No, not the mind probe!
Heaven help us if they ever invent "mind probe" technology. The MET will just snatch people off the street, take them down the station and extract any information they need against your will.
Oh, hang on.
The Metropolitan Police is deploying mobile phone forensic systems in 16 boroughs, allowing ordinary coppers to play their favourite CSI character with wrong 'uns' handsets. The kit comes from Radio Tactics, and is basically a Windows 7 PC loaded up with forensic software and a touch interface complete with step-by-step …
Why? Turning out pockets is necessary to establish the absence of weapons and maybe to provide evidence of the suspected crime (eg shoplifting). What is on the phone is not relevant for most crimes and sucking the suspect's comms as a matter of course (and presumably also sucking info out of whatever social network they may be connected to) is just plain nosiness and fishing.
I saw the BBC story friday (and emailed it to the reg), I spent most of Friday night and Saturday morning testing out some encryption. Surprisingly its not to hard to get it working on Android but its time consuming having to enter passwords using arrow keys and selection screen rather than a keyboard.
..the wankers will then bang you up for 5 years if you don't decrypt.
Met Police: Guilty unless you can prove innocence, at which time they will find something else. After all you're either a terrorist or a peado. If not, we'll find something.
Another reason to avoid London, but no doubt our coppers will get it soon as well.
In most cases its boot level encryption as that's the only way to protect call logs etc, I still don't see the point in this. Most of the records they want such as texts and call logs can be grabbed from the mobile provider, the only plausible reason is catching people stupid enough to record themselves committing a crime in which case they are hardly going to be committing the crime of the century but rather something stupid like happy slapping.
"Most of the records they want such as texts and call logs can be grabbed from the mobile provider"
With the aid of a court order / warrant, where one has to prove to a judge there's reasonable ground to suspect someone of committing a crime; sucking it from the phone removes this need.
Reasonable ground..
The problem is that a number of Councils in the UK have thought that it was "reasonable grounds" to invoke RIPA when they suspected that us council tax payers were illegally overloading bins or sneaking dogs out to Parks in the early hours to avoid the dog poo wardens. I can't imagine the average plod will be any different..
Probably because 'They' are GCHQ/Mi5/SOCA rather than CID down the local nick, who'd be going nowhere near that data even if they wanted to. And they probably wouldn't want to, as the local slag'll be using nicked PAYG blackberries, for which traffic analysis is about as useful as a chocolate fireguard, seeing as you've no idea who has what number anyway.
What I'm curious about is what happens if say a well funded criminal group (like Russian mafia sorts?) decide to make malware whose sole purpose is to go in and either taint evidence or steal the contents of the shinny new database? This of course would be loaded onto the phones of dodgy sorts that shift product for them.
That's okay matey! To be honest I like to "go for combos" in forum posts - I've slagged off the police and the apple fanbois in fell swoop here which is quite cool you gotta admit! These forums are like Farmville to me but with real people's feelings instead of virtual turnips!
I don't have a problem with them reviewing the data - after all, that data is in your possession, and under the law as it stands, they have the right to search for evidence of crime and criminality. The problem is, retention when no crime or criminality has been detected - just as the retention of DNA has been ruled unlawful, I can bet that at the ECHR, this will be ruled unlawful too.
From TFA: "though since the police gained the right to search one's pockets on request it seems only logical to extend that right into digital pockets too."
That a warrant-less pockets-search is OK does not imply that a wrrant-less cellphone search should be OK.
There's data on one's cellphone which one possibly might carry in one's pockets, but usually do not:
o List of friends and enemies, their phone numbers, when you last spoke, and for how long.
o List of business contacts, their phone numbers, when you last spoke, and for how long.
o Content of SMS messages and emails you sent and received, including confidential business and personal info ("Your VD tests turned up clean..."; "Joe Fookleheimer was caught on CCTV banging an intern in a carpark [vid attached]. Release this before the next board meeting, and you could steal his job.")
o Photos you sent and received, including nude pic your wife/GF sent you.
o Where you have physically been, when you were there, and for how long.
All this sort of info can be leaked to your detriment, or misused against you.
Pre-cellphone era, they'd have to mind-probe you (or blackmail you, or torture you) to get that info, and now the cops/prosecuters want to just vacuum all that up without probable cause or a warrant, easy as pie, and keep it for potential further (mis-)use.
A point barely touched on is that if you are arrested, but not charged, the contents of your phone will still be retained.
that's naked pics of your missus in the hands of plod. the need to not contaminate the evidence chain will not help you because it can be easily copied.
what can they do with the picture of you with your junk tucked between your legs pretending to be a woman in the mirror? anything.
User education also required. Why would you be cruising around with vids/pictures on your phone that you could accidently leave somewhere or have stolen -> the data recovered and plastered all over youtube etc.
I'm always amazed by peeps that after a few drinks start showing off pics of their wife...
I expect any serious crim will now be beaver away at developing an app that wipes said smartphone as soon as it is plugged into unrecognised computer or other device. Well that's what I'd do if I were criminally inclinedm which I'm not (apart from regularly downloading 'Linux' distros).
Is it just me, or did the sentence "Windows 7 PC loaded up with forensic software" make you laugh. I know I did.
Anybody with a pile of mobiles without data connectivity will just also go lol at this.
Also if I was worried and personaly not breaking the law covers me against this (well to a 95% level anyhow as I didn't make my phone or its OS so there are flaws). Well i would simply use skype via a VPN and modify my phone so would need a special modified charger, anything else would instantly cause some extreeme voltages that would not bode the phone well, as well as the machine attached as well perhaps. This would then be a case of the police tampering with evedence. Though the law's of quantum mechanics and a good jury can argue that the by observing they tampered with the evidence in any case :-).
Personaly instead of a 5 day course indicating the software is badly written to the extent that it is not plug in, wait for machine to go ping, unplug, is light flashing red or green. They should talk to a univercity about getting a Raspberry PI and making a small box that does just that. If I had one I'd happily do that and after working out what a policeman gets paid for over 5 days, charge them around the price they pay for 5 hours work for the whole thing and still make a fat margin and sell more. Either way how much are they paying for it currently, how much does the training course cost and then the epenses of the officer to attend the training course etc etc and get the true cost.
But for using the device they shouldn;t need 5 ruddy days, anyalysing the results - well maybe, but only need a few in back office for that and the main devices just extract the data for analysis. Though can see how if i wasnted to creame a contract I'd mush the income about over cost of hardware, then software, then other software extra's, support, hardware support, training. Those who have past the period of 7 years in IT will know the cynical but true observation in alot of products out there.
Its getting to the point where the Gov may as well just put a cop in your home instead.....
25million homes in the UK, currently 2.5mill unemployed, give them all a job and you would have 1 cop for every ten homes. There we go, no need for expensive solutions, a cop in every street and we can even get rid of unemployment.
But considering the NOTW scandal, and all the back lash, how the hell does one go from Phone Hacking is a crime (oops, I mean Forensics) to its perfectly alright "were no longer being paid off"?
And I am no stranger to being shafted, we have the "Patriot Act"
Have to disagree with the statement suggesting that external companies are the be all and end all of phone forensics for law enforcement; this simply isn't the case and, contrary to popular belief, forensic capability is largely held in-house, with external companies being used as a means of expediting work as and when necessary.
As for ACESO; it's not known as the Fisher-Price of phone forensics for nothing. Yes, it is indeed easy to use, but hugely limited and unless conditions are perfect, including standing upwind and crossing all available limbs, you'll struggle to get anything apart from some very basic information using it. Despite the manufacturer's hype, phone forensics requires rather more complex kit, substantially more knowledge than can be garnered from a week of training, time to perform the work, as well as initiative and experience.
At a time when capabilities of phones, as well as anything digital, if we're honest, continue to increase at a whopping rate, perhaps some money should be invested in some proper labs instead, rather than reducing budgets and headcount further, whilst expecting the remaining staff to sift through seized equipment, along with its greater capacity for storage, in less time.
Utter rubbish.