Forgot your password?
typodupeerror
Privacy

ACLU Obtains Cell Phone Tracking Training Materials 33

Posted by samzenpus
from the step-by-step dept.
guttentag writes "The New York Times has published a large collection of law enforcement training documents obtained by the ACLU. The documents describe in detail what kind of information can be obtained from cell phones and cell phone carriers, and how to obtain it. The 189-page PDF also contains dozens of invoices from the major carriers for their services to law enforcement that describe the fees for those services."
This discussion has been archived. No new comments can be posted.

ACLU Obtains Cell Phone Tracking Training Materials

Comments Filter:
  • Can any of the programs available to jailbroken phones prevent scans?
    • Re: (Score:3, Funny)

      by GmExtremacy (2579091)

      What are you hiding?

    • by Anonymous Coward on Sunday April 01, 2012 @03:05PM (#39542881)

      No. The reason is they dump the contents of the phone. They don't actually utilise the phone itself. They just plug in a USB cable and can access the disk. Sort of like putting a device into mass storage mode where instead of the device being able to sync it can be used as an external hard drive.

      They can actually do forensics of live devices (laptops, etc) under at least some circumstances through USB 3.0 (i believe) and firewire ports.By live I mean they access the ram of the device while it is running. So if for instance a device is connected to an Internet host somewhere they can insert commands and do other stuff to it. Or figure out what is being displayed on screen without having to break your password. They could for instance grab a security key if your device is encrypted.

    • by girlintraining (1395911) on Sunday April 01, 2012 @03:23PM (#39543025)

      Can any of the programs available to jailbroken phones prevent scans?

      You're using an iPhone and you have illusions about your privacy? Dude, have you read the EULA [apple.com]? Law enforcement has more restrictions on what it can and cannot do with your data than the manufacturer does, which is basically no restrictions. Worry less about what the ACLU found out and more about the people who made your phone.

      "...you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your iOS Device, computer, system and application software, and peripherals, that is gathered periodically..."

      "...To provide and improve these services, where available, Apple and its partners and licensees may transmit, collect, maintain, process and use your location data, including the real-time geographic location of your iOS Device, road travel speed information, and location search queries."

      "These unique identifiers may include your email address(es), the Apple ID information you provide, a hardware identifier for your iOS Device, and your iPhoneâ(TM)s telephone number. By using the iOS Software, you agree that Apple may transmit, collect, maintain, process and use these identifiers..."

      By the way, that's all on page 1. There are 96 pages after that.

      • by DigiShaman (671371) on Sunday April 01, 2012 @04:14PM (#39543343) Homepage

        "...you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your iOS Device, computer, system and application software, and peripherals, that is gathered periodically..."

        I just love how they sneak that in there. Those four word sandwiched in between makes all others moot. Instead, they should be honest and phrase it as

        "You're data is ours and everyone else's we so choose. Bitch! Deal with it!"

        That would be at least more respectable.

      • South Park [southparkstudios.com] nails it, as usual.
      • Still better than using Android. Because Apple is making money off of selling the device not ads or services, they are actually de-incentivized from abusing that info because it could drive away their customers and as a consequence they've got a pretty good track record on not giving away your info. Google's whole raison d'être on the other hand is actually gathering that info, correlating it with info from all of their other services [washingtonpost.com] and then using it to target you. Plus they've been known to make a r [eff.org]

        • by WolF-g (539252)
          This reason right here is why despite Apple's failings I am an iOS user over Android.
    • by mindcandy (1252124) on Sunday April 01, 2012 @09:24PM (#39545345)
      In short .. No.

      Here's what they can gather at a network level :
      1. Which antenna of what tower your phone last registered on (and possibly also RSSI).
      2. Incoming and outgoing numbers dialed, call duration, and technical data during call (which towers, etc.).
      3. Data ingoing/outgoing (including SMS) to the extent that they log it (ever notice the proxy under the APN settings?).

      Once they have the device itself ..
      1. Anything stored on the device (including SMS not stored on the SIM).
      2. GPS history (and other debug information the device might have collected).
      3. Contacts and other information in the SIM (provided you didn't lock the SIM, unless they get the PUK, which is mentioned in tfPDF).

      The network-level stuff is controlled (in your phone) by the baseband chip and associated firmware .. it would *theoretically* be possible to write custom firmware that identified attempts at triangulation (frequent BTS handoffs) and denied them or deliberately registering with a tower with a less-than-ideal RSSI (ie: farther away), but PCS technology is fragile enough with everyone following the rules as-is .. if enough people start breaking the standards *on purpose* I suspect it will be detected and blocked by the carriers proper quick.

      You're carrying an active transceiver that operates independent of your input (eg: there is no 'key' like in HF). Finding it will be easy. Tracking it will be easy.

      Moxy Marlinspike (et.al.) have done some work on the upper layers with respect to anonymizing and/or encrypting the content of the communication, and there are several projects to help you secure the container (the phone itself), but realistically .. if you don't want to be tracked, don't carry a radio beacon in your pocket.
      • I was thinking less of the tracking, and more of the flashing of a copy of the phone, but thank you for the thoughtful reply
        • Well .. the simple answer to that one would be to open up the phone and clip the data pins to the iPort on the bottom.
          The police buy off-the-shelf gear and go to expensive training courses to learn how to plug it in and press the 'go' button .. electrical engineers they ARE NOT.

          That said, if you are sufficiently interesting and your phone ends up in the hands of the FBI/NSA/etc with someone that has the experience to do SMD rework and physically pull the chips off the board you're likely being held incomm
  • Redactions (Score:5, Interesting)

    by Anonymous Coward on Sunday April 01, 2012 @02:55PM (#39542813)

    If you look at all of the redactions from the invoices from cell companies (at the end), you'll notice that a few times names and emails are NOT redacted. Someone screwed up.

    • by girlintraining (1395911) on Sunday April 01, 2012 @03:29PM (#39543059)

      redactions from the invoices from cell companies (at the end), you'll notice that a few times names and emails are NOT redacted.

      Someone now has the name and e-mail address of a few of the secretaries that process the paperwork for [ 3 letter government agency]. We'll have to raise the terror alert to Muave: 'Increased Risk of Angry Letters Being Sent to Actual People Instead of Boiler Room.'

      • by Anonymous Coward

        No, they redacted the names and emails of the officers involved. On a couple, they forgot to redact the email and/or name of the requesting person. Most of the invoices due contain the names from the cell company employees, it's the names of the people requesting the information I was referring to. :P

  • by decora (1710862) on Sunday April 01, 2012 @03:08PM (#39542905) Journal

    one of the three companies, Berico Technologies, had on it's menu of expertise the area of 'cellular exploitation'.

    took a while to figure that out, but essentially you have 1. cellular communications, and 2. exploitation, the former being obvious, the latter being extracting 'actionable intelligence' from the logs, records, billings, etc of the former.

    their management learned how to do this in the GWOT - some of them were part of special operations in Afghanistan.

    every tool we use against the terrorists will be turned around and used on citizens eventually.

  • While flipping through the powerpoint slides, I noticed the spin they put on Kyllo, namely that they quoted the dissenting opinion.

Recent investments will yield a slight profit.

Working...