Welcome!

Article

Cellebrite Research Reveals Top Trends Shaping Mobile Forensics: Multi-Device, Field Analysis, Social Evidence, Big Data and Malware

Industry Research Study Delivers Outlook for Mobile Forensics

PETAH TIKVAH, Israel and PARSIPPANY, New Jersey, February 26, 2014 /PRNewswire/ --

Cellebrite, the leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year.

(Logo: http://photos.prnewswire.com/prnh/20140202/667552 )

Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry. According to the research, the following trends will directly shape mobile forensics in the months to come:

  1. Consumers Increasingly Rely on Multiple Devices: Investigators are likely to find themselves analyzing data from more than one cellular phone, tablet, GPS device and other mobile media, not just per case but also per person. As a result, mobile forensic investigations have outpaced computer forensics, with the ratio increasing by as much as threefold over the past three years. "This trend shows that as mobile devices become more powerful and easier to use, more people depend on them to manage different aspects of their work and personal lives," said Cindy Murphy, a detective with the Madison Wisconsin Police Department. "That means that investigators need ways to manage multiple sources of data to obtain a full picture of each person's life, in the time frame that they need the information most."
  2. Extraction and Analysis Go Local, Shifting from the Lab to the Field: Due to the rapid increase in mobile device evidence, law enforcement agencies can no longer rely solely on forensic labs at the state and federal levels. Whether as part of a search incident to arrest, the forensic preview of digital media during execution of a search warrant or a consent to search while evaluating a complaint, almost 44 percent of survey respondents now extract mobile data in the field. "Digital forensics is becoming democratized," said D/Sgt Peter Salter of the Police Service of Northern Ireland eCrime Unit. "Specialized expertise will always be an important strategic element within overall capability to produce robust evidence for court. However, specialists and case investigators alike both benefit from having the capability to examine exhibits locally and on the frontline. Within agreed procedures, this approach enables investigators to determine which exhibits require more in-depth investigation, as well as provide frontline investigators with rapid, controlled access to digital evidence in order to inform their critical decision making."
  3. Mobile Evidence Gets Social, Data Sources Diversify: There are approximately 1.19 billion active users on Facebook, 300 billion tweets sent on Twitter monthly, and 16 billion photos shared on Instagram monthly. Additionally, 2013 saw more than 100 billion downloads of mobile applications. The result? Data living in social applications has become critically important as the number of criminal investigations involving data collected from these applications rose significantly. Cellebrite's survey revealed that 77 percent of respondents believed that mobile apps were the most critical data source, followed by the cloud at 71 percent. "Documenting different communication channels that are part of a crime (e.g., Facebook, YouTube, etc.), as well as those that can lead to new witnesses, victims, suspects and alternate perpetrators is becoming more important," said John Carney, Chief Technology Officer at Carney Forensics. "It is necessary to contextualize mobile device data with social data from people's online personas."
  4. Big Data, Focused Analytics: With the amount of digital evidence growing from gigabytes to terabytes in many cases, data analytics becomes even more crucial in understanding mobile evidence. Investigators need to be able to separate relevant data from the inconsequential, and then easily understand and explain the differences to themselves, colleagues, barristers/attorneys and jurors. "The ability to visualize timelines, geographical locations, and content can make all the difference in how jurors, barristers/attorneys, and others perceive the relevance of data we extract," said Simon Lang, Digital Forensic Manager with SYTECH.
  5. Mobile Malware Impacts Civil and Criminal Investigations: In 2013, Cellebrite's panel of industry experts predicted a rise in mobile malware and the resulting need for forensics examiners to understand how to recognize and analyze it together with other evidence. "Malware as a factor in fraud, intimate partner abuse, theft of intellectual property and trade secrets and other crimes is something that all investigators will need to consider with every mobile device they encounter," said Carlos Cajigas, Training Director and Senior Forensic Examiner with EPYX Forensics. "Training and practical experience are necessary to develop the level of proficiency investigators need to make these assessments."

 

"The rise in mobile phone usage and consumer reliance on these devices has directly increased the complexity of criminal investigations," said Ron Serber, Cellebrite co-CEO. "In order to ensure that collected mobile data translates into forensically sound evidence, awareness, education and training will be critical for the mobile forensics industry this year."

Findings are based on a combination of survey responses and interviews with industry leaders. The following mobile forensics experts were interviewed as part of Cellebrite's research:

  • Carlos Cajigas - Training Director and Senior Forensic Examiner, EPYX Forensics
  • John Carney - Chief Technology Officer, Carney Forensics
  • Cindy Murphy - Detective Computer Crimes/Computer Forensics, Madison Wisconsin Police Department
  • Simon Lang - Digital Forensic Manager, SYTECH
  • Peter Salter - Detective Sergeant, Police Service of Northern Ireland eCrime Unit
  • Ron Serber - Co-CEO, Cellebrite

 

To read Cellebrite's complete industry outlook, visit: http://www.cellebrite.com/collateral/OUTLOOK_FOR_THE_MOBILE_FORENSICS_INDUSTRY_2014_WP.pdf

To learn more about Cellebrite's mobile forensics solutions, visit: http://www.cellebrite.com/mobile-forensics.

About Cellebrite:

Founded in 1999, Cellebrite is a global company known for its technological breakthroughs in the cellular industry with dedicated operations in the United States, Germany, Singapore, and Brazil. A world leader and authority in mobile data technology, Cellebrite established its mobile forensics division in 2007, introducing a new line of products targeted to the law enforcement sector. Using advanced extraction methods and analysis techniques, Cellebrite's Universal Forensic Extraction Device (UFED) is able to extract and analyze data from thousands of mobile devices, including feature phones, smartphones and GPS devices.  Cellebrite's UFED is the tool of choice for thousands of forensic specialists in law enforcement, military, intelligence, security and government agencies in more than 100 countries.

Cellebrite is a wholly-owned subsidiary of the Sun Corporation, a listed Japanese company (6736/JQ).

SOURCE Cellebrite

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
"Splunk basically takes machine data and we make it usable, valuable and accessible for everyone. The way that plays in DevOps is - we need to make data-driven decisions to delivering applications," explained Andi Mann, Chief Technology Advocate at Splunk and @DevOpsSummit Conference Chair, in this SYS-CON.tv interview at @DevOpsSummit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.