Tuesday, October 16, 2012

Getting forensics data off smartphones, tablets can be tough, experts ...

iphone5b Getting forensics data off smartphones, tablets can be tough, experts say

Trying to get computer forensics data out of mobilesmartphones?and tablets in order to conduct investigations is hard ? often much harder than on PCs, laptops or Macs ? and experts say that forensics tools need to improve.

?The investigation tools for mobile are not at the same level of granularity you can get on tools for desktops,? says David Nardoni, a director in PricewaterhouseCoopers? Forensic Services practice. Other experts agree, and also note that the BYOD trend only adds to the problem.

Forensics experts say they want to do both ?physical? and ?logical? acquisition of data. This means grabbing operating system files, device memory and other technical information, plus personal email or documents or phone data. They typically need a PIN code to access the device. But the state of the art in computer forensics tools and the proliferation of mobile devices all makes this hard. And unlike with?Windows-based computers, for example, you can?t just take out the hard drive, they note.

There are mobile-device forensics tools out there, such as Ufed from?Cellebrite, the?Katana Forensics?tool Lantern, Blacklight Forensics Software,?Paraben?s Device Seizure, and?Micro Sytemation?s XRY. But they aren?t comprehensive in the exact make and model of GoogleAndroid,?Apple?iOS device or other mobile device models they can tackle, says Darren Hayes, a professor at Pace University who teaches computer forensics courses.

It?s all a bit hit-and-miss, and Hayes estimates that less than 40% of the smartphone models out there today can be imaged. The way that Android manufacturers have fragmented that operating system is a factor, and on the Apple iOS side, the?security?is proving so effective that bypassing the PIN is a challenge for investigators, he notes.

This comes at a time when both corporate examiners who conduct this forensics work, as well as law enforcement, have greater need than ever to get accurate, complete images off mobile devices as part of an investigation that will hold up under legal scrutiny.

Hayes notes that law enforcement officials are known to be meeting with Apple and manufacturers of Android mobile devices to talk about the issues. So far there?s been little indication of any answers, he says.

Andrew Hoog, co-founder and chief investigative officer at Chicago-based startup viaForensics, which specializes in mobile-device forensics services, agrees that the fragmentation of the Android operating system ? there are now well over 800 Android devices without the same OS ? contributes to the forensics problem. Android is generally easier to break into than Apple iOS, though, he adds.

Jailbroken Apple iOS devices are easier to do forensics on than ones not jailbroken, he notes, but points out that Apple?s iOS 6 is now presenting ?a big barrier? because Apple?s security has so far been quite good, and viaForensics, which has a tool called Extract, hasn?t broken through the passcode control and the encryption. ?We cracked?Android encryption,? he adds.

The Department of Homeland Security has recognized that there are insufficient tools for mobile-device forensics, and viaForensics picked up some funding toward that. The startup has?open-sourced?some technology and commercial products are coming out, such as a planned agent software for Android that could be used as a forensics tool.

Hoog says he?s involved in several cases with businesses trying to get into mobile devices to find out about possible data theft, for example. The BYOD trend, in which employees uses their own mobile devices at work, is really complicating forensics work, he emphasizes. ?You don?t have ownership of that device,? he says, and by allowing BYOD, the business may have ?lost control. And you can?t just grab control ? you need policies that include security and auditing of the device.?

Getting forensics data off smartphones, tablets can be tough, experts say.

Source: http://www.sytech-consultants.com/blog/2012/getting-forensics-data-off-smartphones-tablets-can-be-tough-experts-say?utm_source=rss&utm_medium=rss&utm_campaign=getting-forensics-data-off-smartphones-tablets-can-be-tough-experts-say

saints willis mcgahee willis mcgahee ship aground off italy nfl playoff schedule 2012 nfl live saints vs 49ers

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.