It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.
The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.
In short, it can copy everything on your smartphone in a matter of minutes.
Once the data is obtained, the device’s “Physical Analyzer” can map both existing and deleted locations on Google Earth, porting location data and image geotags on Google Maps.
By the way, Apple iPhones keep track of where you go (via GPS) and when, and stores about a year of the data in a secret file on the phone, ready for the police to download. In Google’s case Android HTC phones track calls and location and transmit the data back to Google several times an hour.
It’s a cool feature. I feel safer, don’t you?
We Agreed to Our Surveillance: User agreements signed by [cell phone] customers (that’s you) specifically allow these giant corporations to track your every move, listen in to any live conversation you may be having, store any amount of your private information they want for as long as they choose, and (this is where it gets really scary) give and/or sell that information to anyone they so choose, including the government. (See also: Telecommunications Act of 1996) . . . Cell phone conversations in the US are funneled through the National Security Agency’s (NSA) Echelon System that captures “keywords” and passes them onto the Fusion Centers for further analyses of those deemed a “threat” to security. (Source)
In fact, they have been recognizing you by mere snippet of voiceprint for some time now, and they are gearing up not only to record everything to search it later, but to search through what they have already been recording. Go back and mine the data with new questions. Patterns mined from persons of interest are then used to find other persons of interest. Pattern recognition includes slang and other linguistic codes learned from intercepted conversations. These patterns are not limited to keywords; they interpret content. They include time and place as well as inflection. They do not have to be in English. A live human being is not required for pattern recognition. Did I mention voiceprint? And don’t get me started on GPS — now that we see that your smartphone is smart enough to secretly record your coordinates continually for later retrieval by whomever has the backdoor key . . . “The Big Brother Services Industry and their tools,” given on December 30th, 2009:
The CelleBrite UFED (Universal Forensic Extraction Device) is the ultimate standalone device for mobile phone forensic analysis, both in the field and in the forensic lab. The UFED extracts vital data such as phonebook, pictures, videos, text messages, call logs, ESN and IMEI information, then gathers the data into reports for research and evidence. With the widest coverage available in the market today, the UFED extracts data from approximately 3,000 devices, or 95% of all phones including smartphones, PDA devices, and cell phones. The CelleBrite UFED system supports CDMA, GSM, IDEN, and TDMA technologies, and is compatible with all wireless carriers. It requires no PC which is especially critical for field use, and can easily store hundreds of phonebook and content items onto an SD card or USB flash drive. The UFED comes with a full set of data cables and accessories for even the harshest field conditions.
Bill seeks to expand government’s wiretapping power: The feds want to overhaul wiretapping regulations to expand their ability to eavesdrop online, reports the New York Times . The Obama administration plans to submit a bill to Congress next year that would require all service providers to be technically capable of wiretapping the communications they enable, from encrypted BlackBerry emails to Skype messaging. Law enforcement types say their surveillance capabilities are “going dark” as everybody—from mob bosses to drug cartels—turns away from telephones. More »
We have to let police grab all your cell phone data because we can’t let the terrorists win.
Saturday, 23 April 2011 05:57
‘Thousands of Americans, who risked their lives to save lives during the 9/11 terror attacks on US soil, will soon be screened by the FBI terrorism watch list.
A host of 9/11 first responders, who saved countless lives, will now have their personal data put through a government terror database and will be considered possible terrorists under a provision in James Zadroga 9/11 Health & Compensation Act — a bill named after an NYPD detective who died of 9/11 — related illnesses, The Huffington Post reported on Thursday.
They will subsequently be denied treatment for breathing disorders and mental health problems developed in the aftermath of the 2001 terrorist attacks.’
Those 911 heroes might be terrorists.
Why should they mind–if they have nothing to hide?
We can’t be too careful, can we?
- Wiretapping News
- Update on the Big Brother iPhone – spying story; Michigan may have been snooping into mobile phones since 2008 (americablog.com)
- Michigan State Police Use Orwellian Cellphone “Extraction” Devices (fellowshipofminds.wordpress.com)
- State Cops Have a Device that Secretly Searches Cellphones (discourse.net)
- Police Using CelleBrite Device to Search Cell Phones During Traffic Stops (blippitt.com)
- Michigan: Police Search Cell Phones During Traffic Stops (mountainrepublic.net)
- Speeding Ticket? Give Us All Your Cell Phone Data (techie-buzz.com)
- US Police Can Copy Your iPhone’s Contents In Under Two Minutes (thenextweb.com)
- Proprietary Software Increasingly Eliminates Freedom, Privacy, and Dignity (techrights.org)
- We Don’t Need No Stinkin’ Warrants (lewrockwell.com)
- ACLU Upset Over Cell Phone Extraction Device (npr.org)
- Your Private Life Will Suddenly Explode: Narus’s ‘Hone’
- Tech Giants Sony, Apple, Google Face Outrage Over Privacy Breaches in Devices