Recorded on April 6, 2021
This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.
Mobile device forensics often takes center stage during investigations and criminal intelligence operations involving digital devices. The capability of these devices is nearly as impressive as the quantity of them. However, recently the burden on examiners is increasing due to lack of lawful access and the need for examiners to rely more heavily on lesser amounts of data available for analysis.
This webinar directly answers two of the underlying questions at the forefront of many discussions:
1. Why are we unable to gain lawful access to locked devices as we once were?
2. Why do our tools seem to support less devices, yet cost more?
This webinar will focus on the process of mobile device vulnerability discovery and research with special attention given to threat modeling and the specific use of lawful access in a global market. Examples of publicly disclosed mobile device vulnerabilities will be highlighted and provided to participants for further reading. Vulnerability discovery, however, is only half of the equation. An exploit needs to be developed to leverage the discovered vulnerability. A holistic approach to mobile device exploit development will be explained and participants will be shown examples of public exploits for mobile devices and connections to capabilities they may already be familiar with.
Presented By: Chris Atha, High-Tech Crime Specialist, NW3C