About

This page contains a single entry from the blog posted on April 19, 2011 7:15 PM. The previous post in this blog was Japan government out to censor internet nuke news. The next post in this blog is Blazers fall apart. Many more can be found on the main index page or by looking through the archives.

E-mail, Feeds, 'n' Stuff

Tuesday, April 19, 2011

Latest cop snoop breakthrough

A vacuum cleaner to suck all the data out of your cell phone -- even stuff you forgot you had. How are the police using it? Sorry, it will cost you half a million to find out.

Comments (13)

Why would you turn over your phone? Refuse consent. If you are arrested and your phone is seized pursuant to a lawful arrest, so be it.

Use a blackberry and don't give up the pin code. There is no backdoor and nothing they can do... cellebrite or not.

Dear Sligo, How do you know there is no back door? UFED claims "Fast and secure mobile data extraction and analysis from mobile phones and GPS."
When I see the word "secure," I used to know which side of the fence I was on. Now I'm not so sure.

If this gets to Portland, they'll just club or tase you and take your phone for "resisting"

Dear Sligo, How do you know there is no back door? UFED claims "Fast and secure mobile data extraction and analysis from mobile phones and GPS.

I work in the corporate security and I am familiar with their data acquisition products. Many US govt agencies including the POTUS and large multinational corporations use Blackberry for secure communication. That said, as the BB is proprietary and not open source it is possible that a backdoor exists. The chances of your vanilla federal, state or local police having access to that exploit are remote.

Iphone, Windows phone 7, Android and the rest can be exploited, not BB.

I'm sure before too long Android will develop an open source encryption scheme. When they do I will switch over.

If a BB or any other device has digital memory, there is no absolute security available - it's really only a matter of how much effort the hacker needs to put in to get at something.

Here's the only way to avoid such problems - provided you don't store phone numbers in the memory.

Had one of those things. The battery looked like a loaf of Tillamook cheese. My BB slips into a shirt pocket.

All information about your calls, texts and e-mails, including length, size, from/to, and other data--are already stored on servers at your cell phone provider. This product is a gimmick, and exists solely to get around civil protections.


Many US govt agencies including the POTUS and large multinational corporations use Blackberry for secure communication.

Most US government agencies do not have a standard for cell phone selection and use. I'm not sure what you mean by "security"; if you're talking about the wireless communication itself, no device is more "secure" than another, per se.

Iphone, Windows phone 7, Android and the rest can be exploited, not BB.

Nope. The BlackBerry has been exploited several times over the past several years. Here's one example.

I'm sure before too long Android will develop an open source encryption scheme.

There's no such company as "Android", and the Android platform is anything but "open source". Also, encryption exists for *all* cell communication, but it's not commonly used.

Don't discuss anything sensative in any electronic format, don't take embarrassing photos, period.

In terms of putting all your life out there on the web, emails, and texts, we're moving back the other direction. Even teenagers will wise up eventually.

Combine that with the recent revelation that iPhones store your movements as a series of timestamped location codes (even with the GPS off) and you've got big bro in the palm of your hand!

http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears

If you're really worried about this, when the cop pulls you over TURN OFF YOUR PHONE. If you want to be doubly sure, remove the battery. All the snooping power in the world won't be access it.

Combine that with the recent revelation that iPhones store your movements as a series of timestamped location codes (even with the GPS off) and you've got big bro in the palm of your hand!

GPS devices have done this for 20 years. All cellular device location data is stored and available at the cell provider's server--yes, no matter what phone you own. It's done the same for every cell phone.

What's strange is that you'd worry about that kind of data, when anybody stealing your phone would have access to the *real* private information-your contacts, messages, photos, texts, etc.

More simply--so what? What, exactly, would a bad guy do with a (very inexact, actually) record of approximate past locations of the phone?

You all want cell privacy? You want those sneaky towers out of your neighborhood? Stop using cell phones.

All information about your calls, texts and e-mails, including length, size, from/to, and other data--are already stored on servers at your cell phone provider. This product is a gimmick, and exists solely to get around civil protections.

We are talking about different things here. The article is about the popo dumping the contents of your phone at a traffic stop based on your consent or maybe a search incident to arrest if you get hooked up.

The data partition on the BB is encrypted when it is pin locked. The other devices we discussed can be dumped in the field with the cellebrite or similar tool. The cellebrite cannot acquire the data including call list, contacts, text messages from a BB. The contents of the microSD card in the BB are fair game. So if you are stupid enough to have pics or movies of yourself engaged in illegal activity on your phone, that is on you.

If the authorities have probable cause for a search warrant sure they can serve it on you wireless provider and get all of the data. That is a different animal. We are talking about protecting your data from a warrantless search in the wild for intelligence purposes or in an effort to develop probable cause for additional investigation.

We are talking about different things here. The article is about the popo dumping the contents of your phone at a traffic stop based on your consent or maybe a search incident to arrest if you get hooked up.

No, not with your consent. Quite the contrary.

The data partition on the BB is encrypted when it is pin locked.

Which doesn't make any difference.

The cellebrite cannot acquire the data including call list, contacts, text messages from a BB.

You didn't peruse the website. It can access almost *all* BlackBerry models.

We are talking about protecting your data from a warrantless search in the wild for intelligence purposes or in an effort to develop probable cause for additional investigation.

Law enforcement has repeatedly gotten information from warrantless searches by demanding it from providers. You're claiming that law enforcement both breaks and adheres to the law in your post. Which is it? If they adhere to the law, no worries. If they don't, they're in trouble (theoretically). Either way, if you're at a traffic stop and deeply concerned about a cop snatching your private information, pull out your cell phone and stomp on it, hard. Problem solved.




Clicky Web Analytics