SlideShare a Scribd company logo
Bridging the gap between mobile and computer forensics
Paul Slater
Carl Barron
Mark Wootton
March 1, 2017 COPYRIGHT NUIX 2017 2
Speakers
Paul Slater
Global Head of Investigations, Nuix
Paul Slater is a subject matter expert with over 20 years of experience in investigations, digital forensics, and eDiscovery. Paul has held senior roles
within law enforcement, corporate and "Big 4" advisories and was a member of the review board for the Association of Chief Police Officers (ACPO)
“Good Practice Guide for Digital Evidence.” Paul also served for two years as interim head of the Digital Forensics Unit in the primary UK agency for
investigating and prosecuting serious and complex fraud, where he designed workflows and implemented technologies to enable them to process
20 times more electronic evidence each year. Paul now uses his expertise to enable Nuix customers to 'master their data' through the design, build,
and implementation of digital forensic and eDiscovery solutions.
Carl Barron
Senior Solutions Consultant, Nuix
Carl is a Senior Solutions Consultant with Nuix, having joined the company in March 2012. He provides pre and post-sale consultancy, technical
support and solution implementation. Carl brings a wide variety of knowledge in both hardware and software with an enthusiast approach to help
customers improve workflows. Prior to joining Nuix, Carl worked as a Forensic Technician for a leading Litigation Support Vendor in London.
Mark Wootton
eDiscovery Manager, Yerra Solutions
Mark is an eDiscovery Manager with over 20 years of experience as an expert investigator. He specialises in the collection, examination and
presentation of electronic information as evidence for both corporate and law enforcement investigations. Mark has a skill set in complex criminal
investigations to include money laundering, fraud and financial matters and an absolute passion and drive for delivering quality evidence that
assists companies in making risk based decisions.
March 1, 2017 COPYRIGHT NUIX 2017 3
Today’s Agenda
Introduction
Survey/Poll - Growth of mobile devices
Mobile devices in Investigations
Some of the Challenges
Use Cases
Mobile devices in Nuix
Questions
March 1, 2017 COPYRIGHT NUIX 2017 4
What percentage of UK Adults now owns a smartphone?
38%
47%
71%
68%
March 1, 2017 COPYRIGHT NUIX 2017 6
In 2015 – Globally – on average how many text messages were sent?
1 Trillion each year
10 Billion each day
23 Billion each day
50 Billion over the year
March 1, 2017 COPYRIGHT NUIX 2017 7
How many minutes on average does a smartphone user spend on
their phones each day?
60 minutes
225 minutes
145 minutes
90 minutes
March 1, 2017 COPYRIGHT NUIX 2017 9
Mobile statistics
March 1, 2017 COPYRIGHT NUIX 2017 10
...But what does all this have to do with Investigations?
Many 'smart' devices automatically add GEO-TAGging information to our photographs...
Exhibit 1 – Mobile phone
So we can see where
people have been…
Exhibit 2 - Map
March 1, 2017 COPYRIGHT NUIX 2017 11
...But what does all this have to do with Investigations?
Exhibit 3 – Picture Data
And when they were there....
Exhibit 4 - Suspects
Exhibit 3a – EXIF Data
And often – who they
were with!
March 1, 2017 COPYRIGHT NUIX 2017 12
Exhibit 5 – Cell Tower Analysis
And because most smart phones also track our
physical movements (either overtly or
covertly)....we can see where people have been
Exhibit 5 – Cell Tower Analysis
March 1, 2017 COPYRIGHT NUIX 2017 13
#1 Forensic Acquisition is slow and costly
Exhibit 6 - Challenges
March 1, 2017 COPYRIGHT NUIX 2017 14
#1 Forensic Acquisition is slow and costly
Exhibit 7 – Usual Suspects
?
March 1, 2017 COPYRIGHT NUIX 2017 15
#1 Forensic Acquisition is slow and costly
Forensic Acquisition Notes:
Device : iPhone 64GB
Start time : 12:00 hrs
End time : 18:00 hrs
Exhibit 21 – Phone Report
March 1, 2017 COPYRIGHT NUIX 2017 16
#2 And Difficult
March 1, 2017 COPYRIGHT NUIX 2017 17
#2 And Difficult
“On devices running iOS 8 and
later versions, your personal
data is placed under the
protection of your passcode. For
all devices running iOS 8 and
later versions, Apple will not
perform iOS data extractions in
response to government search
warrants because the files to be
extracted are protected by an
encryption key that is tied to the
user’s passcode, which Apple
does not possess.”
Apple Inc 2016
iOS Physical Acquisition
Technique only works on
jailbroken 32bit devices or 32bit
devices with known passcode
than can be jailbroken by
investigator.
*No current jailbreak for latest
version of iOS
(*accurate at time of writing)
iOS Logical Acquisition
If a passcode is known (or there
is a way of finding it out) the
investigator can cause the
device to produce an offline
backup via iTunes. This backup
can subsequently be analysed –
with some restrictions.
iCloud – “Over the Air”
Acquisition
Backups are incremental
and occur automatically
every time that the device
is locked, charging and
connected to a known WIFI
network
(all conditions must be met)
March 1, 2017 COPYRIGHT NUIX 2017 18
#2 And Difficult
March 1, 2017 COPYRIGHT NUIX 2017 19
#2 And Difficult
Sending to Manufacturer
Samsung has an official
policy to support information
extraction when serving a
Government request.
However – Android is a highly
fragmented platform with
several hundred
manufacturers – and
thousands of device models.
Physical Acquisition of
Android Devices
Success depends on:
Make, model, carrier, Android
version, user settings, root
status, lock status, whether
PIN code is known and
whether “USB debugging”
option is enabled.
“….Won’t know until you try!
JTAG Forensics
Uses Joint Test Action Group
(JTAG)port to access raw
data in the device. Often
works for locked, damaged or
otherwise inaccessible
devices.
However –if the disk is
encrypted – this process will
produce an encrypted image
Chip-Off Acquisition
Low level, destructive
acquisition via physical de-
soldering of memory chips
and specialised hardware to
read device contents. If
encryption has not been
enabled it will produce a full
binary image – including
unallocated space
NANDroid Backups
For rooted devices – this
process can extract a full
file system of the device by
generating a NANDroid
backup – created by
booting the device into a
custom recovery mode.
March 1, 2017 COPYRIGHT NUIX 2017 20
#3 Computers and mobile devices are often examined separately
Exhibit 10 - Seized Items
March 1, 2017 COPYRIGHT NUIX 2017 21
#3 Computers and mobile devices are often examined separately
Exhibit 32 - Report(s) from phones
Exhibit 21 - Report(s) from computers
March 1, 2017 COPYRIGHT NUIX 2017 22
#3 Computers and mobile devices are often examined separately
Which can make it
almost impossible
to identify and
review evidence
and identify
intelligence across
multiple data
sources, devices
and crime scenes...
Exhibit 34 – map showing crime scenes
March 1, 2017 COPYRIGHT NUIX 2017 23
But what does all this have to do with Nuix?!
March 1, 2017 COPYRIGHT NUIX 2017 24
Single Pane of Glass view into all the data
Whilst we are not quite at Minority
Report just yet…….…BUT
Case Studies
March 1, 2017 COPYRIGHT NUIX 2017 26
Case Studies
Expenses Fraud
– Person utilising work related mobile device and laptop to
continue about their normal work. They submit claims /
expenses for multiple trips for fuel consisting of several
hundred pounds a week for over a year.
– The download of the phone linked to location data provided
evidence to support they were not where they claimed to be
at a specific time.
– This cross referenced with other information to
include internet activity from their laptop demonstrated they
were on the internet when alleged they had travelled.
March 1, 2017 COPYRIGHT NUIX 2017 27
Case Studies
WhatsApp Chat
– Examination of multiple devices linked to suspects
involved in fraudulent activity. ”WhatsApp” messages
identifies banking information, location information and
images shared linked to the fraud.
– By creating a timeline of events you could see across
multiple phones the movement of suspects to agreed
locations for the drop of goods and the ultimate collection
of money.
March 1, 2017 COPYRIGHT NUIX 2017 28
Case Studies
Linking activity across devices/platforms
– Examination of activity from an iPad, iPhone
and iTouch.
– Identified they had wiped their mobile phone,
however - the iPad & iTouch linked to the
phone also recorded the Internet activity & call
records.
– iPhone "Handoff" enabled, therefore calls made
on mobile phone, could have come through
iTouch, iPad, Mac, etc.
Mobile Devices in Nuix
March 1, 2017 COPYRIGHT NUIX 2017 30
In summary
• Mobile device usage will keep on growing –
investigators need to be prepared
• Current methods and tools make it lengthy,
difficult or just not possible to see the
complete picture of the case
• Nuix supports mobile device extractions – just
like any data type
• Link people with objects, locations and events
across all the digital evidence
• Reduce mobile device processing backlogs,
triage and solve cases faster
March 1, 2017 COPYRIGHT NUIX 2017 31
Questions
?

More Related Content

PPTX
Digital forensics ahmed emam
PDF
Case study nuix edrm enron data set
PDF
The Investigative Lab - Nuix
PPTX
Digital forensics
PDF
Sued or Suing: Introduction to Digital Forensics
PPTX
Digital forensics
PPTX
Digital forensics research: The next 10 years
PPTX
computer forensics
Digital forensics ahmed emam
Case study nuix edrm enron data set
The Investigative Lab - Nuix
Digital forensics
Sued or Suing: Introduction to Digital Forensics
Digital forensics
Digital forensics research: The next 10 years
computer forensics

What's hot (20)

DOCX
Digital forensics Steps
PDF
Digital Crime & Forensics - Report
PDF
Digital forensic principles and procedure
PDF
Digital Evidence in Computer Forensic Investigations
PDF
Fundamental digital forensik
PPTX
Network and computer forensics
ODP
Brief introduction to digital forensics
PPTX
Digital investigation
PPTX
Cyber forensics 02 mit-2014
PPTX
Evidence and data
PPT
Role of a Forensic Investigator
PPTX
Electronic files are records too
PPTX
PPTX
Digital forensics intro 20151123
PDF
Cyber forensic readiness cybercon2012 adv j fick
PPT
Electronic Document Management And Discovery
PPTX
Computer forensics powerpoint presentation
PDF
Design for A Network Centric Enterprise Forensic System
PDF
Computer Forensics-An Introduction of New Face to the Digital World
PPTX
Digital forensics
Digital forensics Steps
Digital Crime & Forensics - Report
Digital forensic principles and procedure
Digital Evidence in Computer Forensic Investigations
Fundamental digital forensik
Network and computer forensics
Brief introduction to digital forensics
Digital investigation
Cyber forensics 02 mit-2014
Evidence and data
Role of a Forensic Investigator
Electronic files are records too
Digital forensics intro 20151123
Cyber forensic readiness cybercon2012 adv j fick
Electronic Document Management And Discovery
Computer forensics powerpoint presentation
Design for A Network Centric Enterprise Forensic System
Computer Forensics-An Introduction of New Face to the Digital World
Digital forensics
Ad

Viewers also liked (20)

PDF
Nuix webinar presentation: See the bigger picture faster – early case assessm...
PPTX
Lect 1 computer forensics
PPTX
Computer forensics ppt
PDF
Insider threats: protecting data during eDiscovery (Nuix webinar)
PPTX
Nuance-ACEDS May 21 OCR Webcast
PDF
Neuroanatomia capitulo i-parte2
PPT
Clase Docente-Neuroanatomía 4B
PPTX
Medical applications of fisheries byproducts
PPTX
Imago OCR: Open-source toolkit for chemical structure image recognition
PPTX
Diencefalo
DOC
Ocr abstract
PPTX
METHOD OF DATA COLLECTION
PPTX
Optical character recognition (ocr) ppt
PPT
Clase neuroanatomia 2011 ii
PPT
Utilization of fish wastes
PPTX
Access lesson 02 Creating a Database
PPTX
Monte Carlo Simulation
PDF
Monte Carlo Statistical Methods
PPTX
Database and Access Power Point
PDF
Lecture1
Nuix webinar presentation: See the bigger picture faster – early case assessm...
Lect 1 computer forensics
Computer forensics ppt
Insider threats: protecting data during eDiscovery (Nuix webinar)
Nuance-ACEDS May 21 OCR Webcast
Neuroanatomia capitulo i-parte2
Clase Docente-Neuroanatomía 4B
Medical applications of fisheries byproducts
Imago OCR: Open-source toolkit for chemical structure image recognition
Diencefalo
Ocr abstract
METHOD OF DATA COLLECTION
Optical character recognition (ocr) ppt
Clase neuroanatomia 2011 ii
Utilization of fish wastes
Access lesson 02 Creating a Database
Monte Carlo Simulation
Monte Carlo Statistical Methods
Database and Access Power Point
Lecture1
Ad

Similar to Bridging the gap between mobile and computer forensics (20)

PDF
Shelton mobile forensics
PPTX
Mobile_Forensics- General Introduction & Software.pptx
PDF
776 s0005
PPTX
Mobile Forensics and Cybersecurity
PDF
Android forensics
PPTX
Smart phone and mobile phone risks
PPTX
Forensics_1st_Presentation.pptx
PPTX
Mobile Forensics challenges and Extraction process
PDF
Ijmet 10 01_095
PDF
Cellebrite Predictions Survey 2015
PDF
Mobile Forensic Webinar by Forensic Academy
PDF
Carney Forensics: Digital Forensic Experts
PPTX
Mobile device forensics
PDF
Conceptual Study of Mobile Forensics
PPTX
Smartphones are smarter than you thought geo bellas
DOCX
ContentsMobile Forensic3Introduction3What It Is3How I.docx
PDF
IRJET - Android based Mobile Forensic and Comparison using Various Tools
PDF
White Paper - One Window - Non-US Version
PPTX
Mobile Forensics
PPTX
Mobile Forensics and Investigation Android Forensics
Shelton mobile forensics
Mobile_Forensics- General Introduction & Software.pptx
776 s0005
Mobile Forensics and Cybersecurity
Android forensics
Smart phone and mobile phone risks
Forensics_1st_Presentation.pptx
Mobile Forensics challenges and Extraction process
Ijmet 10 01_095
Cellebrite Predictions Survey 2015
Mobile Forensic Webinar by Forensic Academy
Carney Forensics: Digital Forensic Experts
Mobile device forensics
Conceptual Study of Mobile Forensics
Smartphones are smarter than you thought geo bellas
ContentsMobile Forensic3Introduction3What It Is3How I.docx
IRJET - Android based Mobile Forensic and Comparison using Various Tools
White Paper - One Window - Non-US Version
Mobile Forensics
Mobile Forensics and Investigation Android Forensics

Recently uploaded (20)

PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
Business Analytics and business intelligence.pdf
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
annual-report-2024-2025 original latest.
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
1_Introduction to advance data techniques.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Introduction to Knowledge Engineering Part 1
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Business Analytics and business intelligence.pdf
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
annual-report-2024-2025 original latest.
Galatica Smart Energy Infrastructure Startup Pitch Deck
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
1_Introduction to advance data techniques.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
.pdf is not working space design for the following data for the following dat...
Introduction to Knowledge Engineering Part 1
Fluorescence-microscope_Botany_detailed content
Qualitative Qantitative and Mixed Methods.pptx
Supervised vs unsupervised machine learning algorithms
IB Computer Science - Internal Assessment.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
168300704-gasification-ppt.pdfhghhhsjsjhsuxush

Bridging the gap between mobile and computer forensics

  • 1. Bridging the gap between mobile and computer forensics Paul Slater Carl Barron Mark Wootton
  • 2. March 1, 2017 COPYRIGHT NUIX 2017 2 Speakers Paul Slater Global Head of Investigations, Nuix Paul Slater is a subject matter expert with over 20 years of experience in investigations, digital forensics, and eDiscovery. Paul has held senior roles within law enforcement, corporate and "Big 4" advisories and was a member of the review board for the Association of Chief Police Officers (ACPO) “Good Practice Guide for Digital Evidence.” Paul also served for two years as interim head of the Digital Forensics Unit in the primary UK agency for investigating and prosecuting serious and complex fraud, where he designed workflows and implemented technologies to enable them to process 20 times more electronic evidence each year. Paul now uses his expertise to enable Nuix customers to 'master their data' through the design, build, and implementation of digital forensic and eDiscovery solutions. Carl Barron Senior Solutions Consultant, Nuix Carl is a Senior Solutions Consultant with Nuix, having joined the company in March 2012. He provides pre and post-sale consultancy, technical support and solution implementation. Carl brings a wide variety of knowledge in both hardware and software with an enthusiast approach to help customers improve workflows. Prior to joining Nuix, Carl worked as a Forensic Technician for a leading Litigation Support Vendor in London. Mark Wootton eDiscovery Manager, Yerra Solutions Mark is an eDiscovery Manager with over 20 years of experience as an expert investigator. He specialises in the collection, examination and presentation of electronic information as evidence for both corporate and law enforcement investigations. Mark has a skill set in complex criminal investigations to include money laundering, fraud and financial matters and an absolute passion and drive for delivering quality evidence that assists companies in making risk based decisions.
  • 3. March 1, 2017 COPYRIGHT NUIX 2017 3 Today’s Agenda Introduction Survey/Poll - Growth of mobile devices Mobile devices in Investigations Some of the Challenges Use Cases Mobile devices in Nuix Questions
  • 4. March 1, 2017 COPYRIGHT NUIX 2017 4 What percentage of UK Adults now owns a smartphone? 38% 47% 71% 68%
  • 5. March 1, 2017 COPYRIGHT NUIX 2017 6 In 2015 – Globally – on average how many text messages were sent? 1 Trillion each year 10 Billion each day 23 Billion each day 50 Billion over the year
  • 6. March 1, 2017 COPYRIGHT NUIX 2017 7 How many minutes on average does a smartphone user spend on their phones each day? 60 minutes 225 minutes 145 minutes 90 minutes
  • 7. March 1, 2017 COPYRIGHT NUIX 2017 9 Mobile statistics
  • 8. March 1, 2017 COPYRIGHT NUIX 2017 10 ...But what does all this have to do with Investigations? Many 'smart' devices automatically add GEO-TAGging information to our photographs... Exhibit 1 – Mobile phone So we can see where people have been… Exhibit 2 - Map
  • 9. March 1, 2017 COPYRIGHT NUIX 2017 11 ...But what does all this have to do with Investigations? Exhibit 3 – Picture Data And when they were there.... Exhibit 4 - Suspects Exhibit 3a – EXIF Data And often – who they were with!
  • 10. March 1, 2017 COPYRIGHT NUIX 2017 12 Exhibit 5 – Cell Tower Analysis And because most smart phones also track our physical movements (either overtly or covertly)....we can see where people have been Exhibit 5 – Cell Tower Analysis
  • 11. March 1, 2017 COPYRIGHT NUIX 2017 13 #1 Forensic Acquisition is slow and costly Exhibit 6 - Challenges
  • 12. March 1, 2017 COPYRIGHT NUIX 2017 14 #1 Forensic Acquisition is slow and costly Exhibit 7 – Usual Suspects ?
  • 13. March 1, 2017 COPYRIGHT NUIX 2017 15 #1 Forensic Acquisition is slow and costly Forensic Acquisition Notes: Device : iPhone 64GB Start time : 12:00 hrs End time : 18:00 hrs Exhibit 21 – Phone Report
  • 14. March 1, 2017 COPYRIGHT NUIX 2017 16 #2 And Difficult
  • 15. March 1, 2017 COPYRIGHT NUIX 2017 17 #2 And Difficult “On devices running iOS 8 and later versions, your personal data is placed under the protection of your passcode. For all devices running iOS 8 and later versions, Apple will not perform iOS data extractions in response to government search warrants because the files to be extracted are protected by an encryption key that is tied to the user’s passcode, which Apple does not possess.” Apple Inc 2016 iOS Physical Acquisition Technique only works on jailbroken 32bit devices or 32bit devices with known passcode than can be jailbroken by investigator. *No current jailbreak for latest version of iOS (*accurate at time of writing) iOS Logical Acquisition If a passcode is known (or there is a way of finding it out) the investigator can cause the device to produce an offline backup via iTunes. This backup can subsequently be analysed – with some restrictions. iCloud – “Over the Air” Acquisition Backups are incremental and occur automatically every time that the device is locked, charging and connected to a known WIFI network (all conditions must be met)
  • 16. March 1, 2017 COPYRIGHT NUIX 2017 18 #2 And Difficult
  • 17. March 1, 2017 COPYRIGHT NUIX 2017 19 #2 And Difficult Sending to Manufacturer Samsung has an official policy to support information extraction when serving a Government request. However – Android is a highly fragmented platform with several hundred manufacturers – and thousands of device models. Physical Acquisition of Android Devices Success depends on: Make, model, carrier, Android version, user settings, root status, lock status, whether PIN code is known and whether “USB debugging” option is enabled. “….Won’t know until you try! JTAG Forensics Uses Joint Test Action Group (JTAG)port to access raw data in the device. Often works for locked, damaged or otherwise inaccessible devices. However –if the disk is encrypted – this process will produce an encrypted image Chip-Off Acquisition Low level, destructive acquisition via physical de- soldering of memory chips and specialised hardware to read device contents. If encryption has not been enabled it will produce a full binary image – including unallocated space NANDroid Backups For rooted devices – this process can extract a full file system of the device by generating a NANDroid backup – created by booting the device into a custom recovery mode.
  • 18. March 1, 2017 COPYRIGHT NUIX 2017 20 #3 Computers and mobile devices are often examined separately Exhibit 10 - Seized Items
  • 19. March 1, 2017 COPYRIGHT NUIX 2017 21 #3 Computers and mobile devices are often examined separately Exhibit 32 - Report(s) from phones Exhibit 21 - Report(s) from computers
  • 20. March 1, 2017 COPYRIGHT NUIX 2017 22 #3 Computers and mobile devices are often examined separately Which can make it almost impossible to identify and review evidence and identify intelligence across multiple data sources, devices and crime scenes... Exhibit 34 – map showing crime scenes
  • 21. March 1, 2017 COPYRIGHT NUIX 2017 23 But what does all this have to do with Nuix?!
  • 22. March 1, 2017 COPYRIGHT NUIX 2017 24 Single Pane of Glass view into all the data Whilst we are not quite at Minority Report just yet…….…BUT
  • 24. March 1, 2017 COPYRIGHT NUIX 2017 26 Case Studies Expenses Fraud – Person utilising work related mobile device and laptop to continue about their normal work. They submit claims / expenses for multiple trips for fuel consisting of several hundred pounds a week for over a year. – The download of the phone linked to location data provided evidence to support they were not where they claimed to be at a specific time. – This cross referenced with other information to include internet activity from their laptop demonstrated they were on the internet when alleged they had travelled.
  • 25. March 1, 2017 COPYRIGHT NUIX 2017 27 Case Studies WhatsApp Chat – Examination of multiple devices linked to suspects involved in fraudulent activity. ”WhatsApp” messages identifies banking information, location information and images shared linked to the fraud. – By creating a timeline of events you could see across multiple phones the movement of suspects to agreed locations for the drop of goods and the ultimate collection of money.
  • 26. March 1, 2017 COPYRIGHT NUIX 2017 28 Case Studies Linking activity across devices/platforms – Examination of activity from an iPad, iPhone and iTouch. – Identified they had wiped their mobile phone, however - the iPad & iTouch linked to the phone also recorded the Internet activity & call records. – iPhone "Handoff" enabled, therefore calls made on mobile phone, could have come through iTouch, iPad, Mac, etc.
  • 28. March 1, 2017 COPYRIGHT NUIX 2017 30 In summary • Mobile device usage will keep on growing – investigators need to be prepared • Current methods and tools make it lengthy, difficult or just not possible to see the complete picture of the case • Nuix supports mobile device extractions – just like any data type • Link people with objects, locations and events across all the digital evidence • Reduce mobile device processing backlogs, triage and solve cases faster
  • 29. March 1, 2017 COPYRIGHT NUIX 2017 31 Questions ?