Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:45 am
Time: 11:45 am
Results for mobile phones
7 results foundAuthor: Tassone, Christopher Title: Mobile Device Forensics: A Snapshot Summary: In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple's iOS, Google's Android and RIM's BlackBerry operating systems. The paper identifies where each specific tool is best applied and also describes the limitations of each in accessing contacts, call history, message data (SMS, MMS and emails), media files and other data. New releases of forensic tools and mobile operating systems may change the way the data are acquired and preserved in the future. It is therefore hoped that future research will continue to provide the digital forensics community with the most up-to-date overview of mobile forensics capabilities. Details: Canberra: Australian Institute of Criminology, 2013. 7p. Source: Internet Resource: Trends & Issues in Crime and Criminal Justice no. 460: Accessed May 14, 2014 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi460.pdf Year: 2013 Country: Australia URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi460.pdf Shelf Number: 132351 Keywords: Mobile CommunicationsMobile Devices (Australia)Mobile Phones |
Author: Great Britain. Home Office Title: Reducing Mobile Phone Theft and Improving Security. Paper 2 Summary: In September 2014 the Home Office and the Behavioural Insights Team published the joint paper: Reducing Mobile Phone Theft and Improving Security1. That paper used data from Crime Surveys (Crime Survey for England and Wales) conducted between 2005/06 and 2012/13, together with data from the Metropolitan Police about the theft of mobile phones in London between August 2012 and January 2014, to set out a detailed picture of how and when mobile phones are stolen and the types of phone most likely to be stolen. It also included the first Mobile Phone Theft Ratio. When we published that material, we were conscious that the picture it presented might well have changed following the widespread introduction of device based solutions by manufacturers from September 2013 onwards. They were introduced to help reduce mobile phone theft. This paper provides an updated picture of mobile phone theft, including an updated Mobile Phone Theft Ratio, to provide a more contemporary picture capturing the impact that the security features introduced by manufacturers have had on levels of theft. Our findings show: - there has been a fall in levels of mobile phone theft since the introduction of device based solutions such as Apple iOS7 and Samsung Reactivation Lock; - there has been a fall in the proportion of mobile phone thefts across all age groups and genders, except for 22-24 year old males; - 18-21 year old females remain the most vulnerable to mobile phone theft; and - methods such as pick-pocketing and snatch theft, followed by theft of unattended items such as leaving a mobile phone on a bar or restaurant table, are the most common methods used by criminals. Details: London: Home Office, 2016. 28p. Source: Internet Resource: Accessed March 26, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/509855/PRINT-6-1946-HO-Reducing_Mobile_Phone_Theft_and_Improving_Security_March....pdf Year: 2016 Country: United Kingdom URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/509855/PRINT-6-1946-HO-Reducing_Mobile_Phone_Theft_and_Improving_Security_March....pdf Shelf Number: 138426 Keywords: Cell PhonesCrime PreventionMobile PhonesPick-PocketingStolen PropertyTheft |
Author: Denyer-Willis, Graham Title: Smarter Policing: Tracking the Influence of New Information Technology in Rio de Janeiro Summary: Technological advancements are changing the architecture of police-society relations around the world. New modes of oversight, whether applied by public security entities or citizens, are dramatically transforming the way policing is conducted. This is especially the case in digitally connected cities in the North and South. Surprisingly little is known, however, about how technology can be used to drive reform in police institutions including in Rio de Janeiro, where the relationships between police and residents are characterized by mistrust. A key objective of the Smart Policing project, a partnership of the Igarapé Institute and the Policia Militar do Estado do Rio de Janeiro (PMERJ), is to explore ways to enhance police accountability through technology. The following Strategic Note considers how the recently installed pacification police units (Unidades de Policia Pacificadora or UPP) are using technology to recapture urban territory from drug trafficking groups while simultaneously expanding trust and reciprocity with citizens. It examines how technological innovations at the street level, including mobile phone applications, can potentially strengthen the integrity of police work and the social contract. Details: Rio de Janeiro: Igarapé Institute, 2013. 15p. Source: Internet Resource: Strategic Note 10: Accessed March 4, 2017 at: https://igarape.org.br/wp-content/uploads/2013/10/Smarter_Policing_ing.pdf Year: 2013 Country: Brazil URL: https://igarape.org.br/wp-content/uploads/2013/10/Smarter_Policing_ing.pdf Shelf Number: 141323 Keywords: Drug TraffickingInformation TechnologyMobile PhonesPolice AccountabilityPolice EffectivenessPolice Technology |
Author: Moestue, Helen Title: Digitally Enhanced Child Protection: How new technology can prevent violence against children in the Global South Summary: The last decade has witnessed growing appreciation of the potential of information and communication technologies (ICTs) to protect children from violence. The issue of violence against children (VAC) is of singular importance. And while the full scope and scale of VAC remains hidden from view there is wide spread consensus that "every year and in every region of the world, millions of children suffer the cumulative impact of physical, mental and emotional violence, and millions more are at risk". Although ICT innovation for child protection is comparatively advanced in North America and Western Europe, there is less known about new tools in lower- and middle-income settings in the Americas, Africa and Asia. This Strategic Paper begins filling this knowledge gap and reviews the emerging character and functions of ICTs to prevent VAC in the global South. Drawing on assorted cases from Benin, Brazil, Kenya, Uganda and other countries, it provides a hint of the diversity of emerging experiences around the world. In the process, the Strategic Paper provides insights into emerging trends, typologies, and threats. Key findings include: - Mobile and digital technology are being harnessed in multiple ways to protect children, including through: (a) the digitization of existing child protection systems (b) helplines (c) citizen reporting and crowd mapping (d) mobile research and survey tools(e) big data analysis, and (f) tech-driven campaigning and information sharing; - These initiatives frequently combine the offer of assistance to children with the collection of real time data. This model in turn generates critical information for advocacy and can inform future child protection interventions; - Such approaches save time and money, and are breaking down the social, cultural and practical barriers to violence reporting. However, digital data collection raises important ethical questions about consent and confidentiality; - Innovation is emerging from a wide range of fields, including child protection, social development, the humanitarian sector, public health and the wider violence prevention field, and is often facilitated by creative public-private partnerships. Different disciplines are using the same tools; - Basic SMS based reporting systems have immense potential. Certain open source digital platforms offer the potential for scaling-up, especially systems such as Frontline SMS, Rapid SMS and Ushahidi, which integrate basic mobile phones for crowd-sourcing violence reporting and community mapping; and - There is a widening array of initiatives that enable children themselves to be informed, empowered and included in their own protection. Digitized survey tools, that can be used for and by children even in emergency settings, include Open Data Kit and Kobo Toolbox. The Strategic Paper considers the emerging landscapes of ICTs for VAC. It first sets the scene exploring the character and dynamics of violence against children, especially in low- and middle-income settings. The opening section also considers the expansion of ICTs and ethical implications in their application among children and youth. The second section introduces a typology of different ICTs including the digitization of child protection systems, child helplines, citizen reporting and crowd mapping, mobile research tools, Big Data analytics and technology-enabled campaigns. Section three explores how different sectors and disciplines are engaging with these new tools - including child protection experts, relief and development professionals and the public health community. The Paper closes with a brief consideration of next steps in the evolution of ICTs to prevent and reduce VAC. Details: Rio de Janeiro: Instituto Igarapa , 2014. 35p. Source: Internet Resource: Strategic paper 10: Accessed March 4, 2017 at: https://igarape.org.br/wp-content/uploads/2014/11/Artigo-estrategico-10-Child-Protection-4.pdf Year: 2014 Country: South America URL: https://igarape.org.br/wp-content/uploads/2014/11/Artigo-estrategico-10-Child-Protection-4.pdf Shelf Number: 134475 Keywords: Child ProtectionInformation TechnologyMobile PhonesViolence Against Children |
Author: Balkovich, Edward Title: Helping Law Enforcement Use Data from Mobile Applications A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool Summary: Consumer devices that automatically and unobtrusively collect data about their users, including cell phones and other mobile devices, are spreading. While these devices gather much data that is potentially helpful to law enforcement, they also complicate the interpretation of surveillance law and raise questions about privacy. Moreover, facilitating law enforcement understanding of and access to metadata may help law enforcement adjust practices as increased use of encryption decreases the availability of content information, even with appropriate legal permission. This report documents a prototype tool called MIKE (the Mobile Information and Knowledge Ecosystem) created to help interested stakeholders - law enforcement, commercial enterprises, regulators, legislators, and the public (including advocacy groups) - better understand the mobile app ecosystem and the relationships among the data, its sources, and applicable legal constraints. This volume describes the prototype, explains how it was developed, provides a manual for those who are interested in using it, and discusses how the prototype might be updated and extended. Details: Santa Monica, CA: RAND, 2017. 124p. Source: Internet Resource: Accessed May 6, 2017 at: https://www.rand.org/pubs/research_reports/RR1482.html Year: 2017 Country: United States URL: https://www.rand.org/pubs/research_reports/RR1482.html Shelf Number: 135335 Keywords: Information PrivacyInternetLaw EnforcementMobile DevicesMobile PhonesPolice TechnologyPrivacy |
Author: Privacy International Title: Digital stop and search: how the UK police can secretly download everything from your mobile phone Summary: The 'Digital stop and search' report examines the use of 'mobile phone extraction' tools by the UK police, enabling them to download all of the content and data from people's phones. Privacy International have exposed a potentially unlawful regime operating with UK police forces, who are confused about the legal basis for the technology they are using. The police are acting without clear safeguards for the public, and no independent oversight to identify abuse and misuse of sensitive personal information. Seen in the light of ongoing issues of discrimination within the criminal justice system, this presents a serious cause for concern. Key statistics: 26 out of 47 police forces (55%) that we submitted Freedom of Information requests to admitted they are using mobile phone extraction technology. Out of the remaining 21 police forces (45%): Eight police forces (17%) have trialed or intend to trial this technology Thirteen police forces (28%) either failed to respond to our questions or stated they hold no information on the use of this technology The 'Digital Stop and Search' report includes eleven key recommendations including: There needs to be an urgent independent review into this widespread, intrusive but secretive practice; There should be a requirement for police to obtain a warrant for searching the contents of a mobile phone, issued on the basis of reasonable suspicion; The Home Office must publish guidance for the public, regarding their rights if the police want to search their mobile phone. Details: London: Privacy International, 2018. 41p. Source: Internet Resource: Accessed April 10, 2018 at: https://privacyinternational.org/sites/default/files/2018-03/Digital%20Stop%20and%20Search%20Report.pdf Year: 2018 Country: United Kingdom URL: https://privacyinternational.org/sites/default/files/2018-03/Digital%20Stop%20and%20Search%20Report.pdf Shelf Number: 149746 Keywords: Digital PrivacyMobile PhonesPolice SurveillancePrivacy |
Author: Ellison, Anna Title: The demand for and use of illicit phones in prison Summary: Mobile phones in prisons are used for a range of purposes, both social and criminal, and would appear to have become a significant feature of prison life. During 2013, 7,451 illicit mobile phones or SIM cards were reported to Her Majesty's Prison and Probation Service (HMPPS), formerly the National Offender Management Service (NOMS). This research project, conducted during Spring/Summer 2014, was designed to gain an understanding of what drives the demand for illicit mobile phones by prisoners, and to help identify potentially effective ways of preventing their usage. The key research questions explored were: - What drives the demand for mobile phones within prisons - how much is for maintaining family contact and how much is for other more criminal purposes (including criminal networks, gangs, terrorism)? - Are certain types of prisoners more likely to want a mobile phone and so drive demand in particular establishments? - Which non-technical factors could be most effective (and cost effective) in reducing both the supply and demand for mobile phones in prison (including ways of counteracting the prison economy that surrounds the use of mobile phones)? Details: London; HM Prison & Probation Service, 2018. 69p. Source: Internet Resource: Ministry of Justice Analytical Series: Accessed July 30, 2018 at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/726874/The_demand_for_and_use_of_illicit_phones_in_prison_web_.pdf Year: 2018 Country: United Kingdom URL: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/726874/The_demand_for_and_use_of_illicit_phones_in_prison_web_.pdf Shelf Number: 150967 Keywords: Mobile PhonesPrison Contraband Telephones |