NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] How easy is it to extract data from a target's cell phone? THIS easy!


   - - -
 How easy is it to extract data from a target's cell phone? THIS easy! --
   - - - 

Reference: 

"Urgent Call for Privacy-Enhanced Mobile Data Storage and Self-Destruct
Mechanisms": http://lauren.vortex.com/archive/000797.html

----- Forwarded message from [] -----

Date: Wed, 05 Jan 2011 20:40:01 []
From: []
Subject: Re: [lauren@vortex.com: [ NNSquad ] California: *All* data on *all*
	devices you carry is subject to warrantless search]
To: lauren@vortex.com

Lauren, please sanitize my info & share this as you see fit.

  >>> http://bit.ly/gADeNQ  (Cellebrite Forensic Products)

     [ An all-in-one phone spying kit!  Just like on 
       "The Man From U.N.C.L.E."  Only this one is real.
       "Open Channel D!" -- Lauren ]

That's just ONE example of portable devices out there that can very  
quickly & easily be hooked-up to any popular smartphone, defeat any  
password protection, and download ALL data from the device within a few  
minutes, for use as either legal evidence or 'intelligence-value only'  
operations.  Note that it defeats the standard password & data deletion  
methods, but won't decrypt any truly encrypted data on the device.

It used to be that this capability just existed at a large PD or the  
regional LE computer crime/forensics task force, but now the size, cost & 
operational ease of using the grabbers is such that most major PDs have the 
technology in-house, so it's a lot easier to use it for even relatively 
minor cases/fishing trips, and LEAs are well-aware of what a great intel 
bonanza smartphone data can be these days.  Legality isn't always a 
concern...

  [ Author name withheld as per request ]

> ----- Forwarded message from Lauren Weinstein<lauren@vortex.com>  -----
>
> Date: Wed, 5 Jan 2011 10:36:41 -0800
> From: Lauren Weinstein<lauren@vortex.com>
> To: nnsquad@nnsquad.org
> Subject: [ NNSquad ] California: *All* data on *all* devices you carry is
> 	subject to warrantless search
>
>
> California: *All* data on *all* devices you carry is subject to
> warrantless search
>
> http://bit.ly/ep9OUC  (CNN)
>
> This ruling illustrates a good reason to keep your phone locked (or
> have a way to lock it quickly), and keep as much phone-related data as
> possible in the cloud, where warrantless searches are much less likely
> in the general case.  Note though, that there are legal tradeoffs
> between cloud-based and personal-based data in all manner of complex
> ways due to lack of harmonization of relevant laws in a manner that
> would provide equally strong privacy protection in all cases.  Such
> harmonization in favor of privacy is crucially needed.
>
> Key points:
>
> Ruling conflicts with other rulings, Supreme Court involvement likely
>
>   "Ruling includes any arrests, even for protests and demonstrations."
>
>   "... ruling is not limited to text messages.  The ruling allows police in
>    California to access any data stored on an arrestee's phone: photos,
>    address book, Web browsing history, data stored in apps (including
>    social media apps), voicemail messages, search history, chat logs, and
>    more. Also, depending on the use of location-enabled services or apps
>    that store data on the phone, the police might also be able to infer
>    the arrestee's past whereabouts."
>
> I should add that it appears the ruling would apply to any other carried
> devices as well.  Laptops, thumb drives, you name it.
>
>   "The police can ask you to unlock the phone -- which many people will
>    do -- but they almost certainly cannot compel you to unlock your phone
>    without the involvement of a judge," she said. Also, she noted that so
>    far it's legally unresolved whether police can copy data from an
>    arrestee's phone for future examination."
>
>   "Depending on who's getting arrested, and for what, warrantless
>    searches of cell phone data could have wide-ranging potential to
>    implicate not just the arrested person, but also to draw police
>    attention to other people who might be involved (or merely
>    associated) with the arrestee."
>
> More to come.
>
> --Lauren--
> Lauren Weinstein (lauren@vortex.com)
> http://www.vortex.com/lauren
> Tel: +1 (818) 225-2800
> Co-Founder, PFIR (People For Internet Responsibility): http://www.pfir.org
> Founder, NNSquad (Network Neutrality Squad): http://www.nnsquad.org
> Founder, GCTIP (Global Coalition for Transparent Internet Performance):
>     http://www.gctip.org
> Founder, PRIVACY Forum: http://www.vortex.com
> Member, ACM Committee on Computers and Public Policy
> Lauren's Blog: http://lauren.vortex.com
> Twitter: https://twitter.com/laurenweinstein
> Google Buzz: http://bit.ly/lauren-buzz
>
> ----- End forwarded message -----
>
----- End forwarded message -----