Smart phone and mobile phone risks

2,907 views
2,856 views

Published on

Your mobile knows a lot about you and that brings a number of business risks – security breaches from company data held in emails or business apps, for example. We highlight the data and security risks of the phone in your pocket. -
See more at: http://www.grant-thornton.co.uk/en/Thinking/Beware-the-secrets-held-in-your-smartphone-/?previouspage=7260

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,907
On SlideShare
0
From Embeds
0
Number of Embeds
1,228
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Smart phone and mobile phone risks

  1. 1. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Smarter Than You Think - a look at the evidence available from smart phones and mobile devices 26 June 2013
  2. 2. Agenda • Introduction • Range of mobile devices available • Types of data • Case studies • GPS and Geotagging
  3. 3. Agenda • Mobile Apps • The future of mobile devices • Relationship with other digital disciplines • Questions? • Recent press articles
  4. 4. Introduction
  5. 5. Mobile Devices • Embedded and reliant on mobile devices in our everyday lives – work, personal and leisure. • Mobile devices often overlooked as a source of potential evidence - awareness level for police constabularies and criminal investigations. • Individuals often unaware of hidden data stored! • Example – Audience participation with BlackBerry devices – Event Log
  6. 6. How else are mobile devices used?
  7. 7. Mobile Devices - Popularity • Research Firm Gartner – Suggest PC's are on the decline • Not a dip caused by squeeze on household incomes • 1.9 billion mobile devices to be sold in 2013, where 1 billion estimated will be smart phones • Social media access – Twitter feeds embedded into Bloomberg terminals at traders desks. Goes against the grain for reluctance of firms to allow access
  8. 8. Manufacturers all have different OS causing complicating forensic investigations
  9. 9. Why Mobile Device Investigations • Criminal & civil law examples - murder, sexual assault, violent crime, burglary, intent – sabotage and collusion, illicit images of children, financial fraud, commercial espionage, money laundering, and HR related issues. • Examinations need to be forensically sound to stand up in court with robust procedures (ACPO guidelines). • Recovery of deleted data. • Recovery of data from damaged mobile devices.
  10. 10. © 2013 Grant Thornton UK LLP. All rights reserved. • SIM cards • Mobile Phone • Memory Card • USB dongle • Tablets • Watch phone Range of mobile devices & components
  11. 11. Why Mobile Device Investigations • SIM cards – Subscriber data used to obtain billing records, contacts, call data, text messages. • Handset – Typically contacts, call logs, SMS text messages, MMS, emails, Internet history, Social Media, WiFi, Bluetooth, App data, Media (photos, videos and audio), voicemails (selected smart phones only), organiser information, eDocs, metadata and custom dictionary. • Memory cards – Typically media and backup of phone data
  12. 12. Types of Data User created
  13. 13. Computer versus the Smart Phone – Any difference?
  14. 14. Case Studies
  15. 15. Examples • Counterfeit and money laundering case – Suspect unhelpful in investigation and unwilling to provide handset code to device. • Commercial espionage – Individual hid data on memory card under phone casing. • Intelligence – Individual identified with fake passport at airport. Handset examined to assist in identity.
  16. 16. GPS and Geotagging
  17. 17. Definitions and Problems • Global Positioning System (GPS) – activated on handset to locate geographical position. • Geotagging – adding metadata to media file. • How accurate especially in large cities? • Security issues – giving away location? • Social media issues – privacy and public domain? • False GPS co-ordinates can be generated by user. • Geotags can be edited to give false information.
  18. 18. How easy is it?
  19. 19. Hypothetical Situations? • Possible to frame innocent parties eg loading edited photo with fake co-ordinates to unsecured phone or website and tip off police. • Uploading of images to smart phone by military personnel – subsequently transferred to social media site. Potentially giving enemy access to location.
  20. 20. Applications (Apps)
  21. 21. What is an App? • An "App" is an application - software designed to run on a mobile device with limited function. • Shortcut to popular web based sites eg email. • 50 Billion Apps have been downloaded from the Apple store alone. • Equates to 7 apps per person on the planet. • 800 Apps per second are downloaded from Apple. • Data can be forensically retrieved from some Apps –but not all, due to the vast array encountered.
  22. 22. What information is held? - Emails - Location - Social Media - Personal information - Degrees of contact - Web-based data
  23. 23. Security Apps – problems for the investigator? Applications securing transmission of data to and from the handset
  24. 24. The Future…..
  25. 25. Near Field Communication (NFC) – 4G handsets
  26. 26. Google Glasses How will data be able to be extracted and forensically obtained? Types of Data – GPS, pairing with mobile devices, microphone, facial recognition?
  27. 27. Relationship with Computer Forensics and eDisclosure
  28. 28. Computer Forensics - Mobile devices synchronised with other electronic devices - Even without a physical mobile device, backups can exist on PC's for examination - Cloud based services
  29. 29. © 2013 Grant Thornton UK LLP. All rights reserved. eDisclosure Trends • Increasing use of social media • Proactive information management • Ever increasing volumes of data • Further disparate sources of data • Thousands of emails can be extracted from smart phones – easy method to screen data via eDisclosure review platforms
  30. 30. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Any Questions?
  31. 31. UK Newspaper Articles Examples of mobile devices and their evidential use
  32. 32. Mobile Devices in the News – Extracts from the UK Press
  33. 33. Mobile Devices in the News
  34. 34. Mobile Devices in the News
  35. 35. Mobile Devices in the News
  36. 36. Mobile Devices in the News
  37. 37. Mobile Devices in the News
  38. 38. Mobile Devices in the News
  39. 39. Mobile Devices in the News
  40. 40. Mobile Devices in the News
  41. 41. Mobile Devices in the News
  42. 42. Mobile Devices in the News
  43. 43. Mobile Devices in the News
  44. 44. Mobile Devices in the News
  45. 45. © 2013 Grant Thornton UK LLP. All rights reserved. Contact Chris Clements Partner and Head of UK Regions Forensic & Investigation Services +44 (0) 7968 33 88 95 chris.m.clements@uk.gt.com Bruce Keeble Executive Forensic & Investigation Services +44 (0)7891 433 223 bruce.h.keeble@uk.gt.com

×