Live Forensics on GPS inactive Smartphone

Nuril Anwar, Murein Miksa Mardhia, Luthfi Ryanto


Google is known to still track the user's location despite the GPS settings and location history in smartphone settings has been turned off by the user. This requires special handling to prove the location on smartphones with inactive GPS and view its Location History previously used by user. The research investigates if Google is still recording its user data location. Live Forensic requires data from the running system or volatile data which is usually found in Random Access Memory (RAM) or transit on the network. Investigations are carried out using a Google account with a method used by live forensics to obtain results from the location history. Smartphones have been checked manually through data backup through custom recovery that has been installed. When checking the backup filesystem, turned out that no location data is stored. Therefore, researchers conducted an analysis on the Google Account which was analyzed using a forensic tool to analyze cloud services to obtain location data results. The results of the analysis carried out obtained a similarity in location from 8-days investigations. Google can still find the location of smartphones with GPS disabled, but the location results are not accurate. Google can store user location data via cellular networks, Wi-Fi, and sensors to help estimate the user's location. The process of extracting the results from the google maps log using a Google account will be analyzed using the Elcomsoft Cloud eXplorer and Oxygen Forensic Cloud Extractor so that the log location results are still available by Google.


Live; Forensic; GPS; MyActivity Google; Mobile Forensic; Smartphone

Full Text:



Alfeno, S., Eka, R. and Devi, C. (2017) ‘Implementasi Global Positioning System ( GPS ) dan Location Based Service ( LSB ) pada Sistem Informasi Kereta Api untuk Wilayah Jabodetabek’, Sisfotek Global, 7(2), p. 29.

Berber, F. S. (2018) ‘Mapping location of a suspect by using forensic images taken with their own mobile phone’, pp. 93–96.

Bintang, Rauhulloh Ayatulloh Khomeini Noor, Rusydi Umar, and Umar Yudhana. 2018. “Perancangan Perbandingan Live Forensics Pada Keamanan Media Sosial Instagram, Facebook Dan Twitter Di Windows 10.” Prosiding SNST Ke-9 Tahun 2018 Fakultas Teknik Universitas Wahid Hasyim 125–28.

Budiman, E. (2016) ‘Pemanfaatan Teknologi Location Based Service Dalam Pengembangan Aplikasi Profil Kampus Universitas Mulawarman Berbasis Mobile’, ILKOM Jurnal Ilmiah, 8(3), pp. 137–144. doi: 10.33096/ilkom.v8i3.81.137-144.

Ervina, A. (2018) ‘Cara “Melarikan Diri” dari Pengintaian Google’, CNN Indonesia. Available at:

Moore, J., Baggili, I. and Breitinger, F. (2017) ‘Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP The Open Source, Modular, Extensible Parser’, Journal of Digital Forensics, Security & Law, 12(1), p. 15

Rindiatmodjo, B., Megantara, F. and Pratama, M. I. (no date) ‘Pelacakan Keberadaan Ponsel Berbasis Android dengan Menggunakan Teknologi Short Message Service ( SMS ) dan Global Positioning System (GPS)’, pp. 1–9.

Sack, S., Kröger, K. and Creutzburg, R. (2013) ‘Location tracking forensics on mobile devices’, Proceedings of SPIE - The International Society for Optical Engineering, 8667(0), p. 866712. doi: 10.1117/12.2003952.

Sah, A., Riadi, I. and Prayudi, Y. (2018) ‘Deteksi Bukti Digital Online Gambling Menggunakan Live Forensik pada Smartphone Berbasis Android’, CyberSecurity dan Forensik Digital, 1(1), pp. 14–19.

Sansurooah, K. and Keane, B. (2015) ‘The spy in your pocket : Smartphones and geo- location data’, 2015, pp. 95–103. doi: 10.4225/75/57b3fb68fb88e.

Sukriadi and Prayudi, Y. (2014) ‘Analisis Bukti Digital Global Positioning System (GPS) Pada Smartphone Android’, Kns&I Stikom, (11). doi: 10.13140/2.1.2831.6809.

Williams, E., Yerby, J. and Williams, B. (2019) ‘Google and Facebook Data Retention and Location Tracking through Forensic Cloud Analysis’. Available at:

Zhang, H., She, D. and Qian, Z. (2015) ‘Android Root and Its Providers: A Double-Edged Sword’, Proc. of ACM CCS, pp. 1093–1104. doi: 10.1145/2810103.2813714.

Zhang, Z. et al. (2014) ‘Once root always a threat: Analyzing the security threats of android permission system’, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8544 LNCS(2013), pp. 354–369. doi: 10.1007/978-3-319-08344-5_23.



  • There are currently no refbacks.

Copyright (c) 2021 Nuril Anwar, Murein Miksa Mardhia, Luthfi Ryanto

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Mobile and Forensics (MF)

ISSN Online: 2714-6685 | Print: 2656-6257
Organized by Department of Magister Teknik Informatika
Published by Universitas Ahmad Dahlan 
Website : 
Email 1 :
Email 2 :

View My Stats