SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Security for Mobile Devices
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
POSSIBLE THREATS TO DATA
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
B LACKBERRY VS. I P HONE By: Hailey Gergely. I P HONE VS. B LACKBERRY Blackberry Costs: 36 month contract – $ month contract – $ month.
Edmodo: A Guide for Getting Started Presented by: Kristi Shaw Assistant Professor-Educational Technology Marian University
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Edmodo Training A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect.
A Guide for Getting Started
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Methods of communication
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Crimes.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. iOS.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
In addition to Word, Excel, PowerPoint, and Access, Microsoft Office® 2013 includes additional applications, including Outlook, OneNote, and Office Web.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Specialist communication channel. Sarah-Jane king.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Edmodo Training A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
IPhone to Galaxy Transfer
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
A Guide for Getting Started
PhoneSheriff – Best Parental Control Software For Mobiles and Tablets
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
HOW DO I KEEP MY COMPUTER SAFE?
Bethesda Cybersecurity Club
Multi-Factor Authentication
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations

About McCann Total Security Solutions McCann Investigations Private Investigations Digital Forensics Background Research Litigation Support McCann Security TSCM (Bug Sweeps) Cyber Security Solutions Cyber Security Audits Physical Security Systems Remote Monitoring

Cases Family Law Contentious Divorce Child Custody Domestic Violence Fraud Intellectual Property Theft Embezzlement Non Compete Enforcement Network Breach Hack Spyware Malware

Smart Phones are SMART! Smart phones are essentially small handheld computers They have become essential to communication in both personally and professionally Retain more data than you realize

Forensic Imaging…. Is NOT a simple copy of all of the information on the phone Is a complete “snap shot” of all of the data on the phone, including the operating system and files that can’t be seen easily PRESERVE THE DATA Power the phone off If possible, remove the battery If it’s an iPhone, power it down **If you are afraid of a remote wipe, wrap in several layers of aluminum foil**

Passwords iPhone 6 and up Android phones are easier to get, unless they encrypt the entire phone Some Blackberries are on Android platform, however has a lot of encryption. Are most secure. Passwords can be sometimes be bypassed on older phones. NOTE: Our ability to forensically image a phone is dependent on the updates from developers. If the user keep their phones updated, chances are we can’t get into it without a password.

Evidence in Backups Key evidence from a mobile device can sometimes be found on the computer in the form of a backup. Most mobile device backups can be parsed by the same analysis tools used for mobile devices. Backups are typically unencrypted and have no password protection.

Spyware and Malware on Smart Phones iPhones Relatively difficult to remotely install spyware/malware Security apps such as Lookout work well Spyware turns on iCloud back-ups every 15 minutes, GPS, text iPhones asks a lot of questions and prompts that prevents an automated install Androids and Windows-based Phones Only partially locked down out of the box Can click on a link to download spyware automatically Spyware can be remotely erased (can send a kill signal), but leaves tell tale signs.

What Data is Obtainable? Mobile Device Forensics: A Deeper Dive

What Can Be Pulled from the Device (Best case scenario from logical tools) Phone hardware information Network information Text messages sent, received, deleted, origination number (depends on phone) GPS GeoLocation Contacts Call History and Details (To/From) Call Durations Text Messages with identifiers (sent-to, and originating) Sent, received, deleted messages Multimedia Text Messages with identifiers Photos and Video Sound Files s and attachments, memos, calendars, documents, etc. Social Networking Data Cached login credentials (sometimes, but not always)

QUESTIONS?

Malisa Vincenti Private Investigator Office: (800) Mobile: (832)