Feeds

Met bobbies get CSI kit to probe perps' mobes

Skip lengthy lab analysis, press here for clues

The Power of One eBook: Top reasons to choose HP BladeSystem

The Metropolitan Police is deploying mobile phone forensic systems in 16 boroughs, allowing ordinary coppers to play their favourite CSI character with wrong 'uns' handsets.

The kit comes from Radio Tactics, and is basically a Windows 7 PC loaded up with forensic software and a touch interface complete with step-by-step instructions on where to plug in each cable. Three hundred police will be trained to use the system, which will extract everything it can from a mobile handset for examination, and storage, by the bobbies.

Mobile forensics is already big business, but at the moment handsets are carefully bagged and sent off to specialist companies for analysis. Different police forces use different companies, but it's an expensive and time-consuming process and as the number of smartphones increases, the police would like to be able to get at more data more easily and in less time.

Which is why the Met is spending £50,000 on hiring 16 terminals from Radio Tactics for a year, thus pulling the basic analysis in-house, though the approach isn't without risk.

A basic course in mobile forensics will last four or five days, for which a company such as Control-F will charge a shade over £2,000. That covers not only the data the cops might be able to extract from a phone, but also the way in which the handset must be handled and stored in order to make the evidence stick.

"Digital evidence is very damning," the company told us, "so defence lawyers will go after procedure instead". Forensic software has to be secured against interference, just as physical evidence would be secured in an evidence room, and police operating the kit have to know how to avoid compromising the data being collected.

Not that they always know what to do with the data concerned – the amount coming off phones is doubling annually – but the stuff being pulled off PCs and other IT kit seized by the fuzz is growing exponentially and securely storing all that data is a headache in itself.

Introducing Clippy-assisted forensics is only going to increase the amount of data the police have lying around the place. The police reckon this is no more than an evolution of an existing procedure, but Privacy International told the BBC that the routine gathering of data from mobile devices was a "possible breach of human rights law", though since the police gained the right to search one's pockets on request it seems only logical to extend that right into digital pockets too. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.