SlideShare a Scribd company logo
© 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved.
Smarter Than You Think -
a look at the evidence available from
smart phones and mobile devices
26 June 2013
Agenda
• Introduction
• Range of mobile devices available
• Types of data
• Case studies
• GPS and Geotagging
Agenda
• Mobile Apps
• The future of mobile devices
• Relationship with other digital
disciplines
• Questions?
• Recent press articles
Introduction
Mobile Devices
• Embedded and reliant on mobile devices in our
everyday lives – work, personal and leisure.
• Mobile devices often overlooked as a source of
potential evidence - awareness level for police
constabularies and criminal investigations.
• Individuals often unaware of hidden data stored!
• Example – Audience participation with BlackBerry
devices – Event Log
How else are mobile devices used?
Mobile Devices - Popularity
• Research Firm Gartner – Suggest PC's are on the
decline
• Not a dip caused by squeeze on household
incomes
• 1.9 billion mobile devices to be sold in 2013, where
1 billion estimated will be smart phones
• Social media access – Twitter feeds embedded
into Bloomberg terminals at traders desks. Goes
against the grain for reluctance of firms to allow
access
Manufacturers all have different OS causing
complicating forensic investigations
Why Mobile Device Investigations
• Criminal & civil law examples - murder, sexual
assault, violent crime, burglary, intent – sabotage
and collusion, illicit images of children, financial
fraud, commercial espionage, money laundering,
and HR related issues.
• Examinations need to be forensically sound to
stand up in court with robust procedures (ACPO
guidelines).
• Recovery of deleted data.
• Recovery of data from damaged mobile devices.
© 2013 Grant Thornton UK LLP. All rights reserved.
• SIM cards
• Mobile Phone
• Memory Card
• USB dongle
• Tablets
• Watch phone
Range of mobile devices & components
Why Mobile Device Investigations
• SIM cards – Subscriber data used to obtain billing
records, contacts, call data, text messages.
• Handset – Typically contacts, call logs, SMS text
messages, MMS, emails, Internet history, Social
Media, WiFi, Bluetooth, App data, Media (photos,
videos and audio), voicemails (selected smart
phones only), organiser information, eDocs,
metadata and custom dictionary.
• Memory cards – Typically media and backup of
phone data
Types of Data
User created
Computer versus the Smart Phone –
Any difference?
Case Studies
Examples
• Counterfeit and money laundering case – Suspect
unhelpful in investigation and unwilling to provide
handset code to device.
• Commercial espionage – Individual hid data on
memory card under phone casing.
• Intelligence – Individual identified with fake
passport at airport. Handset examined to assist in
identity.
GPS and Geotagging
Definitions and Problems
• Global Positioning System (GPS) – activated on
handset to locate geographical position.
• Geotagging – adding metadata to media file.
• How accurate especially in large cities?
• Security issues – giving away location?
• Social media issues – privacy and public domain?
• False GPS co-ordinates can be generated by user.
• Geotags can be edited to give false information.
How easy is it?
Hypothetical Situations?
• Possible to frame innocent parties eg loading
edited photo with fake co-ordinates to unsecured
phone or website and tip off police.
• Uploading of images to smart phone by military
personnel – subsequently transferred to social
media site. Potentially giving enemy access to
location.
Applications (Apps)
What is an App?
• An "App" is an application - software designed to
run on a mobile device with limited function.
• Shortcut to popular web based sites eg email.
• 50 Billion Apps have been downloaded from the
Apple store alone.
• Equates to 7 apps per person on the planet.
• 800 Apps per second are downloaded from Apple.
• Data can be forensically retrieved from some Apps
–but not all, due to the vast array encountered.
What information is held?
- Emails
- Location
- Social Media
- Personal information
- Degrees of contact
- Web-based data
Security Apps – problems for the investigator?
Applications
securing
transmission of
data to and from
the handset
The Future…..
Near Field Communication (NFC) – 4G handsets
Google Glasses
How will data be able
to be extracted and
forensically obtained?
Types of Data – GPS,
pairing with mobile
devices, microphone,
facial recognition?
Relationship with Computer Forensics
and eDisclosure
Computer Forensics
- Mobile devices
synchronised with
other electronic
devices
- Even without a
physical mobile device,
backups can exist on
PC's for examination
- Cloud based services
© 2013 Grant Thornton UK LLP. All rights reserved.
eDisclosure Trends
• Increasing use of social media
• Proactive information management
• Ever increasing volumes of data
• Further disparate sources of data
• Thousands of emails can be
extracted from smart phones –
easy method to screen data via
eDisclosure review platforms
© 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved.
Any Questions?
UK Newspaper Articles
Examples of mobile devices and their
evidential use
Mobile Devices in the News – Extracts from the UK
Press
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
© 2013 Grant Thornton UK LLP. All rights reserved.
Contact
Chris Clements
Partner and Head of UK Regions
Forensic & Investigation Services
+44 (0) 7968 33 88 95
chris.m.clements@uk.gt.com
Bruce Keeble
Executive
Forensic & Investigation Services
+44 (0)7891 433 223
bruce.h.keeble@uk.gt.com

More Related Content

What's hot

Digital forensics
Digital forensicsDigital forensics
Digital forensics
dentpress
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
Cybercrime
CybercrimeCybercrime
Cybercrime
JazAphrodite
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama
 
Location Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & FoursquareLocation Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & Foursquare
The Difference Engine
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law Enforcement
Harun Ma'hdi-El
 
How technology used in computer forensics investigation
How technology used in computer forensics investigationHow technology used in computer forensics investigation
How technology used in computer forensics investigation
ICFECI
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
prashant3535
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
University of Delhi
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
Kohinoor Puttawar
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
University of Delhi
 
Computer forensics analyst through digital investigation
Computer forensics analyst through digital investigationComputer forensics analyst through digital investigation
Computer forensics analyst through digital investigation
ICFECI
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
Near Field Communication: Introduction and Implications
Near Field Communication: Introduction and ImplicationsNear Field Communication: Introduction and Implications
Near Field Communication: Introduction and Implications
Kristen Yarmey
 

What's hot (18)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Location Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & FoursquareLocation Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & Foursquare
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law Enforcement
 
How technology used in computer forensics investigation
How technology used in computer forensics investigationHow technology used in computer forensics investigation
How technology used in computer forensics investigation
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
Computer forensics analyst through digital investigation
Computer forensics analyst through digital investigationComputer forensics analyst through digital investigation
Computer forensics analyst through digital investigation
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Near Field Communication: Introduction and Implications
Near Field Communication: Introduction and ImplicationsNear Field Communication: Introduction and Implications
Near Field Communication: Introduction and Implications
 

Viewers also liked

Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HR
sarah kabirat
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
Compositional rules
Compositional rulesCompositional rules
Compositional rules
bravozach
 
Covenant Presentation
Covenant PresentationCovenant Presentation
Covenant Presentation
bobrhodessocal
 
compra vino monterrey orense
compra vino monterrey orensecompra vino monterrey orense
compra vino monterrey orense
Manuel Rodríguez Pino
 
The Procedures Of Violin Restoration
The Procedures Of Violin RestorationThe Procedures Of Violin Restoration
The Procedures Of Violin Restoration
nipawans
 
Summary ADR consolidation
Summary ADR consolidationSummary ADR consolidation
Summary ADR consolidation
consumerenergy
 
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Snorre Tørriseng
 
Religionincolonies
ReligionincoloniesReligionincolonies
Religionincolonies
LeannLynOlsen
 
Neurologica
NeurologicaNeurologica
Neurologica
Ernesto Ramirez
 
Mind Your Brain
Mind Your BrainMind Your Brain
Mind Your Brain
Shamal Abh
 
Amaia's esl site thanksgiving
Amaia's esl site thanksgivingAmaia's esl site thanksgiving
Amaia's esl site thanksgiving
amaialopezescolarlearte
 
Personal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care PlatformPersonal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care Platform
bulkonly
 
Target audience
Target audienceTarget audience
Target audience
nctcmedia12
 
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
Somprasong friend Ka Nuamboonlue
 
Kunst&cultuur subsidies
Kunst&cultuur subsidiesKunst&cultuur subsidies
Kunst&cultuur subsidiesLejla Alic
 
BS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEBS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEMinh Hoàng
 

Viewers also liked (20)

Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HR
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Compositional rules
Compositional rulesCompositional rules
Compositional rules
 
Covenant Presentation
Covenant PresentationCovenant Presentation
Covenant Presentation
 
compra vino monterrey orense
compra vino monterrey orensecompra vino monterrey orense
compra vino monterrey orense
 
The Procedures Of Violin Restoration
The Procedures Of Violin RestorationThe Procedures Of Violin Restoration
The Procedures Of Violin Restoration
 
Summary ADR consolidation
Summary ADR consolidationSummary ADR consolidation
Summary ADR consolidation
 
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
 
Religionincolonies
ReligionincoloniesReligionincolonies
Religionincolonies
 
Neurologica
NeurologicaNeurologica
Neurologica
 
Mind Your Brain
Mind Your BrainMind Your Brain
Mind Your Brain
 
Amaia's esl site thanksgiving
Amaia's esl site thanksgivingAmaia's esl site thanksgiving
Amaia's esl site thanksgiving
 
Personal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care PlatformPersonal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care Platform
 
Target audience
Target audienceTarget audience
Target audience
 
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
 
แต่ง Photo
แต่ง Photoแต่ง Photo
แต่ง Photo
 
Kunst&cultuur subsidies
Kunst&cultuur subsidiesKunst&cultuur subsidies
Kunst&cultuur subsidies
 
Stamp
StampStamp
Stamp
 
BS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEBS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESE
 
Chuong trinh pho thong&tet
Chuong trinh pho thong&tetChuong trinh pho thong&tet
Chuong trinh pho thong&tet
 

Similar to Smart phone and mobile phone risks

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
NCCOMMS
 
Mobile(1)
Mobile(1)Mobile(1)
Mobile(1)
Jay Meley
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
Ravinderen Nair
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
Nana Kwame(Emeritus) Gyamfi
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart cities
robkitchin
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
CSCJournals
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET Journal
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
Karen Moxley
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
Siva Krishna Prasad
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
jraja01
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
divyabrahma1
 
Technology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation ServiceTechnology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation Service
AlbaInnovationCentre
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
richardnorman90310
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
AsyathShahina
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 

Similar to Smart phone and mobile phone risks (20)

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Mobile(1)
Mobile(1)Mobile(1)
Mobile(1)
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart cities
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Technology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation ServiceTechnology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation Service
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 

More from Grant Thornton UK LLP

Briefing paper: Making tax digital
Briefing paper: Making tax digitalBriefing paper: Making tax digital
Briefing paper: Making tax digital
Grant Thornton UK LLP
 
Housing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findingsHousing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findings
Grant Thornton UK LLP
 
Key tax dates for 2016-17
Key tax dates for 2016-17Key tax dates for 2016-17
Key tax dates for 2016-17
Grant Thornton UK LLP
 
Budget 2016 - what business wants to see
Budget 2016 - what business wants to seeBudget 2016 - what business wants to see
Budget 2016 - what business wants to see
Grant Thornton UK LLP
 
Women in business: the path to leadership
Women in business: the path to leadershipWomen in business: the path to leadership
Women in business: the path to leadership
Grant Thornton UK LLP
 
China or India
China or IndiaChina or India
China or India
Grant Thornton UK LLP
 
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton UK LLP
 
Transaction Advisory services
Transaction Advisory servicesTransaction Advisory services
Transaction Advisory services
Grant Thornton UK LLP
 
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
Grant Thornton UK LLP
 
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
Grant Thornton UK LLP
 

More from Grant Thornton UK LLP (10)

Briefing paper: Making tax digital
Briefing paper: Making tax digitalBriefing paper: Making tax digital
Briefing paper: Making tax digital
 
Housing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findingsHousing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findings
 
Key tax dates for 2016-17
Key tax dates for 2016-17Key tax dates for 2016-17
Key tax dates for 2016-17
 
Budget 2016 - what business wants to see
Budget 2016 - what business wants to seeBudget 2016 - what business wants to see
Budget 2016 - what business wants to see
 
Women in business: the path to leadership
Women in business: the path to leadershipWomen in business: the path to leadership
Women in business: the path to leadership
 
China or India
China or IndiaChina or India
China or India
 
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
 
Transaction Advisory services
Transaction Advisory servicesTransaction Advisory services
Transaction Advisory services
 
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
 
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Smart phone and mobile phone risks

  • 1. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Smarter Than You Think - a look at the evidence available from smart phones and mobile devices 26 June 2013
  • 2. Agenda • Introduction • Range of mobile devices available • Types of data • Case studies • GPS and Geotagging
  • 3. Agenda • Mobile Apps • The future of mobile devices • Relationship with other digital disciplines • Questions? • Recent press articles
  • 5. Mobile Devices • Embedded and reliant on mobile devices in our everyday lives – work, personal and leisure. • Mobile devices often overlooked as a source of potential evidence - awareness level for police constabularies and criminal investigations. • Individuals often unaware of hidden data stored! • Example – Audience participation with BlackBerry devices – Event Log
  • 6. How else are mobile devices used?
  • 7. Mobile Devices - Popularity • Research Firm Gartner – Suggest PC's are on the decline • Not a dip caused by squeeze on household incomes • 1.9 billion mobile devices to be sold in 2013, where 1 billion estimated will be smart phones • Social media access – Twitter feeds embedded into Bloomberg terminals at traders desks. Goes against the grain for reluctance of firms to allow access
  • 8. Manufacturers all have different OS causing complicating forensic investigations
  • 9. Why Mobile Device Investigations • Criminal & civil law examples - murder, sexual assault, violent crime, burglary, intent – sabotage and collusion, illicit images of children, financial fraud, commercial espionage, money laundering, and HR related issues. • Examinations need to be forensically sound to stand up in court with robust procedures (ACPO guidelines). • Recovery of deleted data. • Recovery of data from damaged mobile devices.
  • 10. © 2013 Grant Thornton UK LLP. All rights reserved. • SIM cards • Mobile Phone • Memory Card • USB dongle • Tablets • Watch phone Range of mobile devices & components
  • 11. Why Mobile Device Investigations • SIM cards – Subscriber data used to obtain billing records, contacts, call data, text messages. • Handset – Typically contacts, call logs, SMS text messages, MMS, emails, Internet history, Social Media, WiFi, Bluetooth, App data, Media (photos, videos and audio), voicemails (selected smart phones only), organiser information, eDocs, metadata and custom dictionary. • Memory cards – Typically media and backup of phone data
  • 13. Computer versus the Smart Phone – Any difference?
  • 15. Examples • Counterfeit and money laundering case – Suspect unhelpful in investigation and unwilling to provide handset code to device. • Commercial espionage – Individual hid data on memory card under phone casing. • Intelligence – Individual identified with fake passport at airport. Handset examined to assist in identity.
  • 17. Definitions and Problems • Global Positioning System (GPS) – activated on handset to locate geographical position. • Geotagging – adding metadata to media file. • How accurate especially in large cities? • Security issues – giving away location? • Social media issues – privacy and public domain? • False GPS co-ordinates can be generated by user. • Geotags can be edited to give false information.
  • 18. How easy is it?
  • 19. Hypothetical Situations? • Possible to frame innocent parties eg loading edited photo with fake co-ordinates to unsecured phone or website and tip off police. • Uploading of images to smart phone by military personnel – subsequently transferred to social media site. Potentially giving enemy access to location.
  • 21. What is an App? • An "App" is an application - software designed to run on a mobile device with limited function. • Shortcut to popular web based sites eg email. • 50 Billion Apps have been downloaded from the Apple store alone. • Equates to 7 apps per person on the planet. • 800 Apps per second are downloaded from Apple. • Data can be forensically retrieved from some Apps –but not all, due to the vast array encountered.
  • 22. What information is held? - Emails - Location - Social Media - Personal information - Degrees of contact - Web-based data
  • 23. Security Apps – problems for the investigator? Applications securing transmission of data to and from the handset
  • 25. Near Field Communication (NFC) – 4G handsets
  • 26. Google Glasses How will data be able to be extracted and forensically obtained? Types of Data – GPS, pairing with mobile devices, microphone, facial recognition?
  • 27. Relationship with Computer Forensics and eDisclosure
  • 28. Computer Forensics - Mobile devices synchronised with other electronic devices - Even without a physical mobile device, backups can exist on PC's for examination - Cloud based services
  • 29. © 2013 Grant Thornton UK LLP. All rights reserved. eDisclosure Trends • Increasing use of social media • Proactive information management • Ever increasing volumes of data • Further disparate sources of data • Thousands of emails can be extracted from smart phones – easy method to screen data via eDisclosure review platforms
  • 30. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Any Questions?
  • 31. UK Newspaper Articles Examples of mobile devices and their evidential use
  • 32. Mobile Devices in the News – Extracts from the UK Press
  • 33. Mobile Devices in the News
  • 34. Mobile Devices in the News
  • 35. Mobile Devices in the News
  • 36. Mobile Devices in the News
  • 37. Mobile Devices in the News
  • 38. Mobile Devices in the News
  • 39. Mobile Devices in the News
  • 40. Mobile Devices in the News
  • 41. Mobile Devices in the News
  • 42. Mobile Devices in the News
  • 43. Mobile Devices in the News
  • 44. Mobile Devices in the News
  • 45. © 2013 Grant Thornton UK LLP. All rights reserved. Contact Chris Clements Partner and Head of UK Regions Forensic & Investigation Services +44 (0) 7968 33 88 95 chris.m.clements@uk.gt.com Bruce Keeble Executive Forensic & Investigation Services +44 (0)7891 433 223 bruce.h.keeble@uk.gt.com