Drive-By Shooting Suspect Remotely Wipes iPhone X, Catches Extra Charges (appleinsider.com) 218
schwit1 shares a report from Apple Insider: A woman from Schenectady, N.Y. accused of being the driver in a shooting used Apple's remote wipe feature to destroy evidence on her iPhone X that might have been related to the event. The iPhone was seized as evidence in the case, but police say that shortly after she triggered the remote wipe, an option available via Find My iPhone in iCloud. Normally the tool is intended for people with lost or stolen devices. The suspected driver, Juelle Grant, was arrested on November 2nd and charged with two counts of tampering with physical evidence, and one count of hindering prosecution. As Apple Insider notes, only one of the tampering counts is connected to the iPhone.
No Faraday cage? (Score:5, Insightful)
I'm surprised (I probably shouldn't be) that the police do not have some system in place so that these phones are cut off from communicating with anything once they have them. I'd have to think that a tampering charge is less than a murder charge.
--
Success is walking from failure to failure with no loss of enthusiasm. -- Winston Churchill
Re: (Score:3)
You don't have to prove anything in court (Score:2, Insightful)
I'd also have to think that you can't prove in court who did it
Not really. IRL something like 98% of cases are plea-bargained, so generally you don't have to prove a damn thing.
Re:No Faraday cage? (Score:5, Insightful)
It's beyond reasonable doubt, not beyond ANY doubt.
For example
Someone logs into her iCloud account, from an IP address that is registered to her physical address and then wipes the phone immediately after an event that gives her motive to wipe the phone.
You then have means, motive and opportunity with little to no reason to believe anything else was likely to occur. I don't see how you could argue that there was a reasonable doubt.
Re: (Score:2)
It's beyond reasonable doubt, not beyond ANY doubt.
Indeed, and "reasonable doubt" means roughly a 90% probability.
When DNA evidence first became available, The Innocence Project went back and evaluated old archived evidence, and were able to show that about 10% of convicted defendants couldn't possibly have committed the crimes. This is a floor on the number of wrongful convictions, since there are other people that are innocent but without enough evidence to exonerate them.
So our society is clearly willing to send plenty of innocent people to prison rathe
Re: (Score:2)
Is that true, Bill? I had no idea that reasonable doubt had been quantified to that extent. I don't doubt you, I'm just surprised. I learned something today.
Re: No Faraday cage? (Score:2)
Well, it's an empirical estimation of what reasonable doubt tends to amount to, at least. My guess is people don't convict very often without feeling more certain than that in a Bayesian sense, but you do have to account for confirmation bias.
Re: (Score:2)
Not sure I would extend your numbers to a % on reasonable doubt. To the outcome of the innocence project shows more the error rate for conviction. There would also be the error rate on not convicting, but that % is essentially unknowable.
Re: (Score:3)
That's actually my point: accuracy and confidence are two different things. From my experience serving on juries, voting to convict probably implies more than a 90% level of belief. As people near a conclusion they switch from reasoning to rationalizing, which means that last bit of certainty is spurious.
Re: (Score:2)
Sorry didn't pay enough attention to see you were not Bill.....
I need more sleep
Re: (Score:2)
Odds are we let far more guilty people go than are convicted wrongly.
Lady Justice is depicted with analog scales. Turns out that is a very appropriate description of how it works.
Re: (Score:2)
I think the point that sycodon was getting at is that we have an imperfect system, we are fallible as humans, and not every iota of evidence in every case is back and white. Shit happens, some innocents will be wrongly imprisoned.
Do we want it to happen? No! Do we do what we can to try and prevent it? Yes! Do we acknowledge that it will, on occasion, happen anyway? Well, yes.
No justification happening here.
Re: (Score:2)
So what if there is a daily scheduled remote wipe of my phone that unless I cancel gets executed. Have I then tampered with evidence given I did nothing after the phone was seized as evidence?
Re: (Score:2)
Fundamentally, your question is "Can the absence of action be a crime?". And the answer is yes.
Re: (Score:2)
Now its time to sell every city and town in the USA on a collection of Faraday tablet/phone bags.
With hours of course work in how to look after the phone and keep it safe.
Sell an up upgrade to the police evidence lab/room too. Keep any evidence away from all networks until the pushed police software can do its magic.
Re:No Faraday cage? (Score:5, Informative)
I work in a team that, among other things, does forensic acquisitions of electronic devices on a regular basis, including with the police.
This type of scenario is what we scare the new recruits with when we have them in day-1 training. So much effort goes into acquiring devices (warrants, court orders, co-ordination, deployment, police presence, etc) and there's so much riding on the (potential) evidence on them that it would be devastating to go through all of that effort only to be foiled by a remote wipe.
It is best practice to turn the device on airplane mode as soon as the device comes into your possession, and/or put it in a faraday bag. There are special ones made specifically for mobile phones that have windows in them so you can see the device's screen. They cost $200. The acquisition and chain of custody forms you have to fill in when acquiring a device in the field usually even have a box you have to tick to indicate that you have put it in flight mode.
tldr; there are robust best practises in place, they weren't followed in this case.
Re: (Score:2)
Don't people use the emergency shut down features of their phones? Hold the power button for a few seconds, or press it 5+ times on some models.
I guess you can buy equipment to bypass the lock for some devices, but not all.
Re: No Faraday cage? (Score:4, Informative)
By using the airplane mode button. The one which shows up on the lock screen.
Re: (Score:2)
I must have turned that off on my iPhone, along when I turned off all notifcations on the lock screen so that messages, etc don't show up there where anyone could read them.
I'd have to think other people might think of that too?
Re: (Score:2)
Re: (Score:3)
Don't forget not all our laws are just. Also, don't forget police are also part of the group that solves problems by pointing guns at them.
Have you ever called the police and subsequently been arrested yourself because of some tired cop's poor judgment or personal biases? That happens, too.
My point is: I caution you against assuming all arrested people are violent thugs. Some of them are, most aren't.
Re: No Faraday cage? (Score:3)
The S7 is nowhere near stock android. It's heavily customized by Samsung.
Yes, some manufacturers to remove that functionality from the lock screen.
Re: (Score:2)
You can buy Faraday cage bags with built in charging (so that the phone doesn't power down and disable PIN/finger/face unlock, although these days they have a time-out as well) for this purpose. Maybe they couldn't afford them, maybe they just screwed up.
Re: No Faraday cage? (Score:4, Funny)
They're law enforcement officers. They don't have time to play the sims.
Re: (Score:2)
I'm pretty sure that such remote wipe capability is possible over WiFi. If someone subscribes to some of the more popular WiFi services this gives a very high probability that the phone can still be wiped, and higher yet if someone has subscribed to more than one.
Take myself as an example. As a university student I was on the eduroam network, which is international and often available beyond what people might recognize as a university campus since old universities tend to blend into the city they are in o
Re: No Faraday cage? (Score:5, Insightful)
Usually, turning a phone off is easy enough. It might need a password to do so - in which case you force it off by removing the battery. Oops - can't do that with some of the newer phones.
A non-removable battery is a feature, not a bug. If you want a phone that can be wiped remotely to secure your data from being taken without your permission then you want the phone to stay powered so it can receive the wipe command. Alternately the storage could be volatile and removing the battery would wipe as well.
I'm not terribly concerned if the police are inconvenienced in scraping data off our pocket computers. My electronic devices are for my convenience, not the government's.
Re: (Score:2, Interesting)
or old microwaves
Doesn't work. Put phone into microwave. Shut door. DON'T TURN MICROWAVE ON. Call phone. It rings.
Not supporting shootings, but... (Score:2)
Re: (Score:3, Insightful)
There is a big difference between tampering with evidence and being required to assist in your own conviction...
There is a thing called a Constitution and the right against self incrimination, maybe you have heard of it?
Re: (Score:2)
Re: (Score:3)
It was an iPhone X, so the police would hold it up to her face to unlock it. This has happened before [slashdot.org].
Re: (Score:2)
I've said it before.
She should have used her junk as reference picture.
Re: (Score:2)
Re: (Score:2, Funny)
One pink, one brown for her.
'Old one eye' should work, unless apple discriminates against the one eyed..
Re:Not supporting shootings, but... (Score:5, Informative)
You don't have to provide an encryption key - you don't have to help them. But you cannot hinder them.
Similarly, lawyers and big corporations shred documents regularly, because that's legal. But once they are subpoenaed, it's illegal
Re: (Score:2)
You don't have to provide an encryption key - you don't have to help them. l
Not entirely true.
This lady explains better than me: https://www.youtube.com/watch?... [youtube.com]
Re: (Score:3)
She may "explain better", but I'm not going to watch a video to reply to a slashdot comment. Care to summarize? (Or is your point that you can be forced to help with biometric locks? Yeah, that's why you should have a PIN if you really care.) Also, offer only good in the USA..
Product idea? (Score:5, Interesting)
That's heavy handed but a faraday bag would work (Score:2)
I get where you are going with the one-way cage but in reality I'd be more worried about people remote-wiping seized devices that police tampering, so a more practical thing for every police car to carry would be faraday bags with wire mesh embedded in them - I used to see them for sale on Amazon, but the last I looked I couldn't find them. Seems like it could be made cheap enough for every police car to have a few on hand in case they needed to hold a phone for evidence and prevent any remote tampering.
Yo
Was able to find Faraday Bag after all (Score:2)
It seems like at least someone has a faraday bag for phones now [amazon.com]
I've thought about getting one myself for a while now, in the case of a Carrington event [gaia.com] or EMP, just to keep spare phones in I would have around anyway.
I have no idea if that one is any good, just the first one I found that looked promising.
Re: (Score:2)
I've thought about getting one myself for a while now, in the case of a Carrington event [gaia.com] or EMP, just to keep spare phones in I would have around anyway.
"Tell me, Mr. Anderson, what good is a cellphone when you are unable to contact a tower?"
Re: (Score:2)
Re: (Score:2)
Indeed. If one didn't want to bury books in a septic tank [google.com] - an old phone loaded up with PDFs and EPUBs with a small solar panel and charger setup stashed away in a properly shielded and sealed (water tight w/ desiccant in there!) box would be a good substitute
Re: (Score:2)
saved porn would probably be the major winner in this. lets be honest, its the intertnet..
Re: (Score:2)
Seems like a great post-apocalyptic story to be told where an empire is based entirely on one guy managing to save a hard drive of porn and a computer to access it, from a global EMP event.
Re: (Score:2)
Should pitch it to creators of south park and make randy marsh the savior. It would play well with the no internet episode!
Re: (Score:2)
I don't have a sim card for my cell phone. I use it for a lot of things[*] - pretty much anything except phone calls and SMS works just fine. Some use cases requires a WiFi connection, but certainly no connection to a cell tower.
Given that actual phone calls is the least use most put a smartphone to, I am sure that many can do just fine without it.
[*]: Books, music, audiobooks, GPS, exercise monitor/logger, calculator, metronome, 2FA token server... When near WiFi also checking e-mail, checking news, in
Re: (Score:2)
Keep your stuff unplugged, it will survive. However, the cell network will be spectacularly set on fire in the case of another Carrington, so they wont work anyway.
Good to know, thanks, but I had thought maybe some forward thinking carriers were hardening some towers here and there against EM spikes just for emergency purposes if nothing else?
I did figure it pretty unlikely cell service would work after an event like that, but I could at least use any offline mapping apps or the like to get somewhere else.
Re: (Score:2)
That removes the ability of the police officer to return the phone at the time. For instance, if they realize that there is no need to arrest the person.
Re: (Score:2)
How about a phone that auto-wipes if I don't re-authorize with a strong password every 24 hours? And that wipes if it detects known data extraction tools, or for that matter any USB data connection unless I pre-authorize it?
Re: (Score:2)
You don't need anything so complicated. Just Google "faraday bag forensics". You can buy single use, single seal bags that work the same way as disposable bank deposit bags; once it is sealed it can't be opened without evidence of tampering.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
It could be triggered by being cut off for more than 10 minutes, it could shut itself down to make the only venue for attack the drive encryption (rather than memory, or screenlock attacks). It could require a password entered within 30 minutes to prevent wiping.
There are a lot of ways to approach this problem that balance how much data to destroy or inconvenience to impose along with how sensitive it could be.
For some people, false positives are strongly preferred to false negatives.
Like Schoedinger's cat, kinda (Score:2)
Uh, how can they charge her with obstructing anything when they a) don't know what was on the phone and b) had any assurance they could even access they phone (especially as TFA notes that they were so clueless that they didn't toss it in a Faraday bag). There may or may not have been evidence.
This all part of the game, and this round went to the bad guys.
Re:Like Schoedinger's cat, kinda (Score:5, Insightful)
I think it's one of those "we're gonna charge you, and you can fight it; but you'll get the maximum penalty -- OR you can fess up and we'll give you 5 years and probation" type shake-downs.
And definitely, this round will definitely go to the bad guys (overreaching DA's and police)
Re: (Score:2)
Re: (Score:2)
Fair point; but at the risk of setting precedence for questionable behavior by police and DA's going forward?
Re: (Score:2)
Re: (Score:2)
The joys of a surveillance society; simply being near a crime is enough to garner suspicion.
God help us.
Re: (Score:2)
I'm guessing that since they apparently didn't arrest her (no web access in jail), they don't have much to show she was involved. Perhaps they hoped the phone would provide what they needed, but that's not going to happen now.
Re: (Score:2)
How do those boots taste?
Re: (Score:2)
Flip side of the coin (Score:2)
Basically the people who write the laws aren't _completely_ braindead. If the burden of proof were the other way around all potential suspects would alway
Re:Like Schoedinger's cat, kinda (Score:5, Informative)
So? If you're served with a subpoena wiping the records instead is a crime, they don't have to prove the records would have been incriminating. I think it's obvious the same should apply to remotely wiping a seized device. You're free to set up any security policy you like in advance, even a dead man's switch if you want but taking active hostile action against a police investigation is not accepted in any legal system. Now I'm sure the US legal system has a lot of other issues, but I really fail to see how this makes them the bad guy. Not even a little.
Re: (Score:2)
Are you? is setting your phone to self destruct ala dead mans switches any different if the ends are the exact same. What about if you set up a canary type http address, that when unreachable for longer than an hour, would self destruct the phone? Do you really think they need much proof? or do they just assu
Re: (Score:2)
You're free to set up any security policy you like in advance, even a dead man's switch if you want but taking active hostile action against a police investigation is not accepted in any legal system. Now I'm sure the US legal system has a lot of other issues, but I really fail to see how this makes them the bad guy. Not even a little.
Your logic is truly baffling if you think we're "free" to do as we wish here.
In the real word a "dead mans switch" is called Corporate MDM Security Policy which dictates wiping the phone after XX number of failed password attempts. I can see police accidentally or purposely attempting to get into a suspects phone which might trigger such a policy that they would be unaware of. I can also see police failing to "hack" a device resulting in a device wipe, ALL of which would be immediately turned into a charg
Re: (Score:2)
Pretty easy, actually.
The data on the phone was evidence of something. It could have exonerated her or it could have convicted her. But we'll never know because she destroyed the data on the phone.
That's obstructing.
what if your wipe key is lawyer vs attorney (Score:2)
what if your wipe key is lawyer vs attorney and when asking you to open your phone some says I want my attorney and then the phone wipes it self?
Just write a security app and be done with it (Score:3)
Of course you'll have to call it a " security " or " privacy protection " app before Apple would even consider such a thing on the App Store.
Make sure to think of a catchy name for it. . . .
Conditions:
1) User has not logged into phone in $user_defined number of hours ( user is detained )
2) No signal ( cellular or wifi ) present ( phone is in a signal denied environment )
3) User has the paranoid feature enabled
#2 is fun because they have to choose to either leave the phone connected to a network ( risking a remote wipe ) or denying the connection and running the risk of the phone wiping itself. Decisions, decisions . . . . . .
User selectable payloads:
a) Phone wipes itself
b) Phone rekeys with a random password ( user plausible deniability - I really don't know the password )
c) Phone overwrites data with random gibberish or lyrics from your favorite anti-police music ( NWA can help you out here )
If you're the forgetful criminal type, you can always add a setting to flash a warning, beep, vibrate, whatever telling you bad things are about to happen to your phone if you don't log into it soon.
Done.
Or you could, you know, leave your damn phone at home if you plan on doing something stupid. . . . . .
( # 2 answer right behind don't do anything stupid to begin with )
*afterthought*
This whole " they-might-wipe-the-phone-remotely-so-put-it-in-a-shielded-bag-or-faraday cage " thing wouldn't be an issue if there was a user removable battery in these things.
Just sayin . . . .
Re: (Score:2)
wouldn't be an issue if there was a user removable battery in these things
Don't these things have a power button to turn them off?
Re: (Score:2)
Your app wouldn't have worked in this case because a network was available (it had to be in order for the remote wipe to work).
use case (Score:2)
This, actually, is exactly what remote wipe was invented for: To prevent your data falling into the wrong hands, with you deciding who "wrong hands" are or better: Not having to decide but simply being able to wipe whenever you want.
The police should really be able to anticipate this. What you can't take the SIM card out? While they will probably successfully sue for destruction of evidence (because it is), let's not for one second pretend that this is not exactly the use case of the feature.
Re: (Score:2)
What's missing is plausible deniability. The next version should have a self destruct mechanism that sets the battery on fire.
Ok, it would only work as plausible with Samsung devices, but hey, it's the staple of the industry to copy features from the competitor.
I like a suicide option (Score:2)
When going into an environment where it might be helpful not to have information on one's phone fall into the wrong hands, a phone that would lobotomize itself if certain conditions weren't met would be very nice to have.
If there isn't already an app for that, there should be.
Re: (Score:2)
Use the GPS to determine the distance to the nearest police station and if it hits zero then wipe the phone.
Working as designed (Score:2)
When someone who you do not want to have your phone information is in possession of your phone, you can wipe it. Sounds like pretty much what the idea behind the feature was.
This should fall on the police (Score:2)
Re: (Score:2, Informative)
Re:Faraday cage (Score:5, Informative)
That is incorrect. Faraday cages do not require a ground and can be very portable.
A simple roll of aluminum foil would work. Just tear off a large sheet, wrap it around the phone and crimp the edges with your fingers. Done!
The aluminum foil would be quite effective at blocking the RF signals going to and from the phone, and it would also detune the phone's internal antennas, increasing the effectiveness even more.
Re:Faraday cage (Score:5, Funny)
Parent is correct. I can confirm 5G does not penetrate my aluminum hat.
Comment removed (Score:5, Funny)
Re: Faraday cage (Score:3)
If your small faraday cage is perfect and infinitely conductive, it will work perfectly. If is reasonably well constructed and fairly conductive, it will work well enough.
I suspect real world behavior for such shields is more complex than the simple high school physics model, and that the device inside is less than perfectly shielded. The shield in a shielded cable can be thought of as an imperfect Faraday cage, and depending on application it may not require grounding or it may need to be grounded at one o
Re: (Score:2)
Re: (Score:3)
Faraday cages require a ground, i.e. they are not portable. But there should be some way of blocking radio reception. In our Faraday cage at work, I was still able to communicate with WiFi routers outside the cage; they are not perfect.
It depends on what you are doing. If your goal is to block a radio signal you don't need to ground a faraday cage. If your goal is to protect people or equipment including from the faraday cage itself then it should be grounded to avoid a charge building up on it or currents flowing through it when you touch it.
Re: (Score:3)
Yeah, just put my phone in microwave, it didn't lose either cell or wifi signal. Signal strength went down some, but still played youtube for a couple minutes just fine.
Re: (Score:2, Funny)
Yeah, just put my phone in microwave, it didn't lose either cell or wifi signal. Signal strength went down some, but still played youtube for a couple minutes just fine.
You forgot to turn on the microwave.
Re: (Score:2)
Re: (Score:2)
well that's yet another way to destroy evidence, right?
Re: (Score:2)
Also, tin foil doesn't work. A box lined with steel wool might be a cheep way to go. A microwave oven with the door closed also would work
Speaking of microwaves, I am puzzled as to why we consider them shielded enough for human safety --haven't done any research though. There is a kindof urban legend I've heard here from the days of wifi B and G that congested home routers sometimes drop connections whenever someone's zapping food in the nearby ovens.
More personally, owning recent tech shows motive for worry whenever I walk by an active set (2 different brands thru the years) while listening to various bluetooth devices (headphones, speakers)
Re:Faraday cage (Score:5, Informative)
Speaking of microwaves, I am puzzled as to why we consider them shielded enough for human safety
Because the general public has no idea how microwave ovens work, or what microwave radiation does to humans. It's just a magic box that makes food hot, and probably doesn't kill the operator too quickly.
The size and shape of the oven is actually important. The microwaves bounce around inside, and produce standing waves [wikipedia.org]. If you disable the motor on an oven (or put an upside-down plate over the spinning hub), and heat a large chocolate bar, you'll see some places get hot quickly (at the antinodes of the standing waves), and other places stay cool (where the reflecting waves aren't reinforcing each other). The motor acts to move food around through the hot spots, to more evenly expose the food to the high points of radiation.
Now about that radiation... It's really just a really bright light at a particular "color" (like all electromagnetic waves). It's in the 2.45 GHz range, just like 802.11 WiFi and Bluetooth signals. At that frequency, it makes molecules a bit more active, especially water molecules. It's not energetic enough to move atoms or electrons, so it won't change your DNA or cause cancer, but water will absorb microwave energy very nicely. Notably, that includes all the water just under your skin, so there's almost no radiation getting through more than about 17 millimeters [wikipedia.org] of tissue.
Yes, that means that if your oven's shielding isn't particularly good [wikipedia.org], you will actually get "cooked" if you stand close to it... but because you aren't inside the oven, the microwaves aren't reinforcing each other, so there aren't any of those "hot spots" that actually cause significant heating. Essentially, you're getting hit with radiation, but usually not enough, and in too small of an area to matter (unless you do something particularly hazardous, like stand in front of a high-power microwave transmitter).
In short, it doesn't matter much if your microwave oven is a little leaky. It might disrupt WiFi and Bluetooth a bit, but it won't cause any more harm than eating a few bananas... the radiation from those will actually be inside you, passing right by your vital organs! However, you do still want your oven to leak as little radiation as possible, but for a different reason: any energy that escapes the oven isn't going to be heating your food.
So are all of them poorly shielded and leaking acceptable non-cooking radiation?
Yep.
Re: (Score:2)
Thank you for the informative reply and presenting sources, Sarten-X. It's nice to continue seeing the banana-related measurements.
They pop up in tech circles often, and I like propagating knowledge of the handy XKCD chart at https://xkcd.com/radiation/ [xkcd.com]
Re: (Score:2)
Re: (Score:2)
So are all of them poorly shielded and leaking acceptable non-cooking radiation?
Yes and no. I recall reading somewhere that the ovens are allowed to leak up to one watt of power. Compare that to the power of WiFi or Bluetooth at milliwatts and that's a lot of noise for the signal to go through. If you have a 1200 watt microwave oven and 1 watt leaks out then that's doing pretty good to keep most of that energy in, so "poorly shielded" may not apply on that grounds. Having the oven overwhelm your Bluetooth though may make this seem quite a bit of a leak.
Re: Faraday cage (Score:2)
There is a kindof urban legend I've heard here from the days of wifi B and G that congested home routers sometimes drop connections whenever someone's zapping food in the nearby ovens.
It's not an urban legend, and it's not just B and G; my original Chromecast operated on the 2.4 ghz band, and it would stop playing movies every time I went to nuke some popcorn. Kinda handy actually; didn't have to bother hitting pause. Started right up again as soon as the popcorn was done.
Re: (Score:2)
Kinda handy actually; didn't have to bother hitting pause
Thanks for the confirmation and the additional anecdote. In hindsight, a better term than "urban legend" would have been more adequate for my GP comment. I haven't experienced it myself, but can think of "known issue"... unfortunately I've been lurking lots on Hackernews [ycombinator.com] and sub-consciously avoided what there would have been a sure-fire citation-needed reply :)
I laughed at the happy note on your workflow. It reminds me of what happens when software fixes this kind of thing in an un-skippable update. Couldn'
Re: (Score:2)
On a closer look after posting, I think that was the right xkcd link all along.
Re: Time-Based Remote Wipe (Score:3)
Assuming you have a rooted Android phone you can probably accomplish that with Tasker.