Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Occupy Underground
Related: About this forumACLU: New Document Sheds Light on Government’s Ability to Search iPhones
http://www.aclu.org/blog/technology-and-liberty-criminal-law-reform-immigrants-rights/new-document-sheds-lightCell phone searches are a common law enforcement tool, but up until now, the public has largely been in the dark regarding how much sensitive information the government can get with this invasive surveillance technique. A document submitted to court in connection with a drug investigation, which we recently discovered, provides a rare inventory of the types of data that federal agents are able to obtain from a seized iPhone using advanced forensic analysis tools. The list, available here, starkly demonstrates just how invasive cell phone searches areand why law enforcement should be required to obtain a warrant before conducting them.
Last fall, officers from Immigration and Customs Enforcement (ICE) seized an iPhone from the bedroom of a suspect in a drug investigation. In a single data extraction session, ICE collected a huge array of personal data from the phone. Among other information, ICE obtained:
call activity
phone book directory information
stored voicemails and text messages
photos and videos
apps
eight different passwords
659 geolocation points, including 227 cell towers and 403 WiFi networks with which the cell phone had previously connected.
Before the age of smartphones, it was impossible for police to gather this much private information about a persons communications, historical movements, and private life during an arrest. Our pockets and bags simply arent big enough to carry paper records revealing that much data. We would have never carried around several years worth of correspondence, for examplebut today, five-year-old emails are just a few clicks away using the smartphone in your pocket. The fact that we now carry this much private, sensitive information around with us means that the government is able to get this information, too.
(More at the link.)
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
3 replies, 1988 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (11)
ReplyReply to this post
3 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
ACLU: New Document Sheds Light on Government’s Ability to Search iPhones (Original Post)
Fire Walk With Me
Feb 2013
OP
ProgressiveProfessor
(22,144 posts)1. There are secure erasing apps out there
It is also possible to write an auto erase program for Android (seen several) that would trip up most labs.
UnrepentantLiberal
(11,700 posts)2. One of these?
ProgressiveProfessor
(22,144 posts)3. Those are the readily available ones...
Problem is how to brick a phone when LEOs are forcing their way in. Fairly easy to write as it turns out but not without the risk of the user triggering it accidentally.