Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.
The Texas Court of Criminal Appeals has ruled that law enforcement officials do need a warrant...
NIST's National Cybersecurity Center of Excellence has proposed two new cybersecurity building...
Cellebrite, a leading provider of mobile forensic and mobile data transfer solutions, shares its...
Magnet Forensics has released Internet Evidence Finder™ (IEF) v6.3. Key release updates include enhanced tools for investigation of pictures; additional support for volume shadow copies, support for an expanded range of mobile chat and social networking artifacts; as well as support for analysis of Kindle Fire tablets.
Android is one of the most open, versatile, and customizable mobile operating systems out there. Android is a Linux-based operating system with market share — 79.70 percent in smart phones. Android is a software stack for mobile devices that includes an operating system, middleware and key applications.
Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s authentication code that accidentally bypasses the rest of it.
It is very important that the digital evidence be preserved from the time of seizure until it is presented as evidence in court. If evidence is suspected of being tampered with, it could be ruled as inadmissible in court. Therefore, it is important for CCEs to preserve digital evidence by using a Faraday bag and noting its usage on the chain of evidence form.
I was handed a device I’ve never seen before: A Verizon Ellipsis 7" tablet. The device was suspected to be stolen, but it was password locked with no sd card or sim card installed. USB debugging and mass storage mode were disabled, too, checked by plugging the device into a computer while the device was booted into the normal operating system. What to do now?
When Jesse Potter, a chemical-weapons specialist with the US Army’s 10th Mountain Division, returned from Iraq in 2008, he dedicated himself to becoming one of the Army’s first new specialists in spectrum warfare — the means by which a military seizes and controls the electromagnetic radiation that makes all wireless communication possible.
Too often smartphone devices are overlooked as investigators focus solely on computer hard drives. As the mobile device market continues to grow and evolve, an investigator’s task of uncovering evidence will be that much harder. Staying current through education and hands-on training courses is cruicial.
One of the tasks I’m asked to perform is to geolocate mobile phone calls from Call Detail Reports (CDR). These usually arrive from a carrier as spread sheets: one with details of calls to and from a particular number, and one or more cell tower listings. By far the easiest and most flexible way to process these records is by importing them into a SQLite database.
It has been quite evident during my R&D to develop a better solution to combat the rapidly changing dynamic of smart device collections one critical observation. The days of quick and dirty forensics is over.
California State Senator Mark Leno has introduced a bill that, if passed, will require makers of mobile communications devices sold in the state after January 1, 2015 to include technology that can render such devices inoperable when lost or stolen. The mandated technology, commonly referred to as a "kill switch," may be implemented in software or hardware, but must be able to survive a factory reset.
Prepaid phones have been a problem for some time, and continue to be a problem for law enforcement in particular. That’s because the disabled data port on these devices cannot be enabled, and vendors don’t make the devices’ APIs available to commercial forensic extraction tools’ developers.
ElcomSoft Co. Ltd. has updated its iOS Forensic Toolkit, adding physical acquisition support for jailbroken iOS 7 devices. Physical acquisition support is now available for jailbroken devices running Apple iOS 7 including iPhone 4S, 5 and 5C, iPad 2nd to 4th gen, iPad Mini, iPod Touch 5th gen, and either having no passcode protection or carrying a jailbreak installed.
How pervasive is the mobile malware threat? New research shows that malicious code is infecting more than 11.6 million mobile devices at any given time, putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control.
Ninety percent of all Americans own a cellular phone. Having this kind of societal importance and wide distribution, it is not surprising that cellular phones and handheld devices are being widely used in even the most minor criminal activity. These devices can provide significant evidence in major cases.
Security experts have long warned that users should be more concerned about the sometimes excessive personal data that some apps take from their hosts. Now it seems that criminals and advertisers are not the only people interested in this information: NSA and GCHQ have been developing the ability to take advantage of leaky mobile apps.
During recent research into Android SQLite databases (eg sms), Mari DeGrazia discovered a bug in the sms-grep.pl script. Mari's test data was from a Samsung Galaxy S II. It turns out the script wasn't handling Cell Header "Serial Type" values of 8 or 9.
FireEye Labs has recently discovered six variants of a new Android threat that steals text messages and intercepts phone calls. We named this sample set “Android.HeHe” after the name of the activity that is used consistently across all samples.
Stephen Swabey has joined CCL’s cell site analysis team, making it the largest concentration of full time, salaried cell site experts in the UK. Following intensive training in forensic interpretation, to give robust, unbiased and sound interpretive evidence, Stephen has now begun working on live cases, bringing the number of full-time, salaried cell site experts in CCL’s team up to four.
Not satisfied with how your forensic tools are currently presenting Facebook (v3.3 for Android)/ Facebook Messenger (v2.5.3 for Android) messages and contacts? Would you also like a GoogleMaps URL that plots each message using available geographic metadata? Or maybe you're just curious about how Facebook/ Facebook Messenger stores contacts/messages on Android devices? If so, read on! If not, then there's nothing to see here ... move along.
A researcher looked at the security of home banking apps, and found shocking results. Forty home banking apps from the top 60 most influential banks in the world were tested and found to have major security weaknesses.
More law enforcement agencies are doing more with less, but digital evidence keeps growing. Many digital evidence labs are backlogged. Some agencies are responding by asking personnel to wear more hats: computer forensics tasked with mobile forensics, investigators tasked with some digital evidence analysis. Therefore, asking for or obtaining all the evidence on every mobile device is less and less realistic.
Oxygen Forensic Suite 2014 v.6.0 targets gang offences greatly improving the analysis of multiple mobile devices within a case. New analysis options allow investigating interactions occurring among users of multiple mobile devices, while the improved Timeline view is now able to display all events occurring during a certain time period in a single view regardless of the number of mobile devices in the case.
The debate over the NSA's collection of millions of Americans' telephone records fell squarely into the courts when a federal judge in Manhattan upheld the legality of the program, citing its need in the fight against terrorism.
A security hole in popular photo messaging service Snapchat could allow attackers to find the phone numbers of many users in a short period of time, according to Gibson Security, a computer security research group.
The Black Hole Data Bag VECTOR Kit is designed to shield wireless devices from RF signals while being examined or charged. The Data Bag is an innovative solution that replaces the need for a hard-sided faraday enclosure. With the new VECTOR addition, capacitive touch screen devices can be operated directly with a finger or with the provided stylus.
- Page 1