Candlelites

Everything from Everywhere

police now routinely crack and extract all phone data from arrestees / boing boing

police now routinely crack and extract all phone data from arrestees / boing boing News Article With The full text news. The Resource Link is down the post and you can View this News Article in the source page.



police now routinely crack and extract all phone data from arrestees / boing boing

muckrock filed freedom of information requests with multiple us police forces to find out how they were using "mobile phone forensic extraction devices" -- commercial devices that suck all the data out of peoples' phones and make it available for offline browsing. report this ad they discovered that the practice of sucking up the entirety of arrestees' phones was incredibly common, and that often, cops sucked up this data without a warrant, after first obtaining "consent" from arrestees. mobile phones are troves of sensitive personal information, which is presumably why the police are so interested in them. but the same data-richness that interests police departments should also give us pause: it's never been the case that a cop busting a low-level, nonviolent offender would be allowed to probe that person's entire network of friends and relations; read all the correspondence between the arrestee and their doctors, lawyers, kids and spouse; get a neat list of all the places the person had visited; and be able to look at everything from bank balances to spending history. the major provider of mobile forensic tools is the israeli firm cellebrite, who made headlines when the fbi revealed that they'd used a cellebrite tool to crack the san bernadino shooters' phones, and then again when a hacker dumped 900gb worth of internal cellebrite info, revealing that the company routinely repackaged hacking tools from the darkweb and sold them to police de...