Electronic retention: what does your mobile phone reveal about you?

The global information rich society is increasingly dependent on mobile phone technology for daily activities. A substantial secondary market in mobile phones has developed as a result of a relatively short life-cycle and recent regulatory measures on electronics recycling. These developments are, however, a cause for concern regarding privacy, since it is unclear how much information is retained on a device when it is re-sold. The crucial question is: what, despite your best efforts, does your mobile phone reveal about you?. This research investigates the extent to which personal information continues to reside on mobile phones even when users have attempted to remove the information; hence, passing the information into the secondary market. A total of 49 re-sold mobile devices were acquired from two secondary markets: a local pawn shop and an online auction site. These devices were examined using three industry standard mobile forensic toolkits. Data were extracted from the devices via both physical and logical acquisitions and the resulting information artifacts categorized by type and sensitivity. All mobile devices examined yielded some user information and in total 11,135 artifacts were recovered. The findings confirm that substantial personal information is retained on a typical mobile device when it is re-sold. The results highlight several areas of potential future work necessary to ensure the confidentially of personal data stored on mobile devices.

[1]  John Doyle,et al.  Introduction to Windows Mobile Forensics , 2010, Digit. Investig..

[2]  Peter Ingwersen,et al.  Developing a Test Collection for the Evaluation of Integrated Search , 2010, ECIR.

[3]  Khai N. Truong,et al.  Breaking the disposable technology paradigm: opportunities for sustainable interaction design for mobile phones , 2008, CHI.

[4]  Frank Hopfgartner,et al.  Evaluating the implicit feedback models for adaptive video retrieval , 2007, MIR '07.

[5]  Bradley Glisson,et al.  Investigating Information recovered from Re-sold Mobile Devices , 2010 .

[6]  Craig Valli,et al.  The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , 2008, J. Digit. Forensics Secur. Law.

[7]  Leif Azzopardi,et al.  Accessibility in Information Retrieval , 2008, ECIR.

[8]  Svein Yngvar Willassen Forensic Analysis of Mobile Phone Internal Memory , 2005, IFIP Int. Conf. Digital Forensics.

[9]  Mark Pollitt,et al.  Advances in Digital Forensics , 2006 .

[10]  Wayne Jansen,et al.  Guidelines on Cell Phone Forensics | NIST , 2007 .

[11]  Craig Valli,et al.  The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , 2006, J. Digit. Forensics Secur. Law.

[12]  Paula Thomas,et al.  An Analysis of the Digital Forensic Examination of Mobile Phones , 2010, 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies.

[13]  Alexander Lazovik,et al.  International Conference on Pervasive Computing and Communications Workshops , 2012 .

[14]  Alfred Kobsa,et al.  An empirical investigation of concerns of everyday tracking and recording technologies , 2008, UbiComp.

[15]  David Naccache,et al.  Law enforcement, forensics and mobile communications , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[16]  Jose F. Monserrat,et al.  On the Way towards Fourth-Generation Mobile: 3GPP LTE and LTE-Advanced , 2009, EURASIP J. Wirel. Commun. Netw..

[17]  Aris S. Lalos,et al.  Experimental Investigation of Cooperative Schemes on a Real-Time DSP-Based Testbed , 2009, EURASIP J. Wirel. Commun. Netw..

[18]  Wayne Jansen,et al.  Mobile Forensic Reference Materials: A Methodology and Reification - NIST IR 7617 , 2009 .

[19]  Wayne Jansen,et al.  Overcoming Impediments to Cell Phone Forensics , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[20]  Craig Valli,et al.  The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , 2010, J. Digit. Forensics Secur. Law.

[21]  Leif Azzopardi Usage based effectiveness measures: monitoring application performance in information retrieval , 2009, CIKM.

[22]  Craig Valli,et al.  The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market , 2009 .

[23]  Simson L. Garfinkel,et al.  Bringing science to digital forensics with standardized forensic corpora , 2009, Digit. Investig..

[24]  Abhi Shelat,et al.  Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..