SlideShare a Scribd company logo
1 of 8
Download to read offline
Criminal investigations today increasingly have one thing in common – mobile data evidence. As
a result, mobile forensics capabilities have been thrust into the spotlight, along with the ongoing,
dynamic challenges the industry now faces. Rapidly evolving mobile device technology, stronger device
and application encryption methods, and warehouses of data both collected and generated daily,
represents significant implications for not only forensics examiners in the lab, but increasingly, first
responders and investigators in the field. When a crime occurs, time is the enemy. The faster mobile
device data can be extracted, analyzed and acted upon, the faster criminals can be taken off the street,
cases successfully prosecuted and public confidence restored.
Mobile Forensics:
A Look Ahead
Cellebrite Customers Predict Mobile Device Backlogs,
New Data Sources and Legal Issues will Top 2015 Challenges
Cellebrite Predictions Survey 2015
Critical Evidence Now Mobile
In 2013, Messaging and social
app use Tripled
Americans used smartphone
and tablet apps more than
PCs to access the Internet
last month
the first time that has ever
happened.
Sources 1 CNN Money, 2 Flurry Analytics
2
1
2
We recognize that mobile device evidence has
reached a tipping point; growing rapidly in both
importance and volume. Our customers are at the
forefront of this shifting landscape. So we asked
them how they will address the challenges that
mobile data evidence now presents, along with
the tools, processes and training that will allow
them to successfully navigate it in the future. In
Q4 of 2014, 728 law enforcement and corporate
customers provided insights on the challenges
and trends they believe will influence mobile data
forensics in the year ahead. Hands down, nearly
all respondents (95%) report that mobile devices
are the most significant data source in their
investigations today – a trend that shows no sign
of slowing.
The new digital goldmine in investigations
The Data Sources
that Matter Most
95%
59%
45%
32%
Mobile Device
itself
Third-party Apps
Wireless/Cellular
Providers
Cloud Providers
of respondents consider
Mobile Devices
their most significant
data source
95%
3
Backlogs also bring a host of hidden costs and related
issues with them, including overtime for examiners or
the need for outsourcing – both introducing potential
errors in evidence processing and interpretation.
But they also pose more troublesome risks such as
cases going unsolved and suspects receiving lesser
sentences than they actually deserve. Nearly 29
percent of respondents indicated they have plans to
purchase additional forensic tools and expand their
labs to deal with device backlogs. Additionally, almost
60 percent identified a need for first-responder or
field personnel to preview or triage mobile device
evidence before it’s transferred to the lab.
Device backlogs of any size or length mean valuable
data evidence lays in wait. The sooner examiners and
investigators can extract and analyze it, the faster
crimes can be prevented or solved. Respondents
indicated they were open to new mobile forensic
solutions that support multi-tier workflows and tools
that extend simple data triage capability to field
personnel as needed.
With the growing importance of mobile device data to
investigations, backlogs of any duration – even days
or weeks – can jeopardize the length and outcome
of criminal cases. Nearly 80 percent of respondents
reported experiencing some level of device backlog in
the last year, with 44 percent experiencing backlogs
of 1 to 12+ months. This issue appears to be the most
Backlogs Challenging Timely Device Processing
problematic for federal and national law enforcement
respondents (54 percent) and state/provincial/county/
local law enforcement agencies (45 percent). For
those experiencing device backlogs, 68 percent rated
it from somewhat to a very significant challenge. In
the private sector, one-third of respondents reported
little to no backlogs.
The Hidden Costs of Backlogs
of respondents report some level
of device backlog in the last year;
of those lasting 1 to 12+ months
Device Backlogs Building
Nearly
80% 44%
Examiner overtime
Outsourcing device examinations
Risks associated with errors in
evidence processing, interpretation
Cases going unsolved or suspects
receiving lesser sentences
4
A Deluge of New Data Sources Require New Tools, Analytics
It’s not surprising that mobile devices remain the most valuable data source in investigations when you consider
the amount of user-data generated by social networks and messaging applications. For forensic examiners,
accessing that data comes with a host of growing challenges. Both device and application encryption is a big
one, cited by 85 percent of our customers. Another one? The amount of data that is now stored off the device
and in the cloud. This was projected as one of the industry’s most significant issues in the coming year by nearly
60 percent of respondents. Accessing data from third-party applications (60 percent) and wireless or cellular
carriers (45 percent) also remain ongoing challenges. Corporate respondents also place great value on mobile
device, third-party and cloud data in roughly the same proportions as law enforcement.
What do all these new data sources have in
common? They add critical time to what has already
become a complicated and lengthy investigative
workflow. Serving legal process on both cloud and
wireless/cellular providers carries with it additional
complexity due to resistance in the name of privacy,
the requirement to notify customers, lengthy legal
processes, etc. And with increasing number of
crimes extending across borders, the international
mutual legal assistance treaty (MLAT) for providers
in countries other than the investigator’s own can
add months on top of that. It’s not surprising then,
that more than 72 percent of respondents found this
aspect of investigations to be either somewhat (43
percent) or a significant challenge (29 percent).
Top Three Mobile Data Forensics Challenges
85% 60% 41%
Device and Application
Encryption
Amount of Data Stored
off the Device and
in the Cloud
Aggregating and
Analyzing Big Data
5
All the data in the world is only as valuable as the analytics used to make it actionable. Having the ability to
quickly visualize key connections – the bigger picture – helps investigators speed investigations, something that
approximately 83 percent of respondents deem somewhat to very important. In our survey, respondents also
rated text/content, image and geolocation analytics highly for the cases they work (92 percent, 82 percent and
70 percent respectively). Time delays – due to backlogs or process red tape – are the enemy of digital forensic
investigations. The findings above underscore the importance of having access to key data mobile data quickly,
along with the analytics and workflows to make it actionable in the lab and in the field.
Analytics Make Data Actionable
Strategically social
Law enforcement professionals
actively use social media as a
tool in their investigations3
use it on a daily basis
8 out of every 10
We live in an age of social media, where networks like Facebook and LinkedIn map our connections,
track our locations and use that knowledge to shape our preferences and behavior. According to the
International Association of Chiefs of Police (IACP), 86.1 percent of agencies surveyed in 2013 leverage
social media for criminal investigations.
92%
83%
82%
70%
25%
text/content
connections
IMAGE/VIDEO
GEOLOCATION
92% rate text/content analytics as important
83% find the ability to visualize key connections quickly
somewhat to very important
82% cite image analytics as important
70% rate geolocation analytics as important
Source 3 LexisNexis 2014
6
You don’t need to look further than the latest news
to see the impact of mobile data on data forensics
investigations and criminal proceedings, as well as
the associated challenges of legal access and privacy.
Our survey findings suggest that law enforcement
agencies and enterprises are not entirely clear on if,
or how, their standard operating procedures will be
impacted by ongoing legal precedent. They are, how-
ever, monitoring the landscape closely.
The majority of survey respondents has received
training on both legal and technical topics related to
mobile forensics. All respondents recognize the need
for ongoing training to both perform mobile forensic
examinations and testify about them in court. With
the proper processes, tools and training, all organiza-
tions can help guarantee that the search, seizure and
extraction of mobile evidence is done in accordance
with the law.
For forensic examiners, training is not a nice to have,
but a necessity that ensures job competency. The cost
of training should always be weighed against the po-
tential cost of not training; the limited ability to access
and analyze mobile device data, the impact on inves-
tigations of not having evidence readily available and
the potential outcomes of putting untrained forensic
examiners on the stand in court.
Training Prepares Examiners for What Comes Next
Training not just a nice to have, but a
critical necessity ensuring job competency
of respondents have received training
75%
7
The implications of mobile device data on the digital
forensics industry are difficult to ignore. It remains
our customers’ most important data source in the
fight against crime. To harness its power, global public
safety agencies and enterprises need effective, legally
sound ways to manage the growing complexity and
volume this data now represents. Call logs, social
media posts and texts can help establish the critical
connections officers, investigators and prosecutors
need to act quickly; determine innocence or guilt.
They require proven, forensic-sound data solutions
that create new and improved workflows to reduce
mobile device backlogs and speed investigations. Our
industry-leading solutions arm forensic examiners
and investigators in the lab and field with the capa-
bility to extract, analyze and act on mobile data with
the speed and accuracy any situation demands – and
deliver evidence they can stand behind.
For more information, visit www.cellebrite.com.
A Critical Tipping Point
Survey Background and Methodology
A Growing Need:
Extending Mobile Data
Forensics Capabilities
to the Field
Cellebrite customers were provided a SurveyMonkey link via its closed LinkedIn group and via email in Q4 of 2014.
• Survey questions addressed a range of mobile data forensics topics, including forensic lab backlogs and how to
reduce them, new challenges such as exploding data sources, big data analytics and training requirements in a
changing legal landscape.
• Survey respondents were also asked to rank what they felt to be the biggest challenges they face in the coming year.
• A total of 797 customers responded to the survey, with 728 completing all questions.
• More than two-thirds of respondents were from North America and 21 percent from Europe.
• Approximately 86 percent of respondents work in law enforcement: 63 percent in state/local/provincial and 23
percent in federal/national agencies. Half (and among corporate respondents, nearly three-quarters) described
their roles best as digital forensic examiners. Thirty-nine percent identified as detectives, inspectors, investigators
or special agents.
of respondents
rated as
important
61%
© 2015 Cellebrite Mobile Synchronization LTD. All rights reserved.
www.cellebrite.com
About Cellebrite
Cellebrite is the world leader in delivering cutting-edge mobile forensic solutions. Cellebrite provides
flexible, field-proven and innovative cross-platform solutions for lab and field via its UFED Pro and
UFED Field Series.
The company’s comprehensive Universal Forensic Extraction Device (UFED) is designed to meet
the challenges of unveiling the massive amount of data stored in the modern mobile device. The
UFED Series is able to extract, decode, analyze and report data from thousands of mobile devices,
including, smartphones, legacy and feature phones, portable GPS devices, tablets, memory cards
and phones manufactured with Chinese chipsets. With more than 30,000 units deployed across 100
countries, UFED Series is the primary choice for forensic specialists in law enforcement, military,
intelligence, corporate security and eDiscovery.
Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese
company (6736/JQ).

More Related Content

What's hot

iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera readyMark Sinclair
 
Police Technologies
Police TechnologiesPolice Technologies
Police TechnologiesDennis Huang
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalJ. David Morris
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 
The Impact of DNA Technologies on the Future of Criminal Offender DNA Databases
The Impact of DNA Technologies on the Future of Criminal Offender DNA DatabasesThe Impact of DNA Technologies on the Future of Criminal Offender DNA Databases
The Impact of DNA Technologies on the Future of Criminal Offender DNA DatabasesThermo Fisher Scientific
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThermo Fisher Scientific
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Thermo Fisher Scientific
 

What's hot (20)

iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Police Technologies
Police TechnologiesPolice Technologies
Police Technologies
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Michelle Mahoney
Michelle MahoneyMichelle Mahoney
Michelle Mahoney
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
76 s201924
76 s20192476 s201924
76 s201924
 
The Impact of DNA Technologies on the Future of Criminal Offender DNA Databases
The Impact of DNA Technologies on the Future of Criminal Offender DNA DatabasesThe Impact of DNA Technologies on the Future of Criminal Offender DNA Databases
The Impact of DNA Technologies on the Future of Criminal Offender DNA Databases
 
Asdourian, Jon
Asdourian, Jon Asdourian, Jon
Asdourian, Jon
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the Missing
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 

Viewers also liked

Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidenceCellebrite
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldCellebrite
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...Cellebrite
 
Acromobile Presentation Deck for Visa FinTech Asia 2014
Acromobile Presentation Deck for Visa FinTech Asia 2014Acromobile Presentation Deck for Visa FinTech Asia 2014
Acromobile Presentation Deck for Visa FinTech Asia 2014Acromobile
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Cellebrite
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareIISPEastMids
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark ChimelyIISPEastMids
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsUsman Sait
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Reportstalin george
 

Viewers also liked (11)

Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device Evidence
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
Acromobile Presentation Deck for Visa FinTech Asia 2014
Acromobile Presentation Deck for Visa FinTech Asia 2014Acromobile Presentation Deck for Visa FinTech Asia 2014
Acromobile Presentation Deck for Visa FinTech Asia 2014
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 

Similar to Cellebrite Predictions Survey 2015

Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Ben B
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery UpdateGareth Evans
 
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014EY
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisPatrick Floto
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Ben B
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfjyothimuppasani1
 
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...Twittercrisis
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 

Similar to Cellebrite Predictions Survey 2015 (20)

Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update
 
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
 
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 

Cellebrite Predictions Survey 2015

  • 1. Criminal investigations today increasingly have one thing in common – mobile data evidence. As a result, mobile forensics capabilities have been thrust into the spotlight, along with the ongoing, dynamic challenges the industry now faces. Rapidly evolving mobile device technology, stronger device and application encryption methods, and warehouses of data both collected and generated daily, represents significant implications for not only forensics examiners in the lab, but increasingly, first responders and investigators in the field. When a crime occurs, time is the enemy. The faster mobile device data can be extracted, analyzed and acted upon, the faster criminals can be taken off the street, cases successfully prosecuted and public confidence restored. Mobile Forensics: A Look Ahead Cellebrite Customers Predict Mobile Device Backlogs, New Data Sources and Legal Issues will Top 2015 Challenges Cellebrite Predictions Survey 2015 Critical Evidence Now Mobile In 2013, Messaging and social app use Tripled Americans used smartphone and tablet apps more than PCs to access the Internet last month the first time that has ever happened. Sources 1 CNN Money, 2 Flurry Analytics 2 1
  • 2. 2 We recognize that mobile device evidence has reached a tipping point; growing rapidly in both importance and volume. Our customers are at the forefront of this shifting landscape. So we asked them how they will address the challenges that mobile data evidence now presents, along with the tools, processes and training that will allow them to successfully navigate it in the future. In Q4 of 2014, 728 law enforcement and corporate customers provided insights on the challenges and trends they believe will influence mobile data forensics in the year ahead. Hands down, nearly all respondents (95%) report that mobile devices are the most significant data source in their investigations today – a trend that shows no sign of slowing. The new digital goldmine in investigations The Data Sources that Matter Most 95% 59% 45% 32% Mobile Device itself Third-party Apps Wireless/Cellular Providers Cloud Providers of respondents consider Mobile Devices their most significant data source 95%
  • 3. 3 Backlogs also bring a host of hidden costs and related issues with them, including overtime for examiners or the need for outsourcing – both introducing potential errors in evidence processing and interpretation. But they also pose more troublesome risks such as cases going unsolved and suspects receiving lesser sentences than they actually deserve. Nearly 29 percent of respondents indicated they have plans to purchase additional forensic tools and expand their labs to deal with device backlogs. Additionally, almost 60 percent identified a need for first-responder or field personnel to preview or triage mobile device evidence before it’s transferred to the lab. Device backlogs of any size or length mean valuable data evidence lays in wait. The sooner examiners and investigators can extract and analyze it, the faster crimes can be prevented or solved. Respondents indicated they were open to new mobile forensic solutions that support multi-tier workflows and tools that extend simple data triage capability to field personnel as needed. With the growing importance of mobile device data to investigations, backlogs of any duration – even days or weeks – can jeopardize the length and outcome of criminal cases. Nearly 80 percent of respondents reported experiencing some level of device backlog in the last year, with 44 percent experiencing backlogs of 1 to 12+ months. This issue appears to be the most Backlogs Challenging Timely Device Processing problematic for federal and national law enforcement respondents (54 percent) and state/provincial/county/ local law enforcement agencies (45 percent). For those experiencing device backlogs, 68 percent rated it from somewhat to a very significant challenge. In the private sector, one-third of respondents reported little to no backlogs. The Hidden Costs of Backlogs of respondents report some level of device backlog in the last year; of those lasting 1 to 12+ months Device Backlogs Building Nearly 80% 44% Examiner overtime Outsourcing device examinations Risks associated with errors in evidence processing, interpretation Cases going unsolved or suspects receiving lesser sentences
  • 4. 4 A Deluge of New Data Sources Require New Tools, Analytics It’s not surprising that mobile devices remain the most valuable data source in investigations when you consider the amount of user-data generated by social networks and messaging applications. For forensic examiners, accessing that data comes with a host of growing challenges. Both device and application encryption is a big one, cited by 85 percent of our customers. Another one? The amount of data that is now stored off the device and in the cloud. This was projected as one of the industry’s most significant issues in the coming year by nearly 60 percent of respondents. Accessing data from third-party applications (60 percent) and wireless or cellular carriers (45 percent) also remain ongoing challenges. Corporate respondents also place great value on mobile device, third-party and cloud data in roughly the same proportions as law enforcement. What do all these new data sources have in common? They add critical time to what has already become a complicated and lengthy investigative workflow. Serving legal process on both cloud and wireless/cellular providers carries with it additional complexity due to resistance in the name of privacy, the requirement to notify customers, lengthy legal processes, etc. And with increasing number of crimes extending across borders, the international mutual legal assistance treaty (MLAT) for providers in countries other than the investigator’s own can add months on top of that. It’s not surprising then, that more than 72 percent of respondents found this aspect of investigations to be either somewhat (43 percent) or a significant challenge (29 percent). Top Three Mobile Data Forensics Challenges 85% 60% 41% Device and Application Encryption Amount of Data Stored off the Device and in the Cloud Aggregating and Analyzing Big Data
  • 5. 5 All the data in the world is only as valuable as the analytics used to make it actionable. Having the ability to quickly visualize key connections – the bigger picture – helps investigators speed investigations, something that approximately 83 percent of respondents deem somewhat to very important. In our survey, respondents also rated text/content, image and geolocation analytics highly for the cases they work (92 percent, 82 percent and 70 percent respectively). Time delays – due to backlogs or process red tape – are the enemy of digital forensic investigations. The findings above underscore the importance of having access to key data mobile data quickly, along with the analytics and workflows to make it actionable in the lab and in the field. Analytics Make Data Actionable Strategically social Law enforcement professionals actively use social media as a tool in their investigations3 use it on a daily basis 8 out of every 10 We live in an age of social media, where networks like Facebook and LinkedIn map our connections, track our locations and use that knowledge to shape our preferences and behavior. According to the International Association of Chiefs of Police (IACP), 86.1 percent of agencies surveyed in 2013 leverage social media for criminal investigations. 92% 83% 82% 70% 25% text/content connections IMAGE/VIDEO GEOLOCATION 92% rate text/content analytics as important 83% find the ability to visualize key connections quickly somewhat to very important 82% cite image analytics as important 70% rate geolocation analytics as important Source 3 LexisNexis 2014
  • 6. 6 You don’t need to look further than the latest news to see the impact of mobile data on data forensics investigations and criminal proceedings, as well as the associated challenges of legal access and privacy. Our survey findings suggest that law enforcement agencies and enterprises are not entirely clear on if, or how, their standard operating procedures will be impacted by ongoing legal precedent. They are, how- ever, monitoring the landscape closely. The majority of survey respondents has received training on both legal and technical topics related to mobile forensics. All respondents recognize the need for ongoing training to both perform mobile forensic examinations and testify about them in court. With the proper processes, tools and training, all organiza- tions can help guarantee that the search, seizure and extraction of mobile evidence is done in accordance with the law. For forensic examiners, training is not a nice to have, but a necessity that ensures job competency. The cost of training should always be weighed against the po- tential cost of not training; the limited ability to access and analyze mobile device data, the impact on inves- tigations of not having evidence readily available and the potential outcomes of putting untrained forensic examiners on the stand in court. Training Prepares Examiners for What Comes Next Training not just a nice to have, but a critical necessity ensuring job competency of respondents have received training 75%
  • 7. 7 The implications of mobile device data on the digital forensics industry are difficult to ignore. It remains our customers’ most important data source in the fight against crime. To harness its power, global public safety agencies and enterprises need effective, legally sound ways to manage the growing complexity and volume this data now represents. Call logs, social media posts and texts can help establish the critical connections officers, investigators and prosecutors need to act quickly; determine innocence or guilt. They require proven, forensic-sound data solutions that create new and improved workflows to reduce mobile device backlogs and speed investigations. Our industry-leading solutions arm forensic examiners and investigators in the lab and field with the capa- bility to extract, analyze and act on mobile data with the speed and accuracy any situation demands – and deliver evidence they can stand behind. For more information, visit www.cellebrite.com. A Critical Tipping Point Survey Background and Methodology A Growing Need: Extending Mobile Data Forensics Capabilities to the Field Cellebrite customers were provided a SurveyMonkey link via its closed LinkedIn group and via email in Q4 of 2014. • Survey questions addressed a range of mobile data forensics topics, including forensic lab backlogs and how to reduce them, new challenges such as exploding data sources, big data analytics and training requirements in a changing legal landscape. • Survey respondents were also asked to rank what they felt to be the biggest challenges they face in the coming year. • A total of 797 customers responded to the survey, with 728 completing all questions. • More than two-thirds of respondents were from North America and 21 percent from Europe. • Approximately 86 percent of respondents work in law enforcement: 63 percent in state/local/provincial and 23 percent in federal/national agencies. Half (and among corporate respondents, nearly three-quarters) described their roles best as digital forensic examiners. Thirty-nine percent identified as detectives, inspectors, investigators or special agents. of respondents rated as important 61%
  • 8. © 2015 Cellebrite Mobile Synchronization LTD. All rights reserved. www.cellebrite.com About Cellebrite Cellebrite is the world leader in delivering cutting-edge mobile forensic solutions. Cellebrite provides flexible, field-proven and innovative cross-platform solutions for lab and field via its UFED Pro and UFED Field Series. The company’s comprehensive Universal Forensic Extraction Device (UFED) is designed to meet the challenges of unveiling the massive amount of data stored in the modern mobile device. The UFED Series is able to extract, decode, analyze and report data from thousands of mobile devices, including, smartphones, legacy and feature phones, portable GPS devices, tablets, memory cards and phones manufactured with Chinese chipsets. With more than 30,000 units deployed across 100 countries, UFED Series is the primary choice for forensic specialists in law enforcement, military, intelligence, corporate security and eDiscovery. Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese company (6736/JQ).