Smartphone as an Agent of Anti-forensics: A Case of Workplace Environment in Kenya

Authors

  • Kevin Omolo The University of Nairobi, School of Computing and Informatics, P.O. Box 30197, Nairobi, GPO, Kenya
  • Dr. Elisha Abade The University of Nairobi, School of Computing and Informatics, P.O. Box 30197, Nairobi, GPO, Kenya

Keywords:

Cryptography, anti-forensics, naive anti-forensics, smartphone, Data Exfiltration.

Abstract

Computer anti-forensic techniques work to ensure that forensic evidence left behind after a digital crime is not easily uncovered by forensic investigators, if they are to uncover them, there will be a considerable delay. Smartphones have become a common device within an organization’s workforce where employees interact with highly confidential data that they access using their laptop computers at the workplace. This has led to the use of smartphones to commit digital crimes at the workplace.  The primary objective of this study is to find out whether the use of smartphones at workplace environment in Kenya may be exploited to advance activities that may derail forensic investigations in the event of a digital crime. We also set to establish data security risks within organization and other techniques and/or methods by which smartphones may be used to exfiltrate data. Finally, we shall analyze research areas that require further attention from researchers to enhance defense and guard against smartphones data exfiltration. To achieve these objectives, we shall implement and test an android mobile software prototype, developed using android studio to send data exfiltration attempt to a web-based user interface when an employee within an organization uploads data above a set authorized limit. We shall review existing literature to understand other techniques that may be used to exfiltrate data from organizations as well as analyze research areas that require further attention from researchers to enhance defense and guard against data exfiltration through smartphones usage. We collected a total of two thousand five hundred and eighty-four records of data exfiltration attempts from our eleven sampled population. Of these records, One thousand eight hundred and ninety-one happened in the evening hours while six hundred and seven in the afternoon hours, then finally, eighty-six records were registered in the morning hours.  In conclusion, the research study, has revealed that there exist challenges in reporting smartphone-based data exfiltration attempts while using the mobile-based software prototype.

Data exfiltration attempts was observed to happen within organization’s workplace, with evening hours being the most affected by this vice with a figure of over one thousand data exfiltration attempts. We also noted that there exists, at least three categories of data security risks that organizations are exposed to when employees have their smartphones within the workplace. We recorded an additional eleven other techniques and methods by which a smartphone may be used to steal data from an organization.

References

A. Distefano, G. Me and F. Pace, "Android anti-forensics through a local paradigm", Digital Investigation, vol. 7, pp. S83-S94, 2010. Available: 10.1016/j.diin.2010.05.011 [Accessed 20 July 2019].

N. Macek, P. Strbac, D. Coko, I. Franc, And M. Bogdanoski. Android forensic and anti-forensic techniques – a survey. In: the eighth international conference on business information security. Belgrade, Serbia, 2016.

K. Conlan, I. Baggili and F. Breitinger, "Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy", Digital Investigation, vol. 18, pp. S66-S75, 2016.

S. Garfinkel, "Anti-Forensics: Techniques, Detection and Countermeasures", Citeseerx.ist.psu.edu, 2006. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.5063&rep=rep1&type=pdf. [Accessed: 21- Jul- 2019].

S. Azadegan, W. Yu, H. Liu, M. Sistani and S. Acharya, "Novel Anti-forensics Approaches for Smart Phones", 2012 45th Hawaii International Conference on System Sciences, 2012.

Dmu.ac.uk. (n.d.). De Montfort University - Leicester, UK. [online] Available at: https://www.dmu.ac.uk.

Gary C. K. Anti-forensics and the digital investigator. In C. Valli & A. Woodward (Ed.), Proceedings of the 5th Australian Digital Forensics Conference. Mt. Lawley, Western Australia: Edith Cowan University, 2007

M. Rogers. Panel session at CERIAS 2006 Information Security Symposium. Retrieved September 11, 2007, from http://www.cerias.purdue.edu/symposium/2006/materials/pdfs/antiforensics.pdf

S. Berinato (2017). The Rise of Anti-Forensics. [online] CSO Online. Available at: http://www.csoonline.com/article/2122329/investigations-forensics/the-rise-of-anti-forensics.html

Netstar.co.uk. Your Employees' Smartphones Are a Major Risk to Security of Data. 2018

S. Allam, S. Flowerday and E. Flowerday, "Smartphone information security awareness: A victim of operational pressures", Computers & Security, vol. 42, pp. 56-65, 2014.

J. Raphael, "7 mobile security threats you should take seriously in 2019", CSO Online, 2019. [Online]. Available:https://www.csoonline.com/article/3241727/mobile-security/5-mobile-security-threats-you-should-take-seriously-in-2018.html.

CSO Online. (n.d.). CSO. [online] Available at: https://www.csoonline.com/.

MakeUseOf. 4 Smartphone Security Risks To Be Aware Of. [online] Available at: https://www.makeuseof.com/tag/4-smartphone-security-risks-to-be-aware-of/ [Accessed 5 Nov. 2018], 2018

Q. Do, B. Martini and K. Choo, "Exfiltrating data from Android devices", Computers & Security, vol. 48, pp. 74-91, 2015.

Zhou, X, Demetriou, S, He, D, Naveed, M, Pan, X, Wang, X, Gunter, CA & Nahrstedt, K 2013, 'Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources', Proceedings of the 20th Conference on Computer and Communications Security, ACM, pp. 1017-1028.

R. Krejcie and D. Morgan, "Determining Sample Size for Research Activities", Educational and Psychological Measurement, vol. 30, no. 3, pp. 607-610, 1970.

Kenpro.org. (n.d.). Kenya Projects Organization [KENPRO] | Project Management, Research and Publishing. [online] Available at: http://www.kenpro.org/.

F. Ullah, M. Edwards, R. Ramdhany, R. Chitchyan, M. Babar and A. Rashid, "Data exfiltration: A review of external attack vectors and countermeasures", Journal of Network and Computer Applications, vol. 101, pp. 18-54, 2018.

A. Joshi, and D. Bhilare, "Emerging trends and research in digital forensics", Oiirj.org, 2014. [Online]. Available: http://www.oiirj.org/oiirj/jan-feb2014/33.pdf.

Ljmu.ac.uk. (n.d.). Postgraduate students. [online] Available at: https://www.ljmu.ac.uk/study/postgraduate-students.

V. Liu and F. Brown, "Bleeding-Edge Anti-Forensics", Infosec World Conference & Expo, MIS Training Institute, 2006. [Accessed 22 July 2019].

S. Isaiah Moses, "Measuring the Robustness of Forensic Tools’ Ability to Detect Data Hiding Techniques", BYU ScholarsArchive, All Theses andDissertations. 6464, vol. 6464, 2017. [Accessed 22 July 2019].

Calhoun.nps.edu. (2014). Calhoun Home. [online] Available at: https://calhoun.nps.edu/.

Gla.ac.uk.(n.d). University of Glasgow - Postgraduate study. [online] Available at: https://www.gla.ac.uk/postgraduate

Goniv.com. (n.d.). Welcome to goniv PUBLICATION. [online] Available at: http://www.goniv.com/.

O. Afonin, D. Nikolaev and Y. Gubanov, "Countering Anti-Forensic Efforts – Part 2", Forensic Focus - Articles, 2015. [Online]. Available: https://articles.forensicfocus.com/2015/09/15/countering-anti-forensic-efforts-part-2/.

"Colorado Technical University", Coloradotech.edu. [Online]. Available: https://www.coloradotech.edu/.

"Forensic Magazine", Forensic Magazine. [Online]. Available: https://www.forensicmag.com.

M. Al-Hadadi and A. AlShidhani, "Smartphone Forensics Analysis: A Case Study", International Journal of Computer and Electrical Engineering, vol. 56, , pp. 576-580, 2013. Available: 10.7763/ijcee.2013.v5.776.

"IJCEE", Ijcee.org, 2008. [Online]. Available: http://www.ijcee.org/.

A. Bangert, "Using Experimental Research to Investigate Students’ Satisfaction with Online Learning", Student Satisfaction and Learning Outcomes in E-Learning, pp. 130-148, 2011.

Champlain.edu. (n.d.). Champlain College | Degree Programs | Colleges in Vermont. [online] Available at: https://www.champlain.edu/

Downloads

Published

2019-07-26

How to Cite

Omolo, K., & Abade, D. E. (2019). Smartphone as an Agent of Anti-forensics: A Case of Workplace Environment in Kenya. International Journal of Computer (IJC), 34(1), 106–118. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1439

Issue

Section

Articles