±Forensic Focus Partners
|New Today: 9||Overall: 29017|
|New Yesterday: 8||Visitors: 64|
· Linux Timestamps, Oh boy!
· Standard Processes in Windows 10
· NAS Forensics Explained
· Project Spartan Forensics
· FT Cyber Security Summit Europe – London 22nd September
· The Future of Mobile Forensics
· TSFIC 2015 – Recap
· Evidence Acquisition and Analysis from Live Exchange
· TDFCon 2015 – Recap
Question bout cellphone security
Subforums: Mobile Telephone Case Law
You have been given some considered advice already. My thoughts are the following:
1. If you consider there is a possibility that your mobile phone has been tampered with, have you stopped using it? Remove the sim card and use it in another handset and then try and replicate the problem.
2. The suspect handset can be monitored in a controlled environment (without sim card) but with internet access if possible to see if connections are being made. I am not familiar with this handset.
3. It would be possible to create some code and embed it into an MMS message and send this to an unsuspecting individual in order to tamper with or attempt to intercept messages or calls BUT the costs and efforts associated with this would make it almost impossible for 'normal' person to achieve. This could possible be achieved by a Government or State Agency with the resources and access to the scarce skills needed. Should a Government Agency wish to do this there are simpler methods as they would just request an intercept at the mobile network carrier!
So without being able to provide the proof you seem to be seeking it is possible for this to happen but highly unlikely.
/hacker may do it, just like spreading a virus, and for the hell of it
/maybe partner if they are suspicious about infidelity
/maybe the person does it themselves to gain attention
/maybe someone (hacker maybe) testing the forensic community
There is also the question whether the handset was out of the possession of the owner/user for any significant time.
Symantec published a review of Bluetooth regarding security and vulnerability. Part 2 shows example for modifying obex
However, none of the above add any shred of evidence at all that this handset has spyware on it.
Institute for Digital Forensics (IDF) - LinkedIn
Mobile Telephone Examination Board (MTEB) - LinkedIn
Mobile Telephone Evidence & Forensics trewmte.blogspot.com
ForensicMobex now MTEB Linkedin Subgroup
- Senior Member
I need to thank you all for getting into the trouble of providing me with useful advise.
Even though I wish I could get into more details about my suspicions , unfortunately,
I can't . I don't think it would be the wise thing to do. Let me just say that the potential "source"
of my worries is quite certain and pinpointed and it doesn't have anything to do with former spouses
It is true I didn't mention the "mms" in my original request because I didn't want to narrow down
the problem to only one method . Heck ,I wasn't sure about it either !
i am really concerned about spreading the spyware to a third party by mms reception.
As for the technical advise, I feel truly thankful and I will do my best to pull it through.
Bye for now !
I ' ll be writing back soon