Introduction: The Evolution of Crime and Cybercrime For most of history, crime scenes were tangible places marked by physical evidence: a blown safe, a getaway car’s tire tracks, a victim’s belongings. Detectives pursued leads by pounding the pavement, interviewing witnesses, and collecting fingerprints or DNA. But in the late 20th century, a new kind of crime scene emerged, one made of bits and bytes, lurking behind screens and networks. As society’s personal and financial life moved online, criminals followed, committing theft, fraud, and even acts of sabotage through keyboards rather than crowbars. Law enforcement soon realized that solving modern crimes often meant tracing shadows in cyberspace as much as on city streets. This evolution did not happen overnight. Early computer crimes in the 1980s were fringe occurrences handled by a handful of tech-savvy officers. By the 2020s, however, digital evidence is featured in roughly 90% of all criminal cases . Traditional police wor...
When I went to the CYBERUS Spring School in early April 2025 (April 7–11, 2025, at Université Bretagne Sud in Lorient, France), one of the topics we talked about was the age old query: Which phone is safer, the iPhone or the Android ? The conversations were instructive to me as a security enthusiast. We discussed technical ideas like mobile app sandboxing and even how two apps from the same developer could access data in spite of platform security measures. The discussions underlined an important realization I've had over the years: while IOS and Android both have robust security mechanisms, neither is completely impenetrable. In this essay, I'll provide a professional (but hopefully easy-to-read) analysis of Android vs iPhone security, interspersed with my own viewpoints, demonstrating why no system can claim perfect security. Security by Design: IOS and Android Approaches Apple's IOS and Google's Android have fundamentally different approa...