Abstract
This study was carried out intending to identify the level and type of information that remained on portable devices that were purchased from the second-hand market in the UK over the last few years. The sample for this study consisted of 100 second hand mobile phones and tablets. The aim of the study was to determine the proportion of devices that still contained data and the type of data that they contained. Where data was identified, the study attempted to determine the level of personal identifiable information that is associated with the previous owner. The research showed that when sensitive and personal data was present on a mobile device, in most of the cases there had been no attempt to remove it. However, fifty two percent of the mobile devices had been reset to the factory settings or had had all of the data erased, which demonstrates the previous owner’s attempt to permanently remove personal identifiable information. Twenty eight percent of the devices that were sold were not functional or recognized by the software used in the research. Twenty percent of the devices that contained data contained data that gave away the identity of the previous owner.
References
- Campbell-Kelly M, Garcia-Swartz D, Lam R, Yang Y, (2015), Economic and business perspectives on smartphones as multi-sided platforms, Telecommunications Policy, Volume 39, Issue 8, pp 717-734.
- Statista Research Department, (2020), Mobile phone users worldwide 2015-2020, Online source, Accessed on: 21/10/2019, https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/
- Holst A, (2019), Smartphone market share worldwide by vendor 2009-2019, Online source, Accessed on: 21/10/2019, https://www.statista.com/statistics/271496/global-market-share-held-by-smartphone-vendors-since-4th-quarter-2009/
- Liu S, (2019), Forecast number of tablet users worldwide 2013-2021, Online source, Accessed on: 21/10/2019, https://www.statista.com/statistics/377977/tablet-users-worldwide-forecast/
- Valli, C. (2004), Throwing Out the Enterprise with the Hard Disk. Paper presented at the 2nd Australian Digital Forensics Conference, Fremantle, Western Australia.
- Jones A., Mee V., Meyler C., Gooch J., (2005), Analysis of Data Recovered from Computer Disks released for resale by organisations, Journal of Information Warfare, https://www.jinfowar.com/journal/volume-4-issue-2/ analysis-data-recovered- computer-disks-released-resale-organisations
- Jones A., Valli C., Dardick G., Sutherland I., (2007), The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Journal of Digital forensics, Security and Law, https://commons.erau.edu/jdfsl/vol3/iss1/1/
- Valli, C., and Woodward, A. (2008). The 2008 Australian study of remnant data contained on 2nd hand hard disk: the saga continues. Paper presented at the 6th Australian Digital Forensics Conference, Edith Cowan University, Perth, Western Australia.
- Jones, Dardick, Davies, Sutherland and Valli, (2009) The 2008 Analysis of Information Remaining on Disks Offered for Sale on the Second-Hand Market, Journal of International Commercial Law and Technology, Vol. 4, Issue 3.
- Jones, Valli, Dardick, Sutherland, Dabibi, Davies, (2009), The 2009 Analysis of Information Remaining on Disks Offered on the Second-Hand Market, Paper presented at the Australian Digital Forensics Conference, Perth, Western Australia, https://ro.ecu.edu.au/adf/80/
- Jones A., Martin T., Alzaabi M., (2012), The 2012 analysis of information remaining on computer hard disks offered for sale on the second-hand market in the UAE, Paper presented at the Australian Digital Forensics Conference, Perth, Western Australia, https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1110&context=adf
- Martin T., Jones A., Alzaabi M., (2016), The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Journal of Digital Forensics, Security and Law, Volume 11, Number 4, Article 6, https://commons. erau.edu/jdfsl/vol11/iss4/6/
- Jones A, Angelopoulou O, Noriega L, (2019), Survey of data remaining on second hand memory cards in the UK, Computers & Security, Vol. 84, pp 239-243.
- Stellar, (2019), Residual data study on second hand devices, Online source, Accessed on: 15/11/2019, https://www.stellarinfo.com/pdf/ Stellar-Residual-Data-Study-on-Second-Hand-Devices-Report-April-2019.pdf
- Valli C, Jones A, (2008), A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Security and Management. International Conference on Security and Management, 2008.
- Jones A, Valli C, Sutherland I, (2008), Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market, Journal of Digital Forensics, Security and Law.
- Garfinkel, Farrell, Roussev and Dinolt, Bringing Science to Digital Forensics with Standardized Forensic Corpora, DFRWS 2009, Montreal, Canada
- Rowe N, Schwamm R, (2014), Effects of the Factory Reset on Mobile Devices, Journal of Digital Forensics, Security and Law
- BBC News (2014), Tesco Hudl and other Android devices face data reset flaw, Online source, Accessed on: 25/08/2020, https://www.bbc.co.uk/news/technology-28790583
- BBC News (2014), Naked selfies extracted from ’factory reset’ phones, Online source, Accessed on: 25/08/2020 https://www.bbc.co.uk/news/technology-28264446
- BBC News (2014), Old phones harbour personal data, forensic expert shows, Online source, Accessed on: 25/08/2020 https://www.bbc.co.uk/news/av/technology-27768901
- BBC News (2008), Used mobile devices reveal data, Online source, Accessed on: 25/08/2020 http://news.bbc.co.uk/1/hi/wales/south_east/7637366.stm
- Huang, B., (2011), Data Recovery on Android Phones (Doctoral dissertation, The George Washington University).
- Garfinkel, S.L. and Shelat, A., (2003), Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 1(1), pp.17-27.
- Szewczyk, P. and Sansurooah, K., (2012), The 2012 investigation into remnant data on second hand memory cards sold in Australia. Australian Digital Forensics Conference.
- Szewczyk, P., Robins, N. and Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia.
- Jones, A., Martin, T. and Alzaabi, M., (2016), The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In the UAE. Journal of Digital Forensics, Security and Law.
- Jones, A., Valli, C. and Dabibi, G.,(2009), The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market.
- Jones, A., Valli, C., Dardick, G.S. and Sutherland, I., (2009), The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 2(1), pp.53-68.
- Jones, A., Dardick, G.S., Davies, G. and Sutherland, I., (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market. J. Int’l Com. L. & Tech., 4, p.162.
- Jones, A., Valli, C. and Sutherland, I., (2008), Analysis of Information remaining on Hand Held Devices offered for sale on the second hand market. The Journal of Digital Forensics, Security and Law: JDFSL, 3(2), p.55.
- Medlin, B.D. and Cazier, J.A., (2010), A Study of Hard Drive Forensics on Consumers’ PCs: Data Recovery and Exploitation. Journal of Management Policy and Practice, 12(1), pp.27-35.
- Podhradsky, D., Asley, L., D’Ovidio, D. and Casey, C., (2011). Identity theft and used gaming consoles: Recovering personal information from Xbox 360 hard drives. Identity, 8, pp.5-2011.
- Regulation (EU) 2016/679 of the European Parliament and of the Council, Regulations originating from the EU2016 No. 679 CHAPTER I Article 4, (2016), On-line source, Accessed on: 08/07/2021, https://www.legislation.gov.uk/eur/2016/679/article/4
Recommended Citation
Angelopoulou, Olga; Jones, Andy; Horsman, Graeme; and Pourmoafi, Seyedali
(2022)
"A Study of the Data Remaining on Second-Hand Mobile Devices in the UK,"
Journal of Digital Forensics, Security and Law: Vol. 17
, Article 5.
DOI: https://doi.org/10.58940/1558-7223.1785
Available at:
https://commons.erau.edu/jdfsl/vol17/iss2/5