Law enforcement agencies around the country are using the International Mobile Subscriber Identity locator (IMSI catcher), known as Stingray, to track cellphone users for the purpose of assisting criminal investigations. Privacy advocates are worried about widespread police tracking of cellphones and violations of public privacy.
At the murder trial of Jordan Graham, accused of pushing her new husband, Cody Johnson, to his...
Soooo … last week I was listening to the Forenisc Lunch and the topic of parsing deleted records...
The relevance of text messages continues to grow as an important component of e-discovery. At...
Up to five Nissan North America information security employees could also do double duty as reserve sheriff’s deputies, assisting investigators on forensics cases as part of a first-ever arrangement between the automaker and the Williamson County Sheriff’s Department.
Major crime in New York City inched up this year, and Mayor Michael Bloomberg fingered the culprit: too many iPhones and iPads were being swiped. A rise in thefts of shiny Apple products accounted for the slight increase in the city’s annual crime index, a statistic that covers a number of felonies, including murder, grand larceny and robbery.
What if the Kennedy assassination had happened during the era of smartphones and laptops? And, assuming the perpetrator left a digital trail, would that evidence uncover any associated conspiracy?
Back in July 2013, The Washington Post reported that nearly a decade ago, the NSA developed a new technique that allowed spooks to “find cellphones even when they were turned off.” Many security researchers scratched their heads trying to figure out how this could be so.
I see a lot of these databases in my mobile phone exams. They can contain emails, text messages, app data and more. It's also not uncommon to run into them on Windows (and Mac) exams as well — think Google Chrome History which is stored in an SQLite database.
One of the important tasks while performing mobile application security assessments is to be able to intercept the traffic (Man in The Middle, MiTM) between the mobile application and the server by a web proxy like Fiddler, Burp etc. This allows penetration tester to observe application behavior, modify the traffic and overcome the input restrictions enforced by application’s user interface to perform a holistic penetration test.
Better technology means a more mobile society. Digital devices make life easier, but they also open the door for computer hackers and other cyber criminals. The growing threat of cyber attacks and the increased need for mobile security has led to a boom in the cyber security and digital forensic industries.
To developers, advertising frameworks may just be another way to make money from their free applications, but in at least one case — dubbed "Vulna" by security firm FireEye — the library has functionality that allows attackers to steal private data from a targeted phone and opens vulnerabilities that could be exploited by hackers.
An Android application that I assessed recently had extensive cryptographic controls to protect client-server communication and to secure its local storage. To top that, its source code was completely obfuscated. Combined, these two factors made the application a great candidate for reversing.
As a result of the Android's secure architecture, forensic examiners do not have a built-in mechanism we can use on the phone to extract core user data. Instead, new techniques must be developed which require some interaction with the device. There are four primary ways to approach forensics on an Android device.
When a California college student was shot dead by a stranger on a crowded commuter train in San Francisco last month, none of the dozens of passengers on board saw it coming — they were too absorbed in their mobile devices, officials say.
The Mountain View, Calif., Police Department put a new cellphone tracking application from Polaris Wireless through its paces recently, using it to monitor the location of its officers during a two-day concert in the Silicon Valley community.
One afternoon, security researcher Hristo Bojinov placed his Galaxy Nexus phone face up on the table in a cramped Palo Alto conference room. Then he flipped it over and waited another beat. And that was it. In a matter of seconds, the device had given up its "fingerprints."
Forensic examination of a handset that has received a snap is not the only means by which investigators could gain access to photos. In some instances it is possible to grab the images from the servers before the recipient(s) open them.
Magnet Forensics has announced the release of INTERNET EVIDENCE FINDER (IEF) v6.2. The latest release adds new features, new Internet artifacts, and artifact updates for both IEF Standard and IEF Advanced editions. Newly introduced in IEF v6.2 is the Dynamic App Finder feature
In the HBO hit series The Wire, disposable cell phones were the bane of detectives' lives. The Baltimore Police detectives' inability to tap the phones stymied their investigation into one of the city's most ruthless crime families—until they found a way to track the devices. The National Security Agency may have made a similar breakthrough.
Cellebrite has announced the launch of the UFED 4PC and UFED TK. UFED 4PC is designed for customers who require a convenient, cost-effective way to extract and analyze mobile forensic data on a single PC of their choosing. UFED TK supports users who seek to extract and analyze mobile forensic data on a pre-configured PC hardware platform.
SnapChat may be an ingenious little program, but it perplexes ediscovery experts and general counsel: are “snaps” discoverable? Do parties have a duty to preserve snaps when they have little to no control over the “deletion” of the data? And even when snaps can be recovered, is the cost too burdensome?
With cellphones immersed in everyday life, they are also becoming part of the daily investigative processes of law enforcement. Gary Cofflin, chief deputy investigator of the Carroll County State’s Attorney’s Office in Maryland, said the prosecutor’s office is using cellular forensics to assist law enforcement in investigations almost daily.
Stevenson University’s Master’s programs in Cyber Forensics, Forensic Science, and Forensic Studies presents its annual Forensics Symposium exploring the budding field of mobile forensics. Michael Robinson, the program’s coordinator, will lead the discussion on how forensics plays a key role in outsmarting smartphone-related crimes.
Some researchers from Trustwave, an application security firm, issued a security advisory back in August, warning users that the SATIS smart toilet Android application contained a hard-coded BlueTooth verification pin. The pin is “0000,” and entering it could allow an attacker within BlueTooth range to manipulate some of the toilet’s features.
Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6 percent increase from 2013, according to Gartner, Inc. This results in every budget being an IT budget; every company being a technology company; every business is becoming a digital leader; and every person is becoming a technology company. This is resulting in the beginning of an era: the Digital Industrial Economy.
The Hamilton Police Technology Crime Unit in Ontario, Canada labors behind a locked door, amid a sea of police officers, and you can't get there without a badge or an escort. Even then, they get mighty nervous when a reporter and photographer show up for a shoot; the officers won't let their photos be taken and the entire lab — with the exception of one, mostly empty, work bench — is off limits for pictures.
Ben Ashford, former journalist at Rupert Murdoch's The Sun newspaper is the first person to be charged under Operation Tuleta, a Metropolitan Police investigation that is being run alongside inquiries into alleged corrupt payments to public officials, computer hacking and other privacy breaches.
The Mobile Phone Examiner Plus v.5.4 software release adds iOS 7 devices to its extensive list of supported devices. In addition, this MPE+ release introduces several new advances in iOS device handling. Mobile forensics examiners can now unlock devices using keys that can be found in any computer where the device was previously synced, and examiners can enter known passwords directly into the MPE+ interface to decrypt data on the fly.
- Page 1