Impact of User Data Privacy Management Controls on Mobile Device Investigations

There are many different types of mobile device users, but most of them do not seek to expand the functionality of their smartphones and prefer to interact with them using predefined user profiles and settings. However, “power users” are always seeking opportunities to gain absolute control of their devices and expand their capabilities. For this reason, power users attempt to obtain “super user” privileges (root) or jailbreak their devices. Meanwhile, the “bring your own device” (BYOD) trend in the workplace and increased numbers of high profile users who demand enhanced data privacy and protection are changing the mobile device landscape. This chapter discusses variations of the Android operating system that attempt to bypass the limitations imposed by the previous Android permission model (up to version 5.1) and highlights the fact that forensic analysts will encounter devices with altered characteristics. Also, the chapter discusses the Android permission model introduced in the latest operating system (version M or 6.0) that will likely change the way users interact with apps.

[1]  Theodore Tryfonas,et al.  Forensic analysis of wireless networking evidence of Android smartphones , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[3]  Matthew Smith,et al.  Selective cloaking: Need-to-know for location-based apps , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[4]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[5]  Nicolas Christin,et al.  Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.

[6]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[7]  John Krumm,et al.  Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.

[8]  David A. Wagner,et al.  Short paper: location privacy: user behavior in the field , 2012, SPSM '12.

[9]  Matthew Smith,et al.  On Usable Location Privacy for Android with Crowd-Recommendations , 2014, TRUST.

[10]  George Oikonomou,et al.  Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations , 2016, IEEE Transactions on Cybernetics.

[11]  Mark A. Harris,et al.  Mobile device security considerations for small- and medium-sized enterprise business mobility , 2014, Inf. Manag. Comput. Secur..

[12]  Lorrie Faith Cranor,et al.  Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.

[13]  Andrew Fisher Location Privacy: User Behavior in the Field , 2012 .

[14]  Daniel P. Siewiorek,et al.  The implications of offering more disclosure choices for social location sharing , 2012, CHI.

[15]  Richard Han,et al.  MyShield: Protecting Mobile Device Data via Security Circles ; CU-CS-1091-12 , 2012 .

[16]  Theodore Tryfonas,et al.  A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem , 2015, IFIP Int. Conf. Digital Forensics.