ACLU Obtains Cell Phone Tracking Training Materials 33
guttentag writes "The New York Times has published a large collection of law enforcement training documents obtained by the ACLU. The documents describe in detail what kind of information can be obtained from cell phones and cell phone carriers, and how to obtain it. The 189-page PDF also contains dozens of invoices from the major carriers for their services to law enforcement that describe the fees for those services."
Re: (Score:3)
That's a bit misleading; every time this has been brought to light it's been the case of the general public bribing a cell company employee. It's a problem, to be sure, but it's also not like I can punch my credit card info into verizonrecords.com or whatnot...
Any suggestions further securing an Iphone? (Score:3)
Re: (Score:3, Funny)
What are you hiding?
Re: (Score:3)
Re:Any suggestions further securing an Iphone? (Score:5, Funny)
That's a lie, and you know it!
Re:Any suggestions further securing an Iphone? (Score:5, Informative)
No. The reason is they dump the contents of the phone. They don't actually utilise the phone itself. They just plug in a USB cable and can access the disk. Sort of like putting a device into mass storage mode where instead of the device being able to sync it can be used as an external hard drive.
They can actually do forensics of live devices (laptops, etc) under at least some circumstances through USB 3.0 (i believe) and firewire ports.By live I mean they access the ram of the device while it is running. So if for instance a device is connected to an Internet host somewhere they can insert commands and do other stuff to it. Or figure out what is being displayed on screen without having to break your password. They could for instance grab a security key if your device is encrypted.
Re: (Score:1)
Firewire specifically supports DMA. Feature, not bug.
Re: (Score:2)
bios level remote access, KVM switches - some sys-admins want remote BIOS level access to their servers. The software replicates the framebuffer as well as mouse anf keyboard events across the internet.
DMA to bypass security (Score:2)
Any device that can do DMA can be used to gain access to anything on the system. This includes eSATA, Firewire, PCMCIA, and probably other ports. USB does not support DMA, though that may have changed in 3.0.
It would be possible for the OS to disable most of these when the system is locked, which should be a feature of any secure OS, though it would annoy users, so don't expect it to be the default setting.
Re:Any suggestions further securing an Iphone? (Score:5, Informative)
Can any of the programs available to jailbroken phones prevent scans?
You're using an iPhone and you have illusions about your privacy? Dude, have you read the EULA [apple.com]? Law enforcement has more restrictions on what it can and cannot do with your data than the manufacturer does, which is basically no restrictions. Worry less about what the ACLU found out and more about the people who made your phone.
"...you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your iOS Device, computer, system and application software, and peripherals, that is gathered periodically..."
"...To provide and improve these services, where available, Apple and its partners and licensees may transmit, collect, maintain, process and use your location data, including the real-time geographic location of your iOS Device, road travel speed information, and location search queries."
"These unique identifiers may include your email address(es), the Apple ID information you provide, a hardware identifier for your iOS Device, and your iPhoneâ(TM)s telephone number. By using the iOS Software, you agree that Apple may transmit, collect, maintain, process and use these identifiers..."
By the way, that's all on page 1. There are 96 pages after that.
Comment removed (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Still better than using Android. Because Apple is making money off of selling the device not ads or services, they are actually de-incentivized from abusing that info because it could drive away their customers and as a consequence they've got a pretty good track record on not giving away your info. Google's whole raison d'être on the other hand is actually gathering that info, correlating it with info from all of their other services [washingtonpost.com] and then using it to target you. Plus they've been known to make a r [eff.org]
Re: (Score:1)
Re: (Score:2)
You're trolling, right ? The people who give repressive regimes access to their servers [slashdot.org] ?
Re:Any suggestions further securing an Iphone? (Score:5, Informative)
Here's what they can gather at a network level
1. Which antenna of what tower your phone last registered on (and possibly also RSSI).
2. Incoming and outgoing numbers dialed, call duration, and technical data during call (which towers, etc.).
3. Data ingoing/outgoing (including SMS) to the extent that they log it (ever notice the proxy under the APN settings?).
Once they have the device itself
1. Anything stored on the device (including SMS not stored on the SIM).
2. GPS history (and other debug information the device might have collected).
3. Contacts and other information in the SIM (provided you didn't lock the SIM, unless they get the PUK, which is mentioned in tfPDF).
The network-level stuff is controlled (in your phone) by the baseband chip and associated firmware
You're carrying an active transceiver that operates independent of your input (eg: there is no 'key' like in HF). Finding it will be easy. Tracking it will be easy.
Moxy Marlinspike (et.al.) have done some work on the upper layers with respect to anonymizing and/or encrypting the content of the communication, and there are several projects to help you secure the container (the phone itself), but realistically
Re: (Score:2)
Re: (Score:2)
The police buy off-the-shelf gear and go to expensive training courses to learn how to plug it in and press the 'go' button
That said, if you are sufficiently interesting and your phone ends up in the hands of the FBI/NSA/etc with someone that has the experience to do SMD rework and physically pull the chips off the board you're likely being held incomm
Redactions (Score:5, Interesting)
If you look at all of the redactions from the invoices from cell companies (at the end), you'll notice that a few times names and emails are NOT redacted. Someone screwed up.
Re:Redactions (Score:4, Funny)
redactions from the invoices from cell companies (at the end), you'll notice that a few times names and emails are NOT redacted.
Someone now has the name and e-mail address of a few of the secretaries that process the paperwork for [ 3 letter government agency]. We'll have to raise the terror alert to Muave: 'Increased Risk of Angry Letters Being Sent to Actual People Instead of Boiler Room.'
Re: (Score:1)
No, they redacted the names and emails of the officers involved. On a couple, they forgot to redact the email and/or name of the requesting person. Most of the invoices due contain the names from the cell company employees, it's the names of the people requesting the information I was referring to. :P
link to HBGary / Team Themis (Score:3)
one of the three companies, Berico Technologies, had on it's menu of expertise the area of 'cellular exploitation'.
took a while to figure that out, but essentially you have 1. cellular communications, and 2. exploitation, the former being obvious, the latter being extracting 'actionable intelligence' from the logs, records, billings, etc of the former.
their management learned how to do this in the GWOT - some of them were part of special operations in Afghanistan.
every tool we use against the terrorists will be turned around and used on citizens eventually.
Re: (Score:2)
take out the battery. something you can't do with a apple device strangely enough :P
Re: (Score:3, Interesting)
"something you can't do with a apple device strangely enough :P"
Much more secure than removing the battery when there might be a small hidden battery :
in the phone which defeats such measures, is this
Get three foil-lined bags of the type used to contain potato chips.
Insert one bag inside the next, so you end up with the innermost bag
covered with two more bags.
Then insert the phone into the innermost bag, and fold over the openings of all three bags so the bag
is closed tightly. The phone will not be able to
Re:Android (Score:5, Funny)
You can use any additional bags to fashion yourself a nice hat too.
"spin" on presentation (Score:2)