Skip navigation

Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim

Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

[thumbnail of Publisher VoR]
Preview
PDF (Publisher VoR)
43047_LAWAL_Facilitating_a_cyber_enabled_fraud_using_the_omg_cable_to_incriminate_the_victim.pdf - Published Version
Available under License Creative Commons Attribution.

Download (245kB) | Preview

Abstract

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger is used in an unauthorised way, to alter the content of a file (an accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behaviour during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorised changes made by a programmable device.

Item Type: Article
Uncontrolled Keywords: O.MG Cable; programmable USB; file tampering attack; digital evidence credibility; miscarriage of justice; cyber fraud
Subjects: K Law > K Law (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > Internet of Things and Security Research Centre (ISEC)
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Liberal Arts & Sciences
Faculty of Liberal Arts & Sciences > School of Law & Criminology (LAC)
Last Modified: 26 Jun 2023 10:43
URI: http://gala.gre.ac.uk/id/eprint/43047

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics