Police In Oklahoma Have Cracked Hundreds of People's Cell Phones (vice.com) 73
An anonymous reader shares an excerpt from a report via Motherboard: Mobile phone forensic extraction devices have been a law enforcement tool for years now, and the number of agencies using them is only rising. As part of an ongoing investigation, we have finally been able to turn up some usage logs of this equipment, from Tulsa Police Department, and Tucson Police Department. While the logs do not list the cause of the crime or any other notes about why the phone was being searched, it does list the make of the phone, the date, and the type of extraction. First, let's go over what extraction devices are being used here. Tucson PD opted for the brand that is arguably the worldwide leader in mobile device forensics, the Israeli company Cellebrite. Tulsa Police Department however opted for a few different models -- they purchased two different password breakers from Teel Technologies in 2015, and in March 2016 gave about $1,500 to Susteen for their SecureView extraction device (SecureView was the product Susteen created when the FBI requested they create a more advanced extraction device for them). It does its work instantly, and has an incredible reach into a phone's data. They renewed this contract in 2017. In August 2016 they also purchased the Detective extraction device from Oxygen Forensics. Oxygen is much less common than Cellebrite, from what we have found. The kicker really is how often these are being used -- it is simply really hard to believe that out of the 783 times Tulsa Police used their extraction devices, all were for crimes in which it was necessary to look at all of the phone's data. Even for the 316 times Tucson PD used theirs in the last year, it is still a real stretch to think that some low-level non-violent offenders weren't on the receiving end. There are some days where the devices were used multiple times -- Tulsa used theirs eight times on February 28th of this year, eight again on April 3rd, and a whopping 14 times on May 10th 2016. That is a whole lot of data that Tulsa was able to tap into, and we aren't even able to understand the why.
I agree, this is unnecessary (Score:1)
I agree, this is unnecessary. There are better ways to protect us from terror than cracking people's phones after they commit violent acts. Let's implement a real Muslim ban, unlike the watered down stuff to try to get through the courts. Once we do that, it won't be necessary to crack phones. And the recent terror attacks in the UK prove that a Muslim ban is, indeed, necessary.
Re:I agree, this is unnecessary (Score:4, Funny)
Yes, a Muslim ban would be a good start - but it should be quickly followed by a ban on Christians and Jews entering the country. In fact, the only people we should be allowing into the country are Atheists. Lesbian Atheists. And not the butch ones, just the "lipstick" ones. It's the only way to be sure.
Re: (Score:3)
Re: (Score:3)
I doubt if more than a paltry few (if any) of these extractions were connected in any way with terrorism-related cases. Much more likely your garden-variety domestic felonies such as homicide and drug trafficking.
Re:I agree, this is unnecessary (Score:5, Insightful)
or pretty girls phone.
Re: (Score:2)
Re: (Score:1)
Maybe we should also be protected from lightning strikes and slipping in the tub.
And papercuts! Don't forget the notorious papercuts!
Re: (Score:2)
Maybe we should also be protected from lightning strikes and slipping in the tub.
And papercuts! Don't forget the notorious papercuts!
And don't forget the TSA's mandate; protecting us from accidentally sitting down on a toilet that had its lid left up.
Re: (Score:2)
"Let's implement a real Muslim ban, unlike the watered down stuff to try to get through the courts."
Religious bans are illegal
Re: (Score:2)
Re: I agree, this is unnecessary (Score:2)
I am not sure, but it looks like the OP was referring to something bigger than a travel ban. It looked like they wanted to just ban them, perhaps as some sort of solution meant to be final. That was my reading, anyway.
Re: (Score:2)
Or that the London Bridge attackers came from Morocco, Pakistan, and Italy, none of which Trump proposes to ban.
Actual link to TFA (Score:2)
The motherboard report: https://motherboard.vice.com/e... [vice.com]
(2nd last link in an article with 11 links. Really?!)
Re: (Score:3)
It is eye-opening to see the nice tools the police have to search through phones, though. A pretty UI, it's more than just grep.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
They state: "One "preview sheet" we received from Tucson had a column for whether they received a warrant to crack into the phone", that hardly supports the claim of "most cases". That "preview sheet" lists 14 uses.
Tucson used it 316 times. I would consider 302 out of 316 "most cases".
If they're doing it without a warrant, then maybe we have something to worry about.
Didn't you say that it was with a warrant or consent? If they were given consent, that could explain the 14 part.
Re: (Score:2)
Re: (Score:2)
Anyone else care about tech news? (Score:2, Offtopic)
Re: (Score:2)
Slashdot is operated as a clickbait site, by a team that purchased Slashdot to support it with clickbait articles. Probably they were the high bidders when dice.com put it up for sale.
It isn't Rob Malda's hobby anymore.
(Phone forensics expert AMA) (Score:4, Interesting)
Not surprising. Police still need a warrant.
Androids have become a lot more secure. IPhones are crackable but it takes a special rig, https://arxiv.org/abs/1609.043... [arxiv.org] .
Re: (Score:2)
Re: (Score:2)
Interesting. A quick scan of the 39 pages of the Tulsa report shows just 2 iPhones, both iPhone 5c. The rest are all mostly flavors of Android.
Look again, more carefully. There were a handful of 6 and 6s models as well.
Re: (Score:3)
My son has cracked more than a couple iphones... he won't take them out of his pocket before he get's on the skateboard. I just quit buying them for him.
Re: (Score:2)
Re: (Score:2)
No it's not (Score:2)
- it is simply really hard to believe that out of the 783 times Tulsa Police used their extraction devices, all were for crimes in which it was necessary to look at all of the phone's data.
No it's not. It's very simple. It's 2017 how do you think drug deals work? Smoke signals?
Yes it is. (Score:2)
No it's not. It's very simple. It's 2017 how do you think drug deals work? Smoke signals?
No.
SMS.
Which basically have the same level of privacy/intrusion prevention as post-cards. Or smoke signals.
There's a reason why your low-ranking street-trotting drug dealer is exactly that.
If he had a little bit more brain and could understand all the intricacies of cryptography and data security,
he would have enough brain to actually land a better paying job.
Lots of the information critical to investigate small fry drug dealer can easily be eavesdropped without even needed access to the culprit's phone.
Of
Re: (Score:2)
Lots of the information critical to investigate small fry drug dealer can easily be eavesdropped without even needed access to the culprit's phone.
That's far more complex. Much easier to just catch him with drugs, unlock his phone, read his texts.
Re: (Score:2)
That's exactly my point. How do you think they get the contents of those SMS?
Lots of the information critical to investigate small fry drug dealer can easily be eavesdropped without even needed access to the culprit's phone.
That's far more complex. Much easier to just catch him with drugs, unlock his phone, read his texts.
In fact to intercept those cleartext SMS's still requires a wiretap auth IIRC, while once part of a search pursuant to arrest for cause the phone search is relatively simple to justify.
Re: (Score:2)
See a Judge and then the phone company - it happens a lot every day.
Re: (Score:2)
There was p
Re: (Score:2)
I suspect one of the problems drug dealers face they guys actually selling to the public anyway is the same every other business has: customers.
The same reason your still does a lot of business over e-mail, plain old telephone, easily tampered paper letters, that they probably should not is simple. Its because a significant number of the clients insist on doing business that way, can't be arsed to learn anything more secure, and practically start shouting 'lalalalala' if you try to educate them as to why t
Warrants? (Score:2)
Re: (Score:2)
Re: (Score:2)
We don't like your kind at /.
GTFOut FA Reader.
This is a good thing actually (Score:2)
Think of it this way, if they are cracking phones than chances are they are doing so via warrants.
The privacy issue isn't cops using warrants, the issue is cops performing surveillance without warrants via IMSI catchers (AKA stingrays). One of these involves a singular target with a warrant, the other inevitably gathers data on people where the is no warrant.
Sounds like they are doing the right thing.
Supporting Homelessness in SF... (Score:2)
Supporting each of approximately 8,000 homeless persons in San Francisco costs about $30,000 or $250 million total; presumably other cities' costs are similar. (Source: homeless censuses and San Francisco budgetary estimates, not including emergency medical services.)
Either government human services are not cheap -- or Harvard is.
Re: (Score:2)
Sorry -- mistakenly posted to wrong article...:(
Cost per case (Score:2)
It was like Enigma, quick, easy and connected.
The face database is also interesting https://www.muckrock.com/news/... [muckrock.com]
".... larger database of between one million, twenty million, or potentially a billion faces to instantly identify in the field"
I live in Tulsa (Score:2)
Police have cracked hundreds of cell phones (Score:1)
What the hell is so impressive about that? I cracked my own phone last week. It was extremely easy to do and I even did it by mistake.
I dropped it on the sidewalk and the screen cracked in about three places.
Sure! (Score:2)
It's all those old discarded iphones 3 and 3+ lying in the junk boxes of stoned teenagers that they use as an excuse for calling them 'dealers'.
There's nothing to "crack" (Score:2)
... on my $20 BLU Tank-II T193 cheapie.