoinformatics handbook:it contains all open source software and commerical software of remote sensing,gis and photogrammerty and also all free data sources.free data sources such as DEM and LIDAR
Geographic Information Systems (GIS) allow users to store, visualize, and analyze spatial data in digital formats. GIS can be used to ask questions about the location of things, what happens at locations, and how things are spatially related. Spatial data can be represented using vector models of discrete data like points, lines, and polygons, or raster models of continuous data like elevation or land cover which have no clear edges. Real world entities may have both discrete and continuous qualities, and different GIS data structures are suited to representing each type of data.
Thermal infrared remote sensing detects electromagnetic radiation emitted from objects based on their temperature. It images in the 3-14 micrometer range and can see at night or through haze since it detects emitted rather than reflected energy. While radiant temperature detected by sensors is slightly lower than the true kinetic temperature of an object, the two are highly correlated. Thermal properties of materials like conductivity, capacity, and diffusivity determine how quickly heat passes through or is stored. Thermal remote sensing allows analysis of surface temperatures and heat properties from aerial or satellite images.
This chapter discusses using Google search techniques to find security vulnerabilities on websites. It covers both basic operators like +, -, and " to refine searches, as well as advanced operators like allintext:, filetype:, and intitle: to search specific fields. The goal is to quickly find sensitive information like login credentials, passwords, or internal documents through structured searches. A variety of example searches are provided to demonstrate how different operators can reveal website details and potentially sensitive data.
Cyber forensics deals with the investigation and analysis of computer systems involved in cyber crimes, while digital forensics involves any digital device for the purpose of a legal investigation. Cyber forensics is a branch of digital forensics that focuses specifically on computer systems and networks. Both fields involve the identification, collection, preservation, analysis and presentation of digital evidence from various devices in relation to crimes. Proper collection and preservation of digital evidence requires following protocols like photographing devices, noting identifying details, removing power sources safely if destructive devices are suspected, and securely storing devices to prevent damage prior to analysis.
LiDAR is an optical remote sensing technology that uses laser light to densely sample the surface of the Earth. It can collect data quickly and accurately to generate precise, 3D information about physical features and terrain. LiDAR systems determine the distance between an object and the sensor by measuring the time delay between transmission and detection of a laser pulse. Key components include a laser, receiver, timing electronics, and computer. Applications of LiDAR include generating high-resolution maps, modeling pollution distribution, monitoring agriculture and forestry, and facilitating autonomous vehicles.
Thermal infrared remote sensing involves observing electromagnetic radiation emitted from objects in the thermal infrared wavelength range of 3-14 micrometers. In this range, sensors can detect the thermal radiative properties of ground materials. Thermal infrared imagery captures relative differences in surface temperature or radiance. Interpreting thermal images requires understanding factors like the time of day the image was taken, whether it is a positive or negative image, and how emissivity and other surface characteristics impact observed radiation and temperature values.
LiDAR Data Processing and ClassificationMichal Bularz
This document discusses techniques for interpreting point cloud and image data through automated algorithms that translate human visual interpretations. It describes popular approaches for processing LiDAR point clouds, including height-based segmentation to classify features above the ground and shape-fitting algorithms. It also discusses using spectral information through intensity values or image fusion. Finally, it examines developing "computer vision" tools that can segment data based on visual cues humans use like color, texture, morphology, context and defined shapes. The goal is to replicate human visual interpretation abilities through algorithms.
Remote sensing plays a large role in enhancing geographic information systems (GIS) by providing large amounts of data needed for GIS. It reduces the need for manual field work and allows the retrieval of data from difficult to access areas. Remote sensing imagery can directly serve as a visual aid in GIS and can indirectly provide information about land use, vegetation, and other features through analysis. As remote sensing technologies advance, they continue to increase the resolution and coverage of data available to integrate within GIS. This leads to more accurate and detailed geographic information systems.
This document summarizes a project on cloud forensics. It discusses cloud computing models like SaaS, PaaS, and IaaS. It describes implementing a private Eucalyptus cloud and testing live forensics via virtual introspection and recovering ephemeral data from previous cloud tenants. It demonstrates recovering data from a physical disk but not from a new virtual instance due to sparse files. The document concludes ephemeral data is not accessible to new tenants in Eucalyptus clouds due to sparse files and zero-filling.
The document discusses how GIS can help address national security challenges through four components: data management, planning and analysis, field mobility, and situational awareness. It provides examples of how GIS has supported responses to issues like wildfires, pandemics, port security, border management, and more. The key advantages highlighted are creating a common operating platform to enable borderless cooperation, approaching problems geographically to foster understanding, and leveraging social media.
Light detection and ranging (LiDAR) is a remote sensing method that uses pulsed laser light to image objects and measure distances. It can be used for applications such as autonomous vehicles, forest planning and management, river surveying, and oil and gas exploration. The document discusses the history, principles, components, types, concepts and applications of LiDAR technology.
Mobile GIS allows field workers to capture and edit geographic data on mobile devices. It integrates GPS, mobile devices, and wireless communications to access GIS data from the field. The main benefits are improved field efficiency and data accuracy. ESRI provides several mobile GIS apps, including ArcPad for data collection, and apps for Windows, iOS, and Android devices that can access maps and perform analysis in the field. Mobile GIS systems connect mobile devices running GIS software via wireless networks to central GIS servers to share and sync field data.
Database Structures – Relational, Object Oriented – ER diagram - spatial data models – Raster Data Structures – Raster Data Compression - Vector Data Structures - Raster vs Vector Models TIN and GRID data models - OGC standards - Data Quality.
Developing Efficient Web-based GIS ApplicationsSwetha A
The document discusses technologies for developing efficient web-based GIS applications. It describes mapping technologies like static map renderers, slippy maps, and Flash mapping. It also covers database technologies like Oracle, SQL Server, and normalization. Development standards discussed include web wireframing, languages like ASP and PHP, protocols like SOAP, and a three-tier architecture. The conclusion recommends Flash mapping or slippy maps, Oracle database, wireframing, SOAP protocol, and a three-tier architecture for developing efficient web-based GIS applications.
Face recognition is a biometric technology that goes beyond just detecting human faces in an image or video. It goes a bit further to determine whose face it is. A face recognition system works by taking an image of a face and predicting whether the face matches another face stored in a dataset (or whether a face in one image matches a face in another). Created By Suman Ahemed Saikan
This document provides an overview of ESRI and ArcGIS. It discusses that ESRI was founded in 1969 and began developing GIS tools in the 1980s, releasing their first commercial software ARC/INFO in 1982. It then summarizes the history of ArcGIS, including the releases of ArcView in the 1990s, ArcGIS 8.X in 1999, and ArcGIS 9.X in 2004. The document also outlines the different ArcGIS Desktop components and levels, as well as the industries where ArcGIS is applicable, such as agriculture, utilities, government, and more.
The document discusses geographic data structures and models used in GIS. It explains that geographic data must be encoded digitally and organized in a database to be useful for GIS. It then contrasts conventional paper maps with digital geographic data, which allows for dynamic representation and interaction. The document goes on to describe common data models for representing geographic information, including raster, vector, field-based and object-based models. It provides details on raster and vector data models, focusing on how each represents points, lines and areas digitally.
Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices.
Remote Sensing for Assessing Crop Residue Cover and Soil Tillage IntensityCIMMYT
Remote sensing –Beyond images
Mexico 14-15 December 2013
The workshop was organized by CIMMYT Global Conservation Agriculture Program (GCAP) and funded by the Bill & Melinda Gates Foundation (BMGF), the Mexican Secretariat of Agriculture, Livestock, Rural Development, Fisheries and Food (SAGARPA), the International Maize and Wheat Improvement Center (CIMMYT), CGIAR Research Program on Maize, the Cereal System Initiative for South Asia (CSISA) and the Sustainable Modernization of the Traditional Agriculture (MasAgro)
The document discusses VERIPOS' PPP-AR positioning service which provides centimeter-level global positioning using GNSS networks. PPP-AR offers faster initialization and reinitialization than traditional PPP, providing RTK-like accuracy globally. It works by estimating additional bias parameters to resolve carrier phase ambiguities. VERIPOS upgraded its infrastructure to support PPP-AR, including new reference stations and servers. PPP-AR demonstrates rapid reconvergence from signal outages, bridging gaps within seconds, making it suitable for applications where GNSS signals may be interrupted.
- Digimap provides access to mapping data through online mapping tools and data downloads. It has two main mapping tools - Roam for fixed scale mapping and Carto which allows user-selected scales.
- Users can view and print maps online or download mapping data for use in GIS/CAD software. A wide range of Ordnance Survey data products are available to download.
- Support resources include online help pages, training videos, and eLearning units to help users make maps and work with downloaded data. Site representatives can access usage statistics and discussion forums.
GPS devices use signals from satellites to determine location. Before hiking, download offline maps and plan routes or import tracks. During hiking, use GPS apps like OruxMaps to navigate routes or follow tracks. Apps provide compass directions and estimated times to navigate between waypoints or track points. After hiking, tracks can be viewed to see the path taken and get statistics.
Thermal infrared remote sensing detects electromagnetic radiation emitted from objects based on their temperature. It images in the 3-14 micrometer range and can see at night or through haze since it detects emitted rather than reflected energy. While radiant temperature detected by sensors is slightly lower than the true kinetic temperature of an object, the two are highly correlated. Thermal properties of materials like conductivity, capacity, and diffusivity determine how quickly heat passes through or is stored. Thermal remote sensing allows analysis of surface temperatures and heat properties from aerial or satellite images.
This chapter discusses using Google search techniques to find security vulnerabilities on websites. It covers both basic operators like +, -, and " to refine searches, as well as advanced operators like allintext:, filetype:, and intitle: to search specific fields. The goal is to quickly find sensitive information like login credentials, passwords, or internal documents through structured searches. A variety of example searches are provided to demonstrate how different operators can reveal website details and potentially sensitive data.
Cyber forensics deals with the investigation and analysis of computer systems involved in cyber crimes, while digital forensics involves any digital device for the purpose of a legal investigation. Cyber forensics is a branch of digital forensics that focuses specifically on computer systems and networks. Both fields involve the identification, collection, preservation, analysis and presentation of digital evidence from various devices in relation to crimes. Proper collection and preservation of digital evidence requires following protocols like photographing devices, noting identifying details, removing power sources safely if destructive devices are suspected, and securely storing devices to prevent damage prior to analysis.
LiDAR is an optical remote sensing technology that uses laser light to densely sample the surface of the Earth. It can collect data quickly and accurately to generate precise, 3D information about physical features and terrain. LiDAR systems determine the distance between an object and the sensor by measuring the time delay between transmission and detection of a laser pulse. Key components include a laser, receiver, timing electronics, and computer. Applications of LiDAR include generating high-resolution maps, modeling pollution distribution, monitoring agriculture and forestry, and facilitating autonomous vehicles.
Thermal infrared remote sensing involves observing electromagnetic radiation emitted from objects in the thermal infrared wavelength range of 3-14 micrometers. In this range, sensors can detect the thermal radiative properties of ground materials. Thermal infrared imagery captures relative differences in surface temperature or radiance. Interpreting thermal images requires understanding factors like the time of day the image was taken, whether it is a positive or negative image, and how emissivity and other surface characteristics impact observed radiation and temperature values.
LiDAR Data Processing and ClassificationMichal Bularz
This document discusses techniques for interpreting point cloud and image data through automated algorithms that translate human visual interpretations. It describes popular approaches for processing LiDAR point clouds, including height-based segmentation to classify features above the ground and shape-fitting algorithms. It also discusses using spectral information through intensity values or image fusion. Finally, it examines developing "computer vision" tools that can segment data based on visual cues humans use like color, texture, morphology, context and defined shapes. The goal is to replicate human visual interpretation abilities through algorithms.
Remote sensing plays a large role in enhancing geographic information systems (GIS) by providing large amounts of data needed for GIS. It reduces the need for manual field work and allows the retrieval of data from difficult to access areas. Remote sensing imagery can directly serve as a visual aid in GIS and can indirectly provide information about land use, vegetation, and other features through analysis. As remote sensing technologies advance, they continue to increase the resolution and coverage of data available to integrate within GIS. This leads to more accurate and detailed geographic information systems.
This document summarizes a project on cloud forensics. It discusses cloud computing models like SaaS, PaaS, and IaaS. It describes implementing a private Eucalyptus cloud and testing live forensics via virtual introspection and recovering ephemeral data from previous cloud tenants. It demonstrates recovering data from a physical disk but not from a new virtual instance due to sparse files. The document concludes ephemeral data is not accessible to new tenants in Eucalyptus clouds due to sparse files and zero-filling.
The document discusses how GIS can help address national security challenges through four components: data management, planning and analysis, field mobility, and situational awareness. It provides examples of how GIS has supported responses to issues like wildfires, pandemics, port security, border management, and more. The key advantages highlighted are creating a common operating platform to enable borderless cooperation, approaching problems geographically to foster understanding, and leveraging social media.
Light detection and ranging (LiDAR) is a remote sensing method that uses pulsed laser light to image objects and measure distances. It can be used for applications such as autonomous vehicles, forest planning and management, river surveying, and oil and gas exploration. The document discusses the history, principles, components, types, concepts and applications of LiDAR technology.
Mobile GIS allows field workers to capture and edit geographic data on mobile devices. It integrates GPS, mobile devices, and wireless communications to access GIS data from the field. The main benefits are improved field efficiency and data accuracy. ESRI provides several mobile GIS apps, including ArcPad for data collection, and apps for Windows, iOS, and Android devices that can access maps and perform analysis in the field. Mobile GIS systems connect mobile devices running GIS software via wireless networks to central GIS servers to share and sync field data.
Database Structures – Relational, Object Oriented – ER diagram - spatial data models – Raster Data Structures – Raster Data Compression - Vector Data Structures - Raster vs Vector Models TIN and GRID data models - OGC standards - Data Quality.
Developing Efficient Web-based GIS ApplicationsSwetha A
The document discusses technologies for developing efficient web-based GIS applications. It describes mapping technologies like static map renderers, slippy maps, and Flash mapping. It also covers database technologies like Oracle, SQL Server, and normalization. Development standards discussed include web wireframing, languages like ASP and PHP, protocols like SOAP, and a three-tier architecture. The conclusion recommends Flash mapping or slippy maps, Oracle database, wireframing, SOAP protocol, and a three-tier architecture for developing efficient web-based GIS applications.
Face recognition is a biometric technology that goes beyond just detecting human faces in an image or video. It goes a bit further to determine whose face it is. A face recognition system works by taking an image of a face and predicting whether the face matches another face stored in a dataset (or whether a face in one image matches a face in another). Created By Suman Ahemed Saikan
This document provides an overview of ESRI and ArcGIS. It discusses that ESRI was founded in 1969 and began developing GIS tools in the 1980s, releasing their first commercial software ARC/INFO in 1982. It then summarizes the history of ArcGIS, including the releases of ArcView in the 1990s, ArcGIS 8.X in 1999, and ArcGIS 9.X in 2004. The document also outlines the different ArcGIS Desktop components and levels, as well as the industries where ArcGIS is applicable, such as agriculture, utilities, government, and more.
The document discusses geographic data structures and models used in GIS. It explains that geographic data must be encoded digitally and organized in a database to be useful for GIS. It then contrasts conventional paper maps with digital geographic data, which allows for dynamic representation and interaction. The document goes on to describe common data models for representing geographic information, including raster, vector, field-based and object-based models. It provides details on raster and vector data models, focusing on how each represents points, lines and areas digitally.
Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices.
Remote Sensing for Assessing Crop Residue Cover and Soil Tillage IntensityCIMMYT
Remote sensing –Beyond images
Mexico 14-15 December 2013
The workshop was organized by CIMMYT Global Conservation Agriculture Program (GCAP) and funded by the Bill & Melinda Gates Foundation (BMGF), the Mexican Secretariat of Agriculture, Livestock, Rural Development, Fisheries and Food (SAGARPA), the International Maize and Wheat Improvement Center (CIMMYT), CGIAR Research Program on Maize, the Cereal System Initiative for South Asia (CSISA) and the Sustainable Modernization of the Traditional Agriculture (MasAgro)
The document discusses VERIPOS' PPP-AR positioning service which provides centimeter-level global positioning using GNSS networks. PPP-AR offers faster initialization and reinitialization than traditional PPP, providing RTK-like accuracy globally. It works by estimating additional bias parameters to resolve carrier phase ambiguities. VERIPOS upgraded its infrastructure to support PPP-AR, including new reference stations and servers. PPP-AR demonstrates rapid reconvergence from signal outages, bridging gaps within seconds, making it suitable for applications where GNSS signals may be interrupted.
- Digimap provides access to mapping data through online mapping tools and data downloads. It has two main mapping tools - Roam for fixed scale mapping and Carto which allows user-selected scales.
- Users can view and print maps online or download mapping data for use in GIS/CAD software. A wide range of Ordnance Survey data products are available to download.
- Support resources include online help pages, training videos, and eLearning units to help users make maps and work with downloaded data. Site representatives can access usage statistics and discussion forums.
GPS devices use signals from satellites to determine location. Before hiking, download offline maps and plan routes or import tracks. During hiking, use GPS apps like OruxMaps to navigate routes or follow tracks. Apps provide compass directions and estimated times to navigate between waypoints or track points. After hiking, tracks can be viewed to see the path taken and get statistics.
This document is the user guide for DeLorme Topo North America 9.0. It provides an overview of the software's features and functions, including how to get maps onto a PN-Series GPS device, search for locations, customize map settings and preferences, use drawing tools, perform routing, connect a GPS device, and more. The guide also addresses frequently asked questions about installation, map use, GPS device support, and common tasks.
This document discusses apps, maps, and drones for forest landowners and managers. It provides an overview of mapping and logging apps that can be used with GPS receivers and drones for forestry applications like inventory, inspections, and mapping. Specific apps and hardware are highlighted, such as the 4Loads logging app and Trimble PG200 GPS. It also reviews the desktop mapping program Terrain Navigator Pro and current FAA regulations for commercial drone use.
The document provides an overview of how the Southern Illinois Invasive Species Strike Team (ISST) uses ESRI's Collector app to map ecological restoration efforts in the Shawnee National Forest. It describes how the ISST previously used a mapping system called WIMS and has since transitioned to using Collector in 2015. It outlines the features and functionality of Collector for collecting field data offline and syncing it to web maps. Key aspects covered include the geodatabase and attributes designed for the ISST's needs, preparing and publishing maps for use in Collector, and workflows for collecting, syncing, and exporting data and attachments.
40 min presentation to the Map Curators Workshop 2013 held in Hothorpe Hall. The presentation looks at how EDINA has used the knowledge fro running web based mapping services for 15 years to develop a new mobile mapping app. The focus is on "knowing your users" and ensuring that you fulfill their needs.
The document discusses various hardware components of a computer system including:
1. The central processing unit (CPU) which executes programs and manages other hardware. Multi-core processors have multiple processors to work on different programs faster than a single core.
2. Memory comes in different types for different purposes such as RAM for temporary storage and ROM to start the machine. Secondary storage like hard drives provide larger but slower storage.
3. Input devices such as keyboards, mice, and touchscreens allow input into the system. Output devices like monitors, printers, and speakers allow the system to produce output.
GIS educators often don’t get the opportunity to work on “real” research projects or gain day-to-day experience with geospatial technology. In order to stay on top of an ever-changing industry, sometimes they have to get creative. In this instructional, and hopefully entertaining demonstration, presenter Elizabeth Tulanowski will show how Collector for ArcGIS was used to capture her path around a racetrack, and how the data was processed to calculate lap time and speed. Data setup including schema design, and accuracy considerations will also be discussed.
The document is the user manual for Global Mapper software. It provides instructions on downloading and installing the software, registering for full access to features, and an overview of the program menus and tools. The File menu allows opening and importing data, loading workspaces, exporting data to various formats, and saving screenshots. The View and Tools menus control map display and analysis tools. Registration is required for advanced mapping, analysis, and exporting functions.
Geopaparazzi: Never Out of Data in the Field
The workshop is dedicated to professionals that needs to collect data from the field and use this information to update or create GIS data, but also to OpenStreetMappers as well as tourists that want to keep a geo-diary. Geopaparazzi is a mobile application for digital field mapping for Android devices developed to support the work of the technicians in the field offering a mapping environment with real time GPS position and a form for structured data collection. The application is easy to use, intuitive and provides just few important functionalities to be used in the field, as for example register GPS tracks and take georeferenced notes and pictures with the possibility to work also off line. The main features available in Geopaparazzi are: - taking georeferenced notes: texts, pictures, sketches and forms - logging GPS tracks - browsing and navigation of the maps and the available data - easy export of the collected data - simple preparation of custom background data. The map view shows the GPS position on the reference background data with the possibility to pan and zoom. From the map view it is possible to add and manage notes and bookmarks and measure distances. Notes and bookmarks can be added directly to the map either in the GPS position or in the center of the map. From a dedicated list view it is possible to visualize, zoom and edit each note. Background data can be personalized using available local data or on-line services with the possibility to use vector offline Mapsforge basemaps, Mbtiles offline databases, TMS (online and offline tiles) and WMS services. Geopaparazzi supports personalized complex forms with combo and check boxes, text fields (that can be constrained to number or string type), pictures (taken using the mobile internal camera) and sketches organized over multiple tabs. The workshop starts with an introduction of the application, installation and main features. Then a short section will be dedicated to the preparation of the input data: background maps and vector layers. Following these sections there is a practical testing of Geopaparazzi outdoor in the field. The last section, back in the room, is dedicated to the export of the collected data to be visualized or used in other GIS environments.
Aimed at touring cyclists. Looks at how to how to prepare a route and navigate during the ride, log your route and the hardware and software you will need. The examples use a iPhone, but most of the software is available for Android.
This document provides an overview of different storage devices and media. It discusses magnetic storage devices like hard drives, magnetic tapes, and optical media like CDs, DVDs, and Blu-Ray discs. It also covers solid state storage devices like USB flash drives and memory cards. For each type of storage device, it describes their uses, access methods, advantages, and disadvantages. The document aims to explain key concepts around storage to help with revision.
The document discusses appropriate use of mobile devices for GPS/GNSS mapping. It provides background on the evolution of mobile mapping from proprietary systems in the late 1990s to current iOS, Android and Windows devices. Key points discussed include deciding on appropriate use based on organizational needs, roles, location, workflows and budgets. Accuracy requirements differ depending on whether the role involves data generation versus data consumption. The document also discusses advantages and disadvantages of different platforms and factors to consider in choosing the best platforms.
This document discusses different types of storage devices, categorizing them as magnetic or optical. Magnetic storage devices include floppy disks, hard disks, and magnetic tape. Optical storage devices include CD-ROM, DVD-ROM, CD-R, and CD-RW. The document explains how data is stored on magnetic disks using polarized particles and on optical disks using pits and lands that reflect light differently. It provides details on formatting disks and the areas created, capacities of different devices, and speeds of CD-ROM and DVD drives.
This chapter discusses different types of computer storage devices and their characteristics. It covers dedicated, shared, and virtual devices, as well as sequential and direct access storage media like magnetic tapes, disks, optical discs, flash memory, and magneto-optical disks. The key aspects of each storage technology are described, including their read/write processes, data access times, storage capacities, and advantages/disadvantages for different uses.
Computer storage devices hold data permanently even when the computer is turned off. There are two main categories of storage devices: magnetic storage and optical storage. Magnetic storage uses magnetic media like hard drives, floppy disks, and tape to store data through magnetic encoding. Optical storage uses optical discs like CDs, DVDs, and Blu-ray discs to store data through making physical marks readable with laser light. Storage devices have evolved significantly over time to increase capacity and portability.
Memory forensics is a technique used in cyber investigations that allows analysts to capture the current state of a system's memory as an image file. This memory dump can then be analyzed offline to retrieve important artifacts like running processes, open network connections, and recently used files. It is useful because memory stores current system state information that may not be found through other forensic methods. Several challenges in memory forensics include ensuring the integrity of captured memory images and keeping analysis tools compatible with changing operating system structures.
The main goal of this presentation is how to do research in particular field of engineering. For an example this presentation describes design of Vehicle tracking and monitoring system. So how to do research in particular field by referring standard IEEE papers is described in this presentation.
Network Implementation and Support Lesson 09 Group Policy - Eric VanderburgEric Vanderburg
Group policy allows administrators to centrally manage settings and software installation across multiple computers and users. Group policy objects (GPOs) contain the group policy settings and are linked to sites, domains, or organizational units in Active Directory. GPOs include settings for security policies, software installation, folder redirection, and more. When a computer or user logs on, the applicable GPOs are downloaded and applied according to a precedence order. This allows administrators to consistently configure and manage entire networks and organizations through group policy.
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
This document discusses the preparation and planning for developing a proficiency test in digital forensics using a Greyp electric bicycle. It outlines the planned project phases including creating scenarios, making forensic copies, collecting and evaluating results, and creating and distributing the test. Preliminary analyses of the bicycle have been conducted using various forensic tools to identify and validate digital artifacts that could be used for the test. While work has faced delays due to COVID-19, initial results suggest there are sufficient artifacts across the bicycle and associated devices and cloud storage to form the basis of a useful proficiency test.
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...Damir Delija
Sažetak - U ovom radu razmatramo načine kontinuiranog uvođenje novih sadržaja u predmete s područja kibernetičke sigurnosti. Kao primjer navodimo „Osnove računalne forenzike“ u koji se novi sadržaji uvode korištenjem studentskih praktičnih i teoretskih radova, ideje za radove predlažu studenti i predavači. Predloženi postupak se sastoji iz testiranja kroz studentski rad, te ugradnje rezultata u nastavne materijale. Da bi se studentski rad uspješno koristio mora zadovoljiti niz zahtjeva: prilagođenost stupnju znanja studenta i raspoloživoj opremi, raspoloživost alata i sustava, jednostavna implementacija i prenosivost, upotreba alata otvorenog koda i slobodnih alata, te minimalna cijena.
Remote forensics involves acquiring digital evidence from remote devices or locations without physical access. It includes applications like electronic discovery, incident response, network forensics, and cloud forensics. While often understood as live forensics, remote forensics also includes techniques like booting devices into forensic modes remotely or using forensic tools on remote systems to access local evidence. Enterprise-level remote forensic tools allow preventative forensics and faster incident response but are not widely used due to budget, knowledge, and legal barriers. As technology spreads and more data is stored remotely, remote forensics will become more important and perhaps even fully automated for Internet of Things devices in the future.
The document discusses EnCase Direct Network Preview, which allows an examiner to access and examine data on a powered-on computer remotely. It involves generating encryption key pairs, creating a direct servlet file using the public key, deploying the servlet on the target computer, and then connecting from the examiner's EnCase interface by providing the IP address and port. This enables viewing and analyzing the contents of drives, removable media, and memory on the live remote system without needing authentication files or passphrases if disks are encrypted.
Draft current state of digital forensic and data science Damir Delija
In this presentation we will introduce current state of digital forensics, its positioning in general IT security and relations with data science and data analyses. Many strong links exist among this technical and scientific fields, usually this links are not taken into consideration. For data owners, forensic researchers and investigators this connections and data views presents additional hidden values.
This document discusses reasons for disliking digital forensics and identifies areas for improvement. It begins by introducing the author's background and motivation. The document then examines issues with naming conventions, tools/practices, standards/definitions, training/certification, and subfields. Key problems highlighted include a lack of standardization, compatibility issues between tools, outdated mindsets, and insufficient computing foundations in training. The author advocates treating digital forensics as an engineering science and applying best computing practices. Overall, the document critically analyzes challenges currently facing the field and questions how these issues may impact the future if not addressed.
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
The document provides an overview of the deep web and digital investigations. It defines the deep web as data that is inaccessible to regular search engines but exists on the internet. This includes dynamically generated web pages, private websites requiring login, and files accessible only through direct filesystem access. The document estimates the deep web is 400-550 times larger than the surface web that is indexed by search engines. Standard digital forensic procedures can be applied to investigate the deep web, but tools may need to be adapted to handle specialized browsers and access methods used to retrieve deep web resources.
Datafoucs 2014 on line digital forensic investigations damir delija 2Damir Delija
This document discusses how to conduct on-line digital forensic investigations using EnCase Enterprise v7. It describes the key EnCase Enterprise components that enable forensically sound and secure network investigations, including the SAFE for authentication, the Examiner for examinations, and Servlets installed on remote machines. It provides steps for creating a new case, adding target nodes, conducting live previews and analyses of remote disks and RAM, and performing automated sweeps to collect files and system information from multiple machines using snapshot, file processing, and system info modules. The document emphasizes the importance of planning, monitoring sweeps, and documenting results.
The document provides an overview of the basic steps for conducting an ediscovery collection using Guidance Software's EnCase Enterprise v7. It describes installing the required EnCase Enterprise components like the SAFE, Examiner and Servlets. It then outlines how to open a new case, define the target nodes, create a collection sweep to retrieve files and metadata based on conditions, and handle the sweep results. The summary provides the essential workflow and technical components involved in performing a foundational EnCase Enterprise collection.
The document discusses how to process scanned documents in EnCase forensic software. It outlines that paper evidence needs to be converted to a digital format that forensic software can analyze. This involves scanning paper documents to create image files, then using optical character recognition (OCR) to convert those images into text files that can be indexed and searched in forensic software like EnCase. It stresses the importance of keeping the entire process forensically sound by not altering the original evidence, documenting all tools and files used, and considering metadata changes.
The document discusses using forensic preview, triage, and collection techniques with the TD3 device. It explores using these processes to complement full drive collection. Preview allows determining if a volume contains evidence, triage prioritizes investigation by reviewing data quickly, and collection fully images storage if enough evidence is found. The document outlines using the TD3 over iSCSI to remotely access storage in a forensically sound way for these processes. This enables fast review and triage to reduce data volume and close cases more efficiently. Hands-on with these techniques will be demonstrated using EnCase tools connected remotely to the TD3 during the training.
This document discusses the digital forensic tool EnCase Forensic. It provides an overview of EnCase and its features, including that it is a leading forensic tool accepted in courts. The document then outlines a scenario where EnCase will be used to conduct a forensic investigation based on a search warrant. The remainder of the document walks through the key functions and screens of EnCase like adding disk images, searching for evidence, tagging evidence, and reporting while conducting the outlined forensic investigation scenario.
Usage aspects techniques for enterprise forensics data analytics toolsDamir Delija
This document discusses techniques for accessing and analyzing data from enterprise forensic tools using external data analytics tools. It provides an example using the forensic tools EnCase v7 and FTK to collect disk images, memory images, and system snapshots from endpoints. While these tools store useful data, it can be difficult to extract and analyze. The document demonstrates connecting an EnCase database to an external analytics tool to allow easier viewing and analysis of process and network data across multiple snapshots. This approach could integrate forensic data with security tools like SIEM for more automated incident response.
This document discusses adding artificial intelligence capabilities to workload managers like IBM's AIX Work Load Manager (WLM) to help address system performance problems. It proposes using monitoring data and fuzzy logic rules to detect issues, identify problematic processes, and dynamically reschedule processes to prioritize important services. Existing system instrumentation and soft computing tools could be integrated with Perl to implement this. However, these ideas are theoretical and soft computing approaches are not widely known or accepted. The goal is to give workload managers more "brains" to autonomously address performance problems based on gathered data and expert knowledge encoded as fuzzy rules.
This document provides an example of how to configure workload management (WLM) classes on an AIX system based on business priorities for a banking workload. It describes setting up WLM classes mapped to different business processes and database instances, with rules for static and dynamic classification of processes into the classes. Processes are classified into classes like "biz_critical", "biz_important", and "biz_regular" based on their importance to the business, and resources are prioritized accordingly.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
2. What we will talk about
• GPS
– how to acquire evidence
– where we can find GPS (device or just functionality)
• What we can find on a GPS
– What tools and procedures to use ?
• Examples in EnCase: Magellan, TomTom, Exif
data ..
– examples slides are here as help/idea for practitioners
Page 2
3. Sources
• Materials are compilation of various sources
– Celebrite “Portable GPS Forensic”
http://www.cellebrite.com/gps.html
– “GPS Device Acquisition and Examination”, CEIC
2012 by Nathen Langfeldt, Guidance Software, Inc
– “Forenzika GPS uređaja”, Filip
Baričevid, DATAFOCUS 2012
GPS Device Acquisition and Examination Page 3
4. GPS
• GPS -Global Positioning System
• http://en.wikipedia.org/wiki/Global_Positioni
ng_System
• Not only GPS, but other systems
Russia, China, India, EU ..
Page 4
5. GPS embedded in another device
• Mobiles / smartphones
• Tablets – PC’s
• car, robots (?)
• Usually direct connection to Internet and live
map access
Page 5
6. GPS standalone devices
• Garmin
• Magellan
• MIO
• TomTom
• Maps are prepared and sold by vendor
• Maybe small vendors will go extinct
7. Forensic tools and GPS
• Today all commercial tool have support GPS data
extraction, level can vary, depends on model,
encryption...
• Idea is to get out geolocation data and put in on the
map, also and all other available data from device
– location data can be obtained from other sources too
• There is a BIG difference among mobile device forensic
tools and general purpose forensic tools
Page 7
8. Forensic Tool Examples
• EnCase - general purpose forensic tool
– support for geolocation data extracted from evidence as part of smartphone support
module
– support for standalone device as disk image and enscripts to extract data
• UFED ultimate / UFED physical analyzer - mobile device forensic tool
– support only for geolocation data extracted from evidence as part of smartphone
support (some magic can be done too)
– support for standalone device but in a way as mobile phones or smartphones
– support for encrypted logs and data on some standalone devices (tom-tom)
– python scripts for additional processing
• It is almost impossible to mix results of both tools ....
– it takes a lot of effort
– there is no standardization (like E01 format in traditional digital forensic)
Page 8
9. GPS information
1. travel path
2. trackpoints (coordinates)
3. waypoints (coordinates and names)
4. route (list of waypoint)
5. saved locations
6. video, pictures
7. all other available data from device related to
locations / positions
Page 9
10. Example Tom-Tom data
• *.cfg – locations.
• ttgo.bif, ttnavigator.bif –
general info on
device, S/N, model ...
• password (encrypted)
• settings.dat – IDs, user data
...
• triplog files – encrypted files
– user route data
Page 10
11. GPS seizure
• Device seizure is the first step and can be difficult
• These devices send and receive signals when
powered on – precautions need to be taken
• How do you stop a GPS from updating its location?
− If possible, a Faraday bag
• What if a Faraday bag is not available???
• Once the device is protected, what next?
• Page 11
Page 11
12. What is needed for acquisition
• Once the device has been seized, the next
logical step is to acquire the device.
• The following is a list of tools that could be
important:
• USB cable to connect the device to an
acquisition machine/tool
• Faraday bag (as mentioned previously)
• write blocker (either software or hardware
will be acceptable)
• Card reader (optional)
Page 12
Page 12
13. Examples
• ENCase details in CEIC 2012 “GPS Device
Acquisition and Examination”
– EnCase and Garmin
– EnCase and TomTom
– Encase and Magellan
– Encase and Exif data
Master Title Page 13
Page 13
14. EnCase and TomTom/Garmin
• Encase can acquire Garmin and TomTom GPS devices
trough the use of a write-block device
Note:
• If a media card is in use by the
GPS device, the card must be
removed and imaged separately.
If it is not removed, the media
card may be the only thing that
shows up during a preview
Page 14
Page 14
15. EnCase and Magellan
• Similarly to Garmin or TomTom, acquisition of a
Magellan GPS device can be accomplished by
using a write-block device and a forensic
acquisition tool (EnCase)
• Some Magellan's may not be imaged in this
fashion
• The only solution may be to use a backup of the
device on a media card supported by the device
• Or to use another tool like UFED .
Page 15
Page 15
16. Garmin device examination through EnCase
More can be done for Garmin .gpx...
• Aside from viewing the .gpx file within EnCase or an XML
browser, the file can be viewed in Google Earth.
• This can be accomplished one of two ways:
− Bring the .gpx file out of EnCase
and use a website to convert the
file to KML
− This site is used for the
conversion:
http://www.gpsvisualizer.com/map_input?form=googleearth
Page 16
Page 16
18. EnCase Garmin examination
• Click the “create KML”
button
• A new page will be loaded
• The KML file can then be
downloaded
Page 18
Page 18
19. EnCase Garmin examination
• With the KML file
brought into Google
Earth, we can begin
the examination.
• When it is brought
in, the data will show
up under Temporary
Places.
Page 19
Page 19
20. EnCase Garmin examination
• The data is broken down into two main pieces:
− Waypoints
− Tracks
• Waypoints contains data like address book entries
• Tracks can contain data from recent routes that were
traveled
Page 20
Page 20
22. EnCase Garmin examination
• The other option is to bring the KML
file straight into Google Earth
• If this option is used, you will be
presented with three options.
• “Create KML LineStrings” is
unchecked by default
− It is recommended
that this be
checked
Page 22
Page 22
23. EnCase Garmin examination
• In summary, Garmin GPS devices are
super easy to examine and can be the
most fruitful
• The data is easy to access and should
not be overlooked
• Some upcoming challenges:
− Who uses a portable GPS device?
− Garmin now has multiple apps
available for download
Page 23
Page 23
24. EnCase TomTom examination
• TomTom GPS devices have been
around for some time and are
widely used
• The examination of these devices
is a bit different
• TomTom GPS devices can in some
ways store more info than Garmin
Page 24
Page 24
25. EnCase TomTom examination
• With TomTom GPS devices, a few
files will be of interest to us
• To start, we can look at the
CurrentMap.dat
• In this example the file is sitting
at the root of the device
• This will give the name of the
map that is currently in use
• As you can see in the
example, “North_America_2GB”
is the name of the map being
used Page 25
Page 25
26. EnCase TomTom examination
• In summary, TomTom GPS can be examined
through the use of an EnScript module or
third-party tools
• If trip logs are present, a request could be
made to TomTom in an attempt to get the
logs decrypted (or trough UFED tools)
• Some upcoming challenges:
− Who uses a portable
GPS device?
− TomTom now has
multiple apps available
for download
Page 26
Page 26
27. EnCase Magellan examination
• Magellan devices can be more difficult in
part because of the the acquisition
process
• Some Magellan devices may not be able
to be acquired at the physical level
• In those cases it might be possible to
create a backup through the device
directly to an SD card
• The SD card containing the backup can
then be acquired
Page 27
Page 27
28. EnCase Magellan examination
• In summary, Magellan GPS devices are
the most difficult to examine due to the
limited information available
• Though third-party tools are
available, their ability to parse data may
be limited by the actual models
supported
• Some upcoming challenges:
− Who uses a portable
GPS device?
− Magellan now has
multiple apps
available for
download
Page 28
Page 28
29. Examination of EXIF GPS Data
• The examination of EXIF GPS
can be made simple
• This data can be extracted
and made invaluable through
the use of various third-party
tools or an EnScript program
• The “Exif GPS Information
Reader” EnScript module will
be used here
The images used here were taken with a BlackBerry
Page 29
Page 29
30. Examination of EXIF GPS Data
• The exported KML file can
be viewed in Google Earth
Page 30
Page 30
31. Conclusion ?
• It is wild area
• in developement, new models, new features,
encryption, applications od devices
• legal issuses
• a lot to learn
Master Title Page 31
Page 31