Forensic Analysis of Fitbit Versa 2 Data on Android

The increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an individual. Wearable fitness device...

Full description

Bibliographic Details
Main Authors: Yung Han Yoon, Umit Karabiyik
Format: Article
Language:English
Published: MDPI AG 2020-09-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/9/1431
_version_ 1797554789661278208
author Yung Han Yoon
Umit Karabiyik
author_facet Yung Han Yoon
Umit Karabiyik
author_sort Yung Han Yoon
collection DOAJ
description The increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an individual. Wearable fitness devices are constantly being released by companies, with new firmware created for each iteration. As technology developers, research and law enforcement must keep pace to take advantage of data that can be used in investigations. The Fitbit line of devices is a popular brand of wearable trackers. This study will investigate what artifacts are generated by the new Fitbit Versa 2 by investigating what data are generated and stored on the smartphone app component of the new device. The artifacts discovered will be related to areas of forensic interest that are relevant to a law enforcement officer or digital forensics practitioner. Previous research and their methodologies used for application and mobile forensics will be used to conduct this research. This study finds the Fitbit Versa 2, and by extension, the Fitbit smartphone application does not store social media message notifications pushed to the tracker by the user’s mobile device. Some credit card information, health-related data, such as heart rate, GPS locations, and other potentially identifying data were found in plaintext. While the exposed data is not enough on its own to pose an immediate serious issue, it can be used as leverage to phish a user for further details.
first_indexed 2024-03-10T16:38:04Z
format Article
id doaj.art-a6e2a41c2aa2481fa2cac0b798a764b0
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T16:38:04Z
publishDate 2020-09-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-a6e2a41c2aa2481fa2cac0b798a764b02023-11-20T12:19:30ZengMDPI AGElectronics2079-92922020-09-0199143110.3390/electronics9091431Forensic Analysis of Fitbit Versa 2 Data on AndroidYung Han Yoon0Umit Karabiyik1Department of Computer and Information Technology, Purdue University, West Lafayette, IN 47907, USADepartment of Computer and Information Technology, Purdue University, West Lafayette, IN 47907, USAThe increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an individual. Wearable fitness devices are constantly being released by companies, with new firmware created for each iteration. As technology developers, research and law enforcement must keep pace to take advantage of data that can be used in investigations. The Fitbit line of devices is a popular brand of wearable trackers. This study will investigate what artifacts are generated by the new Fitbit Versa 2 by investigating what data are generated and stored on the smartphone app component of the new device. The artifacts discovered will be related to areas of forensic interest that are relevant to a law enforcement officer or digital forensics practitioner. Previous research and their methodologies used for application and mobile forensics will be used to conduct this research. This study finds the Fitbit Versa 2, and by extension, the Fitbit smartphone application does not store social media message notifications pushed to the tracker by the user’s mobile device. Some credit card information, health-related data, such as heart rate, GPS locations, and other potentially identifying data were found in plaintext. While the exposed data is not enough on its own to pose an immediate serious issue, it can be used as leverage to phish a user for further details.https://www.mdpi.com/2079-9292/9/9/1431data privacydigital forensicsinternet of thingsmobile forensicssecuritywearable
spellingShingle Yung Han Yoon
Umit Karabiyik
Forensic Analysis of Fitbit Versa 2 Data on Android
Electronics
data privacy
digital forensics
internet of things
mobile forensics
security
wearable
title Forensic Analysis of Fitbit Versa 2 Data on Android
title_full Forensic Analysis of Fitbit Versa 2 Data on Android
title_fullStr Forensic Analysis of Fitbit Versa 2 Data on Android
title_full_unstemmed Forensic Analysis of Fitbit Versa 2 Data on Android
title_short Forensic Analysis of Fitbit Versa 2 Data on Android
title_sort forensic analysis of fitbit versa 2 data on android
topic data privacy
digital forensics
internet of things
mobile forensics
security
wearable
url https://www.mdpi.com/2079-9292/9/9/1431
work_keys_str_mv AT yunghanyoon forensicanalysisoffitbitversa2dataonandroid
AT umitkarabiyik forensicanalysisoffitbitversa2dataonandroid