Trends in Mobile Forensics from Cellebrite

Similar documents
PROVIDING INVESTIGATIVE SOLUTIONS

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Field Series. Jump-start investigations with forensically sound data in real time.

DIGITAL EVIDENCE TOOL BOX

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

ACHIEVING FIFTH GENERATION CYBER SECURITY

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

COMPUTER FORENSICS (CFRS)

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity

Panda Security 2010 Page 1

White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011

The Use of Technology to Enhance Investigation

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Matt Danner Flashback Data

Certified Cyber Security Analyst VS-1160

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity

Handling Large Data Sets

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

Digital Forensics for Attorneys

Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD

Pricing Guide PHONE WEBSITE www,purpleicondesigns.com.

PROFILE: ACCESS DATA

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

Computer Forensics US-CERT

OUR TOP DATA SOURCES AND WHY THEY MATTER

Slide 1. Opera Max. Migrating the next billion smartphone users for better app experience

Computer forensics Aiman Al-Refaei

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

RUSSELL BOHSE.

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

MOBILedit Forensic Express

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Chapter 13: The IT Professional

The Customer Relationship:

We are all connected. The Networked Society

FEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy

Why you MUST protect your customer data

TRUST YOUR WEBSITE TO THE EXPERTS PROFESSIONALLY DESIGNED AND FOUND EVERYWHERE THAT MATTERS

FBI Project. Cell Phone Triangulation TASKS

Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

Information Security Incident Response Plan

Forensic Discovery By Wietse Venema, Dan Farmer READ ONLINE

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

The Mathematics of Big Data

Applications for Preservation and Production in our Digital World

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

SYSTEM FORENSICS, INVESTIGATION, AND RESPONSE (INFORMATION SYSTEMS SECURITY & ASSURANCE) BY JOHN R. VACCA, K RUDOLPH

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

EXAMPLE AUDIO OR VIDEO SCRIPTS

EMERGING TRENDS AND ISSUES

An overview of. Mobile Testing. By André Jacobs. A Jacobs

2011 TMT Predictions.

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

EIT Health UK-Ireland Privacy Policy

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

ONLINE EVALUATION FOR: Company Name

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Michael McCartney, President

Information Security Incident Response Plan

A revolutionary visual security and analytics solution

ADVISORY. Forensic services. Protecting your business from fraud, misconduct and non-compliance. kpmg.com/in

Digital ForensicS BEYOND TIMELINES. / magazine

Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?

STUDY REVEALS GROWING DEMAND FOR HIGH-SPEED DATA COMMUNICATIONS

Acurian on. The Role of Technology in Patient Recruitment

Global Cybercrime Certification

Council of the European Union Brussels, 16 March 2015 (OR. en)

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

CYBER SECURITY TRAINING

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

SPECIAL ISSUE, PAPER ID: IJDCST-09 ISSN

Deloitte Discovery Caribbean & Bermuda Countries Guide

How To Guide. ADENION GmbH Merkatorstraße Grevenbroich Germany Fon: Fax:

Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching

Consumer Opinions and Habits A XIRRUS STUDY

PRIVACY POLICY VANTAGE HOMES

Red Flag Regulations

IP CHANGES IN THE THAI COMPUTER CRIME ACT. Cyber crime in Thailand Introduction & Overview

Introduction to Data Science Day 2

International Association of Arson Investigators Fire Investigation Technician (IAAI-FIT) Program Manual

Policy recommendations. Technology fraud and online exploitation

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

2017 Site Selectors Guild State of Site Selection Trend Survey Report

Tom Haye Chief Officer Hampshire Special Constabulary

Exclusive Leads for Attorneys WHY PAY PER CLICK?

Does More IT Utilization Improve Police Performance?

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.

Transcription:

Trends in Mobile Forensics from Cellebrite EBOOK 1

Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with experts in the field. The study hoped to list the trends that the field of mobile forensics would be seeing over the coming months. They illuminated the following trends and believe that these will increasingly change the way that mobile forensics work. 2

Mobile Devices More Prevalent More and more people are using mobile devices today, and many people have more than just a single device. This means the experts will be working with a variety of different types of devices, including phones, tablets, laptops, cameras, and more. In addition, one person may actually have more than one device. In fact, that s generally the case, so the computer forensics specialists will need to be capable of working with a variety of devices. 3

Local Analytics and Research With the rise of mobile devices and their importance in cases, it taxes the current forensics labs at the state and federal level. This means that locally, the need for experts who are able to get data from the devices on the scene and in a local setting will increase. More forensic experts will be needed for analysis in the field and most will need to broaden their knowledge and approach to incorporate as many different devices as possible. The technology is forever changing as well so keeping up to date on the latest software will be crucial to these investigations. 4

The Social Trend People today tend to use social media via their mobile devices, as well as their computers. The trend toward social media is important for a wide range of cases, and it can prove to be influential when it comes to locating suspects, finding witnesses, gathering incriminating information, and much more. Some ways in which social media forensics may aid in criminal investigations: Information stored in the Cloud can assist in an investigation in a number of ways. Deleted files, including past Google and Yahoo searches are also able to be located and evaluated by investigators. When looking for information, forensics experts have the ability to investigate the user s social networks, including Twitter, YouTube, and Facebook. 5

More Data Means More Focus The amount of data that experts gather during an investigation is massive today. Instead of gathering mere gigabytes of data, the amount of data gathered on each person can grow to terabytes. Not all of this data is important, and it becomes vital for the experts to be able to sort through the information and only use that which is somehow relevant to the case. It also becomes important to be able to explain the data, and its relevance to lawyers, judges, and jurors. In 2013, there were more than 100 billion downloads of mobile applications. Facebook currently has over 2 billion users worldwide. 300 billion tweets sent on Twitter monthly. Over 20 billion photos shared on Instagram monthly, with 200+ million users. 6

Malware Still a Problem Malware is also an issue, but now it is affecting mobile devices. Experts feel that the increase in mobile malware will require that examiners learn how to analyze it along with other evidence. Malware is a part of many types of web crime now making its way to mobile devices, including corporate theft, intellectual property theft, fraud, and much more. As these types of crimes become more prominent with handheld mobile devices investigators will have to stay on top of these trends in order to continue to properly conduct these investigations. 7

Study Included a Number of Well Known Experts Cellebrite conducted a survey and interviewed many of the top names in the world of computer forensics as a means to shed light on the trends shaping the field of mobile forensics. Ultimately, all agree that with the increase in the number of mobile devices out there, it is vital to increase the level of education and training of those in the field. They also agree that the addition of these mobile devices has the potential to make trial far more complex. By recognizing and following these trends, it becomes easier for the computer forensic experts to do their jobs. 8

About Prudential Associates Prudential Associates offers surveillance, investigative services and digital forensics investigations regarding Adultery, Insurance, Criminal, Civil, and Personal Matters. Prudential Associates has a proven track record of more than four decades of professional service in due diligence investigations, digital and computer forensics, workers compensation surveillances, adultery/domestic & child custody matters, and civil and criminal cases. Our digital forensics lab is so substantial in capability and staff expertise that it surpasses that of almost every law enforcement lab in the United States. With Prudential Associates as your investigations and surveillance resource, you or your company effectively acquires an intelligence division. To learn more about our services offered, visit www.usainvestigators.com. We re available to discuss and analyze your situation immediately. We offer FREE SHIPPING of your computer drives and cell phones to our lab from ANYWHERE in the United States 877.279.6700 www.usainvestigators.com Source: http://www.cellebrite.com/corporate/news-events/forensic-press- releases/703-cellebrite-research-reveals-top-trends-shaping-mobileforensics-multi-device,-field-analysis,-social-evidence,-big-data-and- malware 9