Cellebrite data extraction widget used by police

Discussion in 'iPhone' started by FloatingBones, Apr 20, 2011.

  1. FloatingBones macrumors 65816

    FloatingBones

    Joined:
    Jul 19, 2006
    #1
    The company Cellebrite has just announced new software for their Mobile Forensics data-extraction widget.

    This page shows that their data-extraction device is compatible with iPhones, iPads, and the iPod Touch. These two articles (1 2) talk about Michigan's use of the devices with traffic stops. From the first article:

    One wonders if the law enforcement officers would lend the Cellebrite device and their personal cell phones to the people they pull. After all, the law enforcement officers have nothing to hide, either.
     
  2. scaredpoet macrumors 604

    scaredpoet

    Joined:
    Apr 6, 2007
    #2
    One unanswered question is whether the "Wipe" function on an iOS device is thorough enough to prevent a Cellebrite UFED from retrieving any data. They do say that deleted call history and SMS CAN be retrieved, but that's well known: "deleting" isn't really deleting, and "wiping" is supposed to be a different, thorough removal of data from an iPhone.

    And before anyone makes the "you shouldn't worry about this if you've got nothing to hide" argument, bear in mind that there are already known cases where police officers have decided to have a little fun with people's cell phones at their expense, in ways that had no bearing at all on their work:

    http://www.stamfordadvocate.com/new...ce-officer-accused-of-sexting-with-846785.php


    http://www.nbcwashington.com/news/local/Sexy-Cell-Phone-Pics-Get-Culpeper-Cops-in-Trouble.html
     
  3. logandzwon macrumors 6502a

    Joined:
    Jan 9, 2007
    #3
    "wipe" only deleted a few things on the phone. Mainly, the AES keys, (rendering anything encrypted gone for good.) SMS are not encrypted. Pictures are not encrypted. I think by default the only thing encripted is email.
     
  4. elan123 macrumors 6502

    Joined:
    Jan 26, 2011
    #4
    kinda scary...
     
  5. old-wiz macrumors G3

    Joined:
    Mar 26, 2008
    Location:
    West Suburban Boston Ma
    #5
    There's an interesting question as to whether or not this is constitutional for law enforcement to demand your cell phone info without a warrant or evidence of wrongdoing. "cooperate if you have nothing to hide" is still not an excuse in my opinion. Obviously you have to cooperate with a formal investigation, but "nothing to hide" is not a valid reason.
     
  6. iApples macrumors 65816

    iApples

    Joined:
    Mar 24, 2011
    #6
    Yup, but emails can also be traced through the hosts server. So if you some how manage to obtain the email (Perhaps through SMS) then you'll be able to retrieve all emails also.
     
  7. tommyo3000 macrumors newbie

    Joined:
    Apr 20, 2011
    #7
    Cellebrite, iPhones, Passcodes, and SIM PINs

    OK, after researching Ufed's website I came up with this info:

    If the iphone has a passcode lock on it, Cellebrite CANNOT read the information off of the phone. The police would need to access the computer on which the iphone is synched to get some files to put on a USB drive and into their Cellebrite to unlock the iphone,

    Futhermore, the Cellebrite has a Sim card reader. If you go into your iphone phone options, you can turn on the SIM PIN, which is a 4 digit pin code that must be used when trying to access the SIM card. By defualt on the iphone 4, the code is 1111. If you change it, the cops won't be able to read the sim card.

    F the police coming straight from the underground ;)
     

    Attached Files:

  8. sjinsjca macrumors 68000

    sjinsjca

    Joined:
    Oct 30, 2008
    #8
    Per http://www.cellebrite.com/images/stories/support files/Apple_iPhone_Passcode_Bypass_instructions.pdf the investigator must have physical possession of both the iPhone and the Mac or PC to which the phone has been synced, with an unencrypted backup. He must have user or admin access to the computer as well.

    I suspect that if all the above is true, your iPhone is the least of your worries.

    In any case, using a passcode lock and encrypting your iTunes backup (which requires a simple checkmark on iTunes' initial page for your iDevice) is sufficient to block this snooping. Downloading the entirety of the iDevice's internal storage is not yet possible but is promised as an upcoming feature, per http://www.cellebrite.com/images/stories/release-notes/release note-march-2-ROW-s.pdf
     
  9. kidaquarius macrumors member

    kidaquarius

    Joined:
    Mar 9, 2011
    Location:
    Detroit
    #9
    Flex your Rights.

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


    [delivered by an iPhone]
     

Share This Page