According to AntiSec, the unique device identifiers (UDID) of 12,367,232 Apple iPhones and iPads were discovered and lifted during the breach of an FBI agent's notebook, reports The Next Web. UDIDs are unique 40-character codes assigned to iDevices with cellular connectivity, their primary use being app registration and tracking by developers.
Now Apple will likely follow the standard Madison Avenue PR strategy of downplaying the matter, insisting that since they have previously issued statements about not using these identifiers. And the media will not report it past any specialized narrowly-channeled venues.
But the FBI was keeping track of how many identifiable devices? really? I wonder what the warrant with that list looked like? ... Oh wait.... no warrants needed since the agent may have signed it himself. And is anyone liable for the "leak?" - oh wait - no....
In closing, the reason that all government protected data ends up in corporate hands is....?
Here's the salient AntiSec post:
During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of "NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device,
type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose.
(visit the link for the full news article)
edit on 4-9-2012 by Maxmars because: (no reason given)