SlideShare ist ein Scribd-Unternehmen logo
1 von 45
© 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved.
Smarter Than You Think -
a look at the evidence available from
smart phones and mobile devices
26 June 2013
Agenda
• Introduction
• Range of mobile devices available
• Types of data
• Case studies
• GPS and Geotagging
Agenda
• Mobile Apps
• The future of mobile devices
• Relationship with other digital
disciplines
• Questions?
• Recent press articles
Introduction
Mobile Devices
• Embedded and reliant on mobile devices in our
everyday lives – work, personal and leisure.
• Mobile devices often overlooked as a source of
potential evidence - awareness level for police
constabularies and criminal investigations.
• Individuals often unaware of hidden data stored!
• Example – Audience participation with BlackBerry
devices – Event Log
How else are mobile devices used?
Mobile Devices - Popularity
• Research Firm Gartner – Suggest PC's are on the
decline
• Not a dip caused by squeeze on household
incomes
• 1.9 billion mobile devices to be sold in 2013, where
1 billion estimated will be smart phones
• Social media access – Twitter feeds embedded
into Bloomberg terminals at traders desks. Goes
against the grain for reluctance of firms to allow
access
Manufacturers all have different OS causing
complicating forensic investigations
Why Mobile Device Investigations
• Criminal & civil law examples - murder, sexual
assault, violent crime, burglary, intent – sabotage
and collusion, illicit images of children, financial
fraud, commercial espionage, money laundering,
and HR related issues.
• Examinations need to be forensically sound to
stand up in court with robust procedures (ACPO
guidelines).
• Recovery of deleted data.
• Recovery of data from damaged mobile devices.
© 2013 Grant Thornton UK LLP. All rights reserved.
• SIM cards
• Mobile Phone
• Memory Card
• USB dongle
• Tablets
• Watch phone
Range of mobile devices & components
Why Mobile Device Investigations
• SIM cards – Subscriber data used to obtain billing
records, contacts, call data, text messages.
• Handset – Typically contacts, call logs, SMS text
messages, MMS, emails, Internet history, Social
Media, WiFi, Bluetooth, App data, Media (photos,
videos and audio), voicemails (selected smart
phones only), organiser information, eDocs,
metadata and custom dictionary.
• Memory cards – Typically media and backup of
phone data
Types of Data
User created
Computer versus the Smart Phone –
Any difference?
Case Studies
Examples
• Counterfeit and money laundering case – Suspect
unhelpful in investigation and unwilling to provide
handset code to device.
• Commercial espionage – Individual hid data on
memory card under phone casing.
• Intelligence – Individual identified with fake
passport at airport. Handset examined to assist in
identity.
GPS and Geotagging
Definitions and Problems
• Global Positioning System (GPS) – activated on
handset to locate geographical position.
• Geotagging – adding metadata to media file.
• How accurate especially in large cities?
• Security issues – giving away location?
• Social media issues – privacy and public domain?
• False GPS co-ordinates can be generated by user.
• Geotags can be edited to give false information.
How easy is it?
Hypothetical Situations?
• Possible to frame innocent parties eg loading
edited photo with fake co-ordinates to unsecured
phone or website and tip off police.
• Uploading of images to smart phone by military
personnel – subsequently transferred to social
media site. Potentially giving enemy access to
location.
Applications (Apps)
What is an App?
• An "App" is an application - software designed to
run on a mobile device with limited function.
• Shortcut to popular web based sites eg email.
• 50 Billion Apps have been downloaded from the
Apple store alone.
• Equates to 7 apps per person on the planet.
• 800 Apps per second are downloaded from Apple.
• Data can be forensically retrieved from some Apps
–but not all, due to the vast array encountered.
What information is held?
- Emails
- Location
- Social Media
- Personal information
- Degrees of contact
- Web-based data
Security Apps – problems for the investigator?
Applications
securing
transmission of
data to and from
the handset
The Future…..
Near Field Communication (NFC) – 4G handsets
Google Glasses
How will data be able
to be extracted and
forensically obtained?
Types of Data – GPS,
pairing with mobile
devices, microphone,
facial recognition?
Relationship with Computer Forensics
and eDisclosure
Computer Forensics
- Mobile devices
synchronised with
other electronic
devices
- Even without a
physical mobile device,
backups can exist on
PC's for examination
- Cloud based services
© 2013 Grant Thornton UK LLP. All rights reserved.
eDisclosure Trends
• Increasing use of social media
• Proactive information management
• Ever increasing volumes of data
• Further disparate sources of data
• Thousands of emails can be
extracted from smart phones –
easy method to screen data via
eDisclosure review platforms
© 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved.
Any Questions?
UK Newspaper Articles
Examples of mobile devices and their
evidential use
Mobile Devices in the News – Extracts from the UK
Press
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
Mobile Devices in the News
© 2013 Grant Thornton UK LLP. All rights reserved.
Contact
Chris Clements
Partner and Head of UK Regions
Forensic & Investigation Services
+44 (0) 7968 33 88 95
chris.m.clements@uk.gt.com
Bruce Keeble
Executive
Forensic & Investigation Services
+44 (0)7891 433 223
bruce.h.keeble@uk.gt.com

Weitere ähnliche Inhalte

Was ist angesagt?

Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Location Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & FoursquareLocation Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & FoursquareThe Difference Engine
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law EnforcementHarun Ma'hdi-El
 
How technology used in computer forensics investigation
How technology used in computer forensics investigationHow technology used in computer forensics investigation
How technology used in computer forensics investigationICFECI
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2University of Delhi
 
Computer forensics analyst through digital investigation
Computer forensics analyst through digital investigationComputer forensics analyst through digital investigation
Computer forensics analyst through digital investigationICFECI
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Near Field Communication: Introduction and Implications
Near Field Communication: Introduction and ImplicationsNear Field Communication: Introduction and Implications
Near Field Communication: Introduction and ImplicationsKristen Yarmey
 

Was ist angesagt? (18)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Location Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & FoursquareLocation Based Services: Not Just GPS & Foursquare
Location Based Services: Not Just GPS & Foursquare
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law Enforcement
 
How technology used in computer forensics investigation
How technology used in computer forensics investigationHow technology used in computer forensics investigation
How technology used in computer forensics investigation
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
Computer forensics analyst through digital investigation
Computer forensics analyst through digital investigationComputer forensics analyst through digital investigation
Computer forensics analyst through digital investigation
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Near Field Communication: Introduction and Implications
Near Field Communication: Introduction and ImplicationsNear Field Communication: Introduction and Implications
Near Field Communication: Introduction and Implications
 

Andere mochten auch

Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRsarah kabirat
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Compositional rules
Compositional rulesCompositional rules
Compositional rulesbravozach
 
The Procedures Of Violin Restoration
The Procedures Of Violin RestorationThe Procedures Of Violin Restoration
The Procedures Of Violin Restorationnipawans
 
Summary ADR consolidation
Summary ADR consolidationSummary ADR consolidation
Summary ADR consolidationconsumerenergy
 
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014Snorre Tørriseng
 
Mind Your Brain
Mind Your BrainMind Your Brain
Mind Your BrainShamal Abh
 
Personal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care PlatformPersonal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care Platformbulkonly
 
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒Somprasong friend Ka Nuamboonlue
 
Kunst&cultuur subsidies
Kunst&cultuur subsidiesKunst&cultuur subsidies
Kunst&cultuur subsidiesLejla Alic
 
BS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEBS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEMinh Hoàng
 

Andere mochten auch (20)

Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HR
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Compositional rules
Compositional rulesCompositional rules
Compositional rules
 
Covenant Presentation
Covenant PresentationCovenant Presentation
Covenant Presentation
 
compra vino monterrey orense
compra vino monterrey orensecompra vino monterrey orense
compra vino monterrey orense
 
The Procedures Of Violin Restoration
The Procedures Of Violin RestorationThe Procedures Of Violin Restoration
The Procedures Of Violin Restoration
 
Summary ADR consolidation
Summary ADR consolidationSummary ADR consolidation
Summary ADR consolidation
 
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
Sesjon S4B 08/05 "Dokker + FYR = Sant" ved NKUL 2014
 
Religionincolonies
ReligionincoloniesReligionincolonies
Religionincolonies
 
Neurologica
NeurologicaNeurologica
Neurologica
 
Mind Your Brain
Mind Your BrainMind Your Brain
Mind Your Brain
 
Amaia's esl site thanksgiving
Amaia's esl site thanksgivingAmaia's esl site thanksgiving
Amaia's esl site thanksgiving
 
Personal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care PlatformPersonal Healthcare And Safety Care Platform
Personal Healthcare And Safety Care Platform
 
Target audience
Target audienceTarget audience
Target audience
 
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
ความเป็นไท(ย)ภูมิปัญญา วัฒนธรรม และการปกครอง ตอนที่ ๒
 
แต่ง Photo
แต่ง Photoแต่ง Photo
แต่ง Photo
 
Kunst&cultuur subsidies
Kunst&cultuur subsidiesKunst&cultuur subsidies
Kunst&cultuur subsidies
 
Stamp
StampStamp
Stamp
 
BS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESEBS's PORTFOLIO_VIETNAMESE
BS's PORTFOLIO_VIETNAMESE
 
Chuong trinh pho thong&tet
Chuong trinh pho thong&tetChuong trinh pho thong&tet
Chuong trinh pho thong&tet
 

Ähnlich wie Smart phone and mobile phone risks

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONNana Kwame(Emeritus) Gyamfi
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesrobkitchin
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Technology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation ServiceTechnology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation ServiceAlbaInnovationCentre
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 

Ähnlich wie Smart phone and mobile phone risks (20)

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Mobile(1)
Mobile(1)Mobile(1)
Mobile(1)
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart cities
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Technology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation ServiceTechnology Trends 2014 - Alba Incubation Service
Technology Trends 2014 - Alba Incubation Service
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 

Mehr von Grant Thornton UK LLP

Housing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findingsHousing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findingsGrant Thornton UK LLP
 
Budget 2016 - what business wants to see
Budget 2016 - what business wants to seeBudget 2016 - what business wants to see
Budget 2016 - what business wants to seeGrant Thornton UK LLP
 
Women in business: the path to leadership
Women in business: the path to leadershipWomen in business: the path to leadership
Women in business: the path to leadershipGrant Thornton UK LLP
 
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014Grant Thornton UK LLP
 
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013Grant Thornton UK LLP
 
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013Grant Thornton UK LLP
 

Mehr von Grant Thornton UK LLP (10)

Briefing paper: Making tax digital
Briefing paper: Making tax digitalBriefing paper: Making tax digital
Briefing paper: Making tax digital
 
Housing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findingsHousing Inquiry: London housing pipeline analysis initial findings
Housing Inquiry: London housing pipeline analysis initial findings
 
Key tax dates for 2016-17
Key tax dates for 2016-17Key tax dates for 2016-17
Key tax dates for 2016-17
 
Budget 2016 - what business wants to see
Budget 2016 - what business wants to seeBudget 2016 - what business wants to see
Budget 2016 - what business wants to see
 
Women in business: the path to leadership
Women in business: the path to leadershipWomen in business: the path to leadership
Women in business: the path to leadership
 
China or India
China or IndiaChina or India
China or India
 
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
Grant Thornton/ICAEW Business Confidence Monitor Q2 2014
 
Transaction Advisory services
Transaction Advisory servicesTransaction Advisory services
Transaction Advisory services
 
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
ICAEW/Grant Thornton Business Confidence Monitor Q4 2013
 
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
ICAEW/Grant Thornton UK Business Confidence Monitor Q3 2013
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Smart phone and mobile phone risks

  • 1. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Smarter Than You Think - a look at the evidence available from smart phones and mobile devices 26 June 2013
  • 2. Agenda • Introduction • Range of mobile devices available • Types of data • Case studies • GPS and Geotagging
  • 3. Agenda • Mobile Apps • The future of mobile devices • Relationship with other digital disciplines • Questions? • Recent press articles
  • 5. Mobile Devices • Embedded and reliant on mobile devices in our everyday lives – work, personal and leisure. • Mobile devices often overlooked as a source of potential evidence - awareness level for police constabularies and criminal investigations. • Individuals often unaware of hidden data stored! • Example – Audience participation with BlackBerry devices – Event Log
  • 6. How else are mobile devices used?
  • 7. Mobile Devices - Popularity • Research Firm Gartner – Suggest PC's are on the decline • Not a dip caused by squeeze on household incomes • 1.9 billion mobile devices to be sold in 2013, where 1 billion estimated will be smart phones • Social media access – Twitter feeds embedded into Bloomberg terminals at traders desks. Goes against the grain for reluctance of firms to allow access
  • 8. Manufacturers all have different OS causing complicating forensic investigations
  • 9. Why Mobile Device Investigations • Criminal & civil law examples - murder, sexual assault, violent crime, burglary, intent – sabotage and collusion, illicit images of children, financial fraud, commercial espionage, money laundering, and HR related issues. • Examinations need to be forensically sound to stand up in court with robust procedures (ACPO guidelines). • Recovery of deleted data. • Recovery of data from damaged mobile devices.
  • 10. © 2013 Grant Thornton UK LLP. All rights reserved. • SIM cards • Mobile Phone • Memory Card • USB dongle • Tablets • Watch phone Range of mobile devices & components
  • 11. Why Mobile Device Investigations • SIM cards – Subscriber data used to obtain billing records, contacts, call data, text messages. • Handset – Typically contacts, call logs, SMS text messages, MMS, emails, Internet history, Social Media, WiFi, Bluetooth, App data, Media (photos, videos and audio), voicemails (selected smart phones only), organiser information, eDocs, metadata and custom dictionary. • Memory cards – Typically media and backup of phone data
  • 13. Computer versus the Smart Phone – Any difference?
  • 15. Examples • Counterfeit and money laundering case – Suspect unhelpful in investigation and unwilling to provide handset code to device. • Commercial espionage – Individual hid data on memory card under phone casing. • Intelligence – Individual identified with fake passport at airport. Handset examined to assist in identity.
  • 17. Definitions and Problems • Global Positioning System (GPS) – activated on handset to locate geographical position. • Geotagging – adding metadata to media file. • How accurate especially in large cities? • Security issues – giving away location? • Social media issues – privacy and public domain? • False GPS co-ordinates can be generated by user. • Geotags can be edited to give false information.
  • 18. How easy is it?
  • 19. Hypothetical Situations? • Possible to frame innocent parties eg loading edited photo with fake co-ordinates to unsecured phone or website and tip off police. • Uploading of images to smart phone by military personnel – subsequently transferred to social media site. Potentially giving enemy access to location.
  • 21. What is an App? • An "App" is an application - software designed to run on a mobile device with limited function. • Shortcut to popular web based sites eg email. • 50 Billion Apps have been downloaded from the Apple store alone. • Equates to 7 apps per person on the planet. • 800 Apps per second are downloaded from Apple. • Data can be forensically retrieved from some Apps –but not all, due to the vast array encountered.
  • 22. What information is held? - Emails - Location - Social Media - Personal information - Degrees of contact - Web-based data
  • 23. Security Apps – problems for the investigator? Applications securing transmission of data to and from the handset
  • 25. Near Field Communication (NFC) – 4G handsets
  • 26. Google Glasses How will data be able to be extracted and forensically obtained? Types of Data – GPS, pairing with mobile devices, microphone, facial recognition?
  • 27. Relationship with Computer Forensics and eDisclosure
  • 28. Computer Forensics - Mobile devices synchronised with other electronic devices - Even without a physical mobile device, backups can exist on PC's for examination - Cloud based services
  • 29. © 2013 Grant Thornton UK LLP. All rights reserved. eDisclosure Trends • Increasing use of social media • Proactive information management • Ever increasing volumes of data • Further disparate sources of data • Thousands of emails can be extracted from smart phones – easy method to screen data via eDisclosure review platforms
  • 30. © 2013 Grant Thornton UK LLP. All rights reserved.© 2013 Grant Thornton UK LLP. All rights reserved. Any Questions?
  • 31. UK Newspaper Articles Examples of mobile devices and their evidential use
  • 32. Mobile Devices in the News – Extracts from the UK Press
  • 33. Mobile Devices in the News
  • 34. Mobile Devices in the News
  • 35. Mobile Devices in the News
  • 36. Mobile Devices in the News
  • 37. Mobile Devices in the News
  • 38. Mobile Devices in the News
  • 39. Mobile Devices in the News
  • 40. Mobile Devices in the News
  • 41. Mobile Devices in the News
  • 42. Mobile Devices in the News
  • 43. Mobile Devices in the News
  • 44. Mobile Devices in the News
  • 45. © 2013 Grant Thornton UK LLP. All rights reserved. Contact Chris Clements Partner and Head of UK Regions Forensic & Investigation Services +44 (0) 7968 33 88 95 chris.m.clements@uk.gt.com Bruce Keeble Executive Forensic & Investigation Services +44 (0)7891 433 223 bruce.h.keeble@uk.gt.com