May 2016
                         
  Digital Forensics           IT Support           CyberSecurity 

Articles of Interest



Magnifying Glass searching code for online activity.Eavesdropping on Smartphones
by Patrick Logan
President & Certified 
Computer Examiner

We are often asked to examine a smartphone that the user believes has software on it that allows activity, such as calls and texts, to be monitored remotely.  Our first question to the user is, "has anyone had physical access to the phone other than you?" There are very few apps that will actually remotely monitor smartphones, and there are none we know of that can be installed without having physical access and the password to the phone.  

Also, these apps cannot be installed on an iPhone unless it is "jailbroken" which is a process that removes all restrictions placed upon the phone by the wireless carrier. In most cases, we have found that when we look at these "compromised smartphones," there is no monitoring software installed on them.   

A sure way to ensure that any monitoring software will never be installed on your phone is to make sure your phone is password protected and that you do not let anyone you don't trust have physical access to the phone.

Old, used and obsolete electronic equipment isolated on white
Spring Cleaning
What Do I Do With These Old Electronics?
by Kara Mueller
IT Support Specialist & Certified Computer Examiner

Still hanging on to old broken or outdated electronic equipment? There are hundreds of recycling programs out there that will take your old stuff.  Before handing your devices over, it is important that any device that holds data, such as a cell phone, tablet, PC, laptop, MP3 player or flash card should be securely wiped before disposal. Additionally, these devices should not be thrown in the garbage as they can contain harmful chemicals.
 
Below are a few options for recycling and trade-in programs. For others, check with your device manufacturer or service provider's website for other disposal tips. Also check with local places of worship and charities.


Meet the 
Seltek Team
 
Scott Haynes
began his first career in theater nearly three decades ago modeling and performing improvisation on the streets of Washington, DC.  In college, he discovered that he would much rather be behind the stage than on it.  He then spent the next few years touring the East Coast as a professional Technical Director.  When he got married, he fell back on his hobby of information technology and has spent the past twenty-two years as an IT consultant. He has been with SELTEK for over 6 years.  In his spare time, Scott is an avid foodie and enjoys foisting food experiments on his wife and children.  Scott says "the greatest thing about technology is not knowing where we will be in 30 years.  We yearn for knowledge, we strive for new experience. Technology makes that happen."  



Are You Following Me? 
How to Limit Your 
Smartphone Tracking
by Liz Calder
IT Support Specialist 

A wired world can be an exciting place.  Now wherever we go we have the ability to Google a question, catch up on Facebook, keep up with online games or even watch TV.  It is so easy.  The problem is, convenience often comes with downsides and companies everywhere have figured out how to get our information. 
 
Headlines in technology news remind us that retailers are using our phones to track us and that popular apps are spying on us. 
 
The good news is, there are things we can do to limit the information we are giving away as we go about our daily lives. 

Set a Password

Not only does this protect your phone from casual eyes, it turns on encryption for the iPhone.  Android users who want to encrypt their phones also have options.

 

Review Privacy Settings

 

  iPhone - go to Settings, then Privacy and review the settings.  Take your time, there is a lot there. Review which apps are utilizing phone services such as your camera and microphone. Check Location Services and make sure you agree with the apps allowed to access your location.  Check System Services where you can turn off location- based ads.  Review Advertising and Limit Ad Tracking. 
  Android - go to Settings, then Ads and opt out of interest-based ads.  Review app permissions with App Ops. Android 6 comes with App Ops installed.  Android 5 users can get App Ops here.

Apps Permission & Privacy

 

Apps are notorious for stealing information.  Many apps like Facebook upload contacts to their servers. Other applications track your location or send data back to parent servers.  Make sure you are comfortable about the information your phone is releasing.  If you aren't comfortable and can't limit the information released, don't install the app (or uninstall it).

  Do you have client Personally Identifiable Information (PII) in your contacts that will be uploaded?   (Name and address are included in most PII descriptions.)
  Will the information Siri, Google Now or Cortana sends to the central server compromise your privacy?  Your client's privacy?
WiFi & Bluetooth 

Turn off WiFi and Bluetooth when you are not using them.  Retailers and marketing companies are using your WiFi to track you with things such as billboardsretail displays and even trash bins.  The simplest way to prevent this is to turn off your WiFi and Bluetooth.   Android users can even use an app such as WiFi Matic to turn WiFi on and off automatically.  (As of this writing, Apple does not allow apps to control WiFi.)  If you find turning off WiFi too troublesome, you may prefer to reset your advertising identifier periodically.

 

Cell Carrier Tracking

 

And last but not least opt out of being tracked by your cell carrier.

 


CLE 2012
 E-Discovery and Digital Forensics WEBINAR 
*Approved by Virginia State Bar for one MCLE credit hour

"E-Discovery and Digital Forensics Explained "
Tuesday, May 24, 2016 
at 10:00 a.m. 
Presented by Patrick Logan,CCE
Certified Computer Examiner

Patrick Logan, Certified Computer Examiner, will provide a live video presentation discussing Digital Forensics and E-Discovery. There will be a Q&A time when Mr. Logan will answer specific questions. One MCLE credit hour has been approved by the Virginia State Bar for the webinar.

Program Information :
  • Learn the differences between E-Discovery and Digital Forensics. 
  • Understand the proper procedures for preserving and collecting electronic data. 
  • Understand the types of data that can be collected. 
  • Understand the places from which data can be retrieved, eg.,Smartphones, computers and many other IoT devices.
  • Understand the information retrieved from social media. 
  • Understand the methods in which deleted data may be identified and collected.
  • Understand the ways E-Discovery and Digital Forensics can benefit legal proceedings.  
How to Register:  
  • Email [email protected] or call 804.360.4490 X20.
  • Provide your name, email address and firm name.
  • There is no cost for the CLE.
Seltek | 804-360-4490 x20 | [email protected] | http://www.seltekinc.com
8814 Fargo Road
Suite 201
Richmond, VA 23229