Abstract

The use of mobile phone forensics to investigate fraudulent activity is nothing new. But mobile phones have evolved into smartphones, and fraudsters have evolved with them. Smartphones are packed with functionality that can easily be used for data theft or inappropriate contact with other parties - none of which passes through company-owned systems, and is to all intents and purposes 'off the grid'. Employers need to be aware of these risks when devices are issued, along with ensuring that processes are in place when suspicions are raised, explains Philip Ridley of CCL-Forensics. Detecting 'tech-savvy' corporate fraudsters is a constant game of catch-up. It's not only about playing catch-up with the intellect, motives and awareness of the e-fraudster, but also the technologies that can be misused. What's more, the methods through which the technology can be manipulated to secrete, disguise and protect fraudulent activities - all while staying away from corporate networks where they can readily be monitored and detected - are constantly evolving. This means a company's intellectual property and sensitive data is at risk of sabotage or just good old-fashioned theft.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call