Welcome!

News Feed Item

CORRECTION - Cellebrite: Cellebrite Research Reveals Top Trends Shaping Mobile Forensics: Multi-Device, Field Analysis, Social Evidence, Big Data and Malware

Industry Research Study Delivers Outlook for Mobile Forensics

PETAH TIKVAH, Israel and PARSIPPANY, New Jersey, February 28, 2014 /PRNewswire/ --

In the news release, "Cellebrite Research Reveals Top Trends Shaping Mobile Forensics: Multi-Device, Field Analysis, Social Evidence, Big Data and Malware" issued on 26 Feb 2014 11:00 GMT, by Cellebrite over PR Newswire, we are advised by a representative of the company that the link to the company website has been corrected. Complete, corrected release follows:

Cellebrite, the leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year.

     (Logo: http://photos.prnewswire.com/prnh/20140202/667552 )

Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry. According to the research, the following trends will directly shape mobile forensics in the months to come:

  1. Consumers Increasingly Rely on Multiple Devices: Investigators are likely to find themselves analyzing data from more than one cellular phone, tablet, GPS device and other mobile media, not just per case but also per person. As a result, mobile forensic investigations have outpaced computer forensics, with the ratio increasing by as much as threefold over the past three years. "This trend shows that as mobile devices become more powerful and easier to use, more people depend on them to manage different aspects of their work and personal lives," said Cindy Murphy, a detective with the Madison Wisconsin Police Department. "That means that investigators need ways to manage multiple sources of data to obtain a full picture of each person's life, in the time frame that they need the information most."
  2. Extraction and Analysis Go Local, Shifting from the Lab to the Field: Due to the rapid increase in mobile device evidence, law enforcement agencies can no longer rely solely on forensic labs at the state and federal levels. Whether as part of a search incident to arrest, the forensic preview of digital media during execution of a search warrant or a consent to search while evaluating a complaint, almost 44 percent of survey respondents now extract mobile data in the field. "Digital forensics is becoming democratized," said D/Sgt Peter Salter of the Police Service of Northern Ireland eCrime Unit. "Specialized expertise will always be an important strategic element within overall capability to produce robust evidence for court. However, specialists and case investigators alike both benefit from having the capability to examine exhibits locally and on the frontline. Within agreed procedures, this approach enables investigators to determine which exhibits require more in-depth investigation, as well as provide frontline investigators with rapid, controlled access to digital evidence in order to inform their critical decision making."
  3. Mobile Evidence Gets Social, Data Sources Diversify: There are approximately 1.19 billion active users on Facebook, 300 billion tweets sent on Twitter monthly, and 16 billion photos shared on Instagram monthly. Additionally, 2013 saw more than 100 billion downloads of mobile applications. The result? Data living in social applications has become critically important as the number of criminal investigations involving data collected from these applications rose significantly. Cellebrite's survey revealed that 77 percent of respondents believed that mobile apps were the most critical data source, followed by the cloud at 71 percent. "Documenting different communication channels that are part of a crime (e.g., Facebook, YouTube, etc.), as well as those that can lead to new witnesses, victims, suspects and alternate perpetrators is becoming more important," said John Carney, Chief Technology Officer at Carney Forensics. "It is necessary to contextualize mobile device data with social data from people's online personas."
  4. Big Data, Focused Analytics: With the amount of digital evidence growing from gigabytes to terabytes in many cases, data analytics becomes even more crucial in understanding mobile evidence. Investigators need to be able to separate relevant data from the inconsequential, and then easily understand and explain the differences to themselves, colleagues, barristers/attorneys and jurors. "The ability to visualize timelines, geographical locations, and content can make all the difference in how jurors, barristers/attorneys, and others perceive the relevance of data we extract," said Simon Lang, Digital Forensic Manager with SYTECH.
  5. Mobile Malware Impacts Civil and Criminal Investigations: In 2013, Cellebrite's panel of industry experts predicted a rise in mobile malware and the resulting need for forensics examiners to understand how to recognize and analyze it together with other evidence. "Malware as a factor in fraud, intimate partner abuse, theft of intellectual property and trade secrets and other crimes is something that all investigators will need to consider with every mobile device they encounter," said Carlos Cajigas, Training Director and Senior Forensic Examiner with EPYX Forensics. "Training and practical experience are necessary to develop the level of proficiency investigators need to make these assessments."

"The rise in mobile phone usage and consumer reliance on these devices has directly increased the complexity of criminal investigations," said Ron Serber, Cellebrite co-CEO. "In order to ensure that collected mobile data translates into forensically sound evidence, awareness, education and training will be critical for the mobile forensics industry this year."

Findings are based on a combination of survey responses and interviews with industry leaders. The following mobile forensics experts were interviewed as part of Cellebrite's research:

  • Carlos Cajigas - Training Director and Senior Forensic Examiner, EPYX Forensics
  • John Carney - Chief Technology Officer, Carney Forensics
  • Cindy Murphy - Detective Computer Crimes/Computer Forensics, Madison Wisconsin Police Department
  • Simon Lang - Digital Forensic Manager, SYTECH
  • Peter Salter - Detective Sergeant, Police Service of Northern Ireland eCrime Unit
  • Ron Serber - Co-CEO, Cellebrite

To read Cellebrite's complete industry outlook, visit: http://www.cellebrite.com/collateral/OUTLOOK_FOR_THE_MOBILE_FORENSICS_INDUSTRY_2014_WP.pdf

To learn more about Cellebrite's mobile forensics solutions, visit: http://www.cellebrite.com/mobile-forensics.

About Cellebrite:

Founded in 1999, Cellebrite is a global company known for its technological breakthroughs in the cellular industry with dedicated operations in the United States, Germany, Singapore, and Brazil. A world leader and authority in mobile data technology, Cellebrite established its mobile forensics division in 2007, introducing a new line of products targeted to the law enforcement sector. Using advanced extraction methods and analysis techniques, Cellebrite's Universal Forensic Extraction Device (UFED) is able to extract and analyze data from thousands of mobile devices, including feature phones, smartphones and GPS devices.  Cellebrite's UFED is the tool of choice for thousands of forensic specialists in law enforcement, military, intelligence, security and government agencies in more than 100 countries.

Cellebrite is a wholly-owned subsidiary of the Sun Corporation, a listed Japanese company (6736/JQ).

SOURCE Cellebrite

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In the rush to compete in the digital age, a successful digital transformation is essential, but many organizations are setting themselves up for failure. There’s a common misconception that the process is just about technology, but it’s not. It’s about your business. It shouldn’t be treated as an isolated IT project; it should be driven by business needs with the committed involvement of a range of stakeholders.
SYS-CON Events announced today that MobiDev will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 200 develope...
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
SYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...