Matthew Simon is the APAC Forensic Sales Consultant for Magnet Forensics. Matthew’s role is to support customers of Magnet Forensics across the APAC region in the application of digital forensics, to understand the technical challenges investigators are facing and help ensure the company is providing the most relevant and innovative solutions. Matthew previously held the role of Digital Crime Officer at the INTERPOL Global Complex for Innovation where he was in the Digital Forensics Laboratory. In this role, he worked closely with the INTERPOL member countries to provide incident response, capacity building and training, and digital forensics laboratory support. Prior to his time at INTERPOL, Matthew spent almost five years in criminal law enforcement as an Electronic Evidence Specialist with the Electronic Crime Section of the South Australia Police in Australia. He actively worked with police investigators on many serious criminal matters and provided expert reports and oral expert testimony in court for numerous cases Matthew has a PhD by research in digital forensics and a Bachelor Degree with First Class Honours from the University of South Australia. He is an expert digital forensics practitioner, an academic researcher and is experienced in computer and mobile forensics.
Abstract
With mobile devices being a repository of extremely intimate and personal information, users are increasingly cautious, protecting this information. The onset of security apps for phones helps people feel proactive in safeguarding their privacy. Such apps may be used for nefarious purposes such as hiding illegal images, files and communications. However, users may employ these apps to maintain privacy by hiding data from parents, guardians, siblings, spouses etc. While another potential risk for law enforcement, these apps can also be a trove of new content for investigators. However, handling and interacting with devices with such security apps should be done so with caution. In this presentation, we will explore some of the apps available, look at the risks and some data the data that is left behind and an overview of the examination process undertaken to find such data.