It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.
The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images,
Learning that the police had been using mobile forensic devices, the American Civil Liberties Union (ACLU) has issued freedom of information requests which demand that state officials open up the data collected, to better assess if penalised motorists warrant having their data copied.
Michigan State Police were more than happy to provide the information – as long as the ACLU paid $544,680. Obviously not pocket change.
“Law enforcement officers are known, on occasion, to encourage citizens to cooperate if they have nothing to hide,” ACLU staff attorney Mark P. Fancher wrote. “No less should be expected of law enforcement, and the Michigan State Police should be willing to assuage concerns that these powerful extraction devices are being used illegally by honoring our requests for cooperation and disclosure.”
Once the data is obtained, the device’s “Physical Analyzer” can map both existing and deleted locations on Google Earth, porting location data and image geotags on Google Maps.
The ACLU’s main worry is that the handheld is quietly being used to bypass Fourth Amendment protections against unreasonable searches:
“With certain exceptions that do not apply here, a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity.
A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched.”
The next time you are Michigan, be sure drive carefully!
In a case explicitly decided to set a precedent, the California Appellate court has determined police officers can rifle through your cellphone during a traffic violation stop.
This is not the first time such a law has been under scrutiny. In April, the Blaze told you about the extraction devices police were using in Michigan to download the entire contents of your phone.
Florida and Georgia are among the states that give no protection to a phone during a search after a violation has been committed. In particular, Florida law treats a smartphone as a “container” for the purposes of a search, similar to say a cardboard box open on the passenger seat, despite the thousands of personal emails, contacts, and photos a phone can carry stretching back years.
But after initially striking down cell phone snooping, California has now joined the list of states that allow cops to go through your phone without a warrant if they decide to impound your car.
To protect all data at rest, iPhone features built-in hardware encryption using AES 256-bit encoding. Building on the hardware encryption capabilities of iPhone, email messages and attachments stored on the device can be further secured by using Data Protection. Data Protection uses a user’s device passcode to generate a strong encryption key. This key prevents data from being accessed when the device is locked, ensuring that critical information is secured even if the device is compromised.
Requires iOS 4.0 or higher
Continuously clean up locationd's history data in the background.
This package installs a daemon (process that can run in the background) to clean the consolidated.db file.
No new icons are added to your homescreen. There are no options to configure.
Originally posted by spacedonk
Further to the decision by the supreme court to allow strip searches for every arrest we saw last week
(visit the link for the full news article)
Going forward from this week on, people arrested in the United States may face a mandatory strip search, even if their offense is minor and authorities don’t suspect them of smuggling any contraband.
That’s because U.S. Supreme Court Justice Anthony M. Kennedy sided with the court’s conservatives on Monday, swinging the vote 5-4 in favor of allowing jail officials to conduct a strip search of anyone in their custody.
Those searches may now even be carried out on people who’ve only committed minor offenses like traffic violations or small drug possession, and in cases where there is nothing that meets the previous standard of “reasonable suspicion” that someone may be hiding something.
(I don't know if this is just a scare story or if it is the truth but thought there would be people interested in hearing what is being reported.)