NNSquad - Network Neutrality Squad
[ NNSquad ] How easy is it to extract data from a target's cell phone? THIS easy!
- - -
How easy is it to extract data from a target's cell phone? THIS easy! --
- - -
Reference:
"Urgent Call for Privacy-Enhanced Mobile Data Storage and Self-Destruct
Mechanisms": http://lauren.vortex.com/archive/000797.html
----- Forwarded message from [] -----
Date: Wed, 05 Jan 2011 20:40:01 []
From: []
Subject: Re: [lauren@vortex.com: [ NNSquad ] California: *All* data on *all*
devices you carry is subject to warrantless search]
To: lauren@vortex.com
Lauren, please sanitize my info & share this as you see fit.
>>> http://bit.ly/gADeNQ (Cellebrite Forensic Products)
[ An all-in-one phone spying kit! Just like on
"The Man From U.N.C.L.E." Only this one is real.
"Open Channel D!" -- Lauren ]
That's just ONE example of portable devices out there that can very
quickly & easily be hooked-up to any popular smartphone, defeat any
password protection, and download ALL data from the device within a few
minutes, for use as either legal evidence or 'intelligence-value only'
operations. Note that it defeats the standard password & data deletion
methods, but won't decrypt any truly encrypted data on the device.
It used to be that this capability just existed at a large PD or the
regional LE computer crime/forensics task force, but now the size, cost &
operational ease of using the grabbers is such that most major PDs have the
technology in-house, so it's a lot easier to use it for even relatively
minor cases/fishing trips, and LEAs are well-aware of what a great intel
bonanza smartphone data can be these days. Legality isn't always a
concern...
[ Author name withheld as per request ]
> ----- Forwarded message from Lauren Weinstein<lauren@vortex.com> -----
>
> Date: Wed, 5 Jan 2011 10:36:41 -0800
> From: Lauren Weinstein<lauren@vortex.com>
> To: nnsquad@nnsquad.org
> Subject: [ NNSquad ] California: *All* data on *all* devices you carry is
> subject to warrantless search
>
>
> California: *All* data on *all* devices you carry is subject to
> warrantless search
>
> http://bit.ly/ep9OUC (CNN)
>
> This ruling illustrates a good reason to keep your phone locked (or
> have a way to lock it quickly), and keep as much phone-related data as
> possible in the cloud, where warrantless searches are much less likely
> in the general case. Note though, that there are legal tradeoffs
> between cloud-based and personal-based data in all manner of complex
> ways due to lack of harmonization of relevant laws in a manner that
> would provide equally strong privacy protection in all cases. Such
> harmonization in favor of privacy is crucially needed.
>
> Key points:
>
> Ruling conflicts with other rulings, Supreme Court involvement likely
>
> "Ruling includes any arrests, even for protests and demonstrations."
>
> "... ruling is not limited to text messages. The ruling allows police in
> California to access any data stored on an arrestee's phone: photos,
> address book, Web browsing history, data stored in apps (including
> social media apps), voicemail messages, search history, chat logs, and
> more. Also, depending on the use of location-enabled services or apps
> that store data on the phone, the police might also be able to infer
> the arrestee's past whereabouts."
>
> I should add that it appears the ruling would apply to any other carried
> devices as well. Laptops, thumb drives, you name it.
>
> "The police can ask you to unlock the phone -- which many people will
> do -- but they almost certainly cannot compel you to unlock your phone
> without the involvement of a judge," she said. Also, she noted that so
> far it's legally unresolved whether police can copy data from an
> arrestee's phone for future examination."
>
> "Depending on who's getting arrested, and for what, warrantless
> searches of cell phone data could have wide-ranging potential to
> implicate not just the arrested person, but also to draw police
> attention to other people who might be involved (or merely
> associated) with the arrestee."
>
> More to come.
>
> --Lauren--
> Lauren Weinstein (lauren@vortex.com)
> http://www.vortex.com/lauren
> Tel: +1 (818) 225-2800
> Co-Founder, PFIR (People For Internet Responsibility): http://www.pfir.org
> Founder, NNSquad (Network Neutrality Squad): http://www.nnsquad.org
> Founder, GCTIP (Global Coalition for Transparent Internet Performance):
> http://www.gctip.org
> Founder, PRIVACY Forum: http://www.vortex.com
> Member, ACM Committee on Computers and Public Policy
> Lauren's Blog: http://lauren.vortex.com
> Twitter: https://twitter.com/laurenweinstein
> Google Buzz: http://bit.ly/lauren-buzz
>
> ----- End forwarded message -----
>
----- End forwarded message -----