Search for:

Mobile Security

Magnus team has managed the Mobile Security posture of federal agencies both from a policy management / device management (Mobile Device Management) and mobile application vetting perspective. Magnus engineers have worked extensively with The Lookout and IBM MaaS 360 tool suites to deliver this service.

In a recent case study, our Mobile Security engineering team is responsible with mobile secure communications and monitoring of security technologies of 10,000+ devices and have tested and vetted hundreds of applications both on the iPhone and Android platforms. This includes configuration management, application IT security, identity and access management, device management, log analysis, storage management, and remote access for all devices managed.

In addition, Magnus Digital Forensic Engineers have the knowledge and subject matter expertise to provide detailed reports to management to reveal what occurred to bring a device under the umbrella of a forensic investigation. In cases where an Executive Summary is needed for VIP or senior level management, MAGNUS Forensic Engineers have ability to present the details in a manner that is easily digestible for senior management.  In the instance where a deep technical description is needed, MAGNUS Forensic Engineers have the knowledge and experience to present the findings in a detailed manner.  As forensic investigations and e-discovery becomes more important both in government, corporate, and the private sectors, MAGNUS Engineers continue to stay up to date with processes, challenges, new tools, and changes as they come about.

Digital Forensics

Magnus has had a Digital Forensics Practice since 2017 when we started supporting a premier Federal Law Enforcement Agency with its investigations into mobile devices. Initially this was done under the umbrella of our Cyber Security practice, however it was soon determined that this was a unique area with a need for focused skillsets and knowledge of specific tools.

Our Digital Forensics practice today supports Law Enforcement Agencies with its Collection, Examination, Analysis and Reporting of data for Mobile, Tablet, Vehicle GPS, IOT and Drone Investigations. Our digital forensics practitioners have a wide variety of tools in their kit which gives you a sense of the sorts of tasks they can complete:

  • Disk and data capture tools
  • File viewers
  • File analysis tools
  • Registry analysis tools
  • Internet analysis tools
  • Email analysis tools
  • Mobile devices analysis tools

The process models our digital forensics practitioners use can vary, however below are the four basic steps:

  1. Collection, in which digital evidence is acquired. This often involves seizing physical assets, like computers, phones or hard drives; care must be taken to ensure that no data is damaged or lost. Storage media may be copied or imaged at this stage in order to keep the original in a pristine state for reference.
  2. Examination, in which various methods are used to identify and extract data. This step can be divided into preparation, extraction and identification. Important decisions to make at this stage are whether to deal with a system that’s live or dead.
  3. Analysis, in which the data that’s been gathered is used to prove or disprove the case being built by investigators. For each relevant data item, investigators will answer the basic questions about it — who created it? who edited it? how was it created? when did this all happen? — and attempt to determine how it relates to the case.
  4. Reporting, in which the data and analysis are synthesized into a format that can be understood by stakeholders. Being able to create such reports is an absolutely crucial skill in digital forensics.