-
- Once again, here's the capabilities of mobile forensics tools at present: If ANY device is unlocked, expect full retrieval of all the data on the phone, including any deleted data that has not been overwritten. Investigators would have to root a locked iPhone 4S and crack the passcode before obtaining much useful data from the phone itself. It takes about 20 minutes to brute force a 4 digit pin on an iPhone 4S, but cracking a complex password is slow and painful. You cannot perform an offline password attack against an iPhone 4S, and attacks are limited to just a few 'guesses' per second.08-03-12 08:27 PMLike 0
- Once again, here's the capabilities of mobile forensics tools at present: If ANY device is unlocked, expect full retrieval of all the data on the phone, including any deleted data that has not been overwritten. Investigators would have to root a locked iPhone 4S and crack the passcode before obtaining much useful data from the phone itself. It takes about 20 minutes to brute force a 4 digit pin on an iPhone 4S, but cracking a complex password is slow and painful. You cannot perform an offline password attack against an iPhone 4S, and attacks are limited to just a few 'guesses' per second.
A good forensic tool will bypass the passcode and extract all user data from most popular Android devices. The newer portable Cellebrite UFED units now bypass the passcode on 59 different Android phones.
No tool or software will bypass the password on a locked BlackBerry, and researchers have still not figured out a way to attack its passcode. Skilled investigators can obtain a raw memory dump with specialized equipment however, so encrypt your data if you wish it to remain confidential.
It should be noted that these methods to extract data are very unlikely and most likely not possible to be used in a random roadside stop by a traffic cop. As I stated earlier, the impetus to see your phone by most traffic cops is to find out if you were texting while driving.08-03-12 08:30 PMLike 0 -
- It should be noted that these methods to extract data are very unlikely and most likely not possible to be used in a random roadside stop by a traffic cop. As I stated earlier, the impetus to see your phone by most traffic cops is to find out if you were texting while driving.
The "probable cause" searches are not as worrisome to me as searches subsequent to arrest. I'm not qualified to discuss legal issues, but some of the recent "subsequent to arrest" cell phone search rulings are concerning. It's not common, but you can be arrested for very minor traffic offenses in my state.08-03-12 08:51 PMLike 0 - You can lock any phone. Iphone,android and blackberry.
So that whole secure phone statement from the op is rubbish.
Sent from my Bold using TapatalkRoo Zilla and Laura Knotek like this.08-03-12 10:49 PMLike 2 -
Some under-18 teenagers enjoy sharing very naughty pictures of themselves. A discussion of the consequences and a reminder to always lock their phones is well-advised.
Many people don't know how to properly secure private data on their phones, or they assume more protection than what is actually provided. An honest, informed discussion of security strengths and weaknesses should always be welcomed. In some cases, a small change like using a stronger iPhone password, will yield good results.jrohland likes this.08-04-12 04:33 AMLike 1 - you really dig too deep into this subject and have no real world idea on what goes on in a troopers mind when he pulls someone over.
you can read all the articles you want but trust me when i say the last thing we would want to do is prolong the time spent with an offender.08-04-12 08:29 AMLike 0 - you really dig too deep into this subject and have no real world idea on what goes on in a troopers mind when he pulls someone over.
you can read all the articles you want but trust me when i say the last thing we would want to do is prolong the time spent with an offender.
Facts: The ACLU received complaints about how these devices were being used during traffic stops. They tried to obtain data for nearly three years. After the initial estimate of over half a million dollars to retrieve usage records for 5 Cellebrite units, the MSP claimed that no data was found for specific time periods. That lack of governmental accountability and transparency is completely unacceptable in a democratic country.kbz1960 likes this.08-04-12 10:11 AMLike 1 - amazinglygracelessRetired Mod
making devices more secure. On that score I defer to your expertise.
The original point of this thread was rubbish as it was making an asinine point that
a person can be prosecuted for a crime committed by someone else for apparently
no other reason than proximity to that individual AND that somehow a BlackBerry
would "immunize" one from such prosecution.
All the talk of mobile forensics came about AFTER that original premise was
demonstrated, clearly and with case law, to simply be wrong. Note that not
even the OP is making or defending that argument any longer.08-04-12 02:28 PMLike 0 - Interesting results from teen sexting survey. Got me thinking about privacy again and why the security of a mobile phone seriously matters. When I think of an adult riding in a car with a teenager and what could happen if the police stopped them. Since police can search your phone anytime they want. Imagine the cop grabs the teen's phone, scans it and finds a naked picture of a minor. The adult could, and I have no doubt would be charged with possession of child pornography. Really wants me to insist everyone in the car have a locked BlackBerry.
Go ahead tell me a politically ambitious prosecutor would not bring such a case. Tell me you have nothing to hide on your iPhone or Android so it doesn't matter if the cops take an image of it. Privacy, everyone's privacy, matters to all of us.
Here's a cool idea - don't have anything on your phone or do anything with your phone that could GET you arrested. There. Problem solved.pantlesspenguin likes this.08-05-12 05:15 PMLike 1 - The cell phone imaging equipment the police have can grab the image of iPhone and Android even if they are locked. That is not true with BlackBerry. A locked BlackBerry is almost impossible to image or access.
The point is, you could be the victim of a prosecution even if you are totally innocent simply because someone near you has a phone with weak security. If you think the US Constitution will protect you, I'm afraid you are living in an America that no longer exists. Yes, maybe the Supreme Court of the US will overturn your conviction about 10 years after you are convicted. In the meantime you are bankrupt and your life is ruined. Go on with your insecure phones. You have nothing to worry about.
Um...oooooooooooooookay then.
Is it a full moon out?08-05-12 05:21 PMLike 0 - Tre LawrenceBetween Realities^^^ I only roll with cats that rock Nokias. All those other smartphones are whack busters, yo.pantlesspenguin likes this.08-05-12 05:34 PMLike 1
-
- I have to disagree despite the fact that I have learned tons from you on the issue of
making devices more secure. On that score I defer to your expertise.
The original point of this thread was rubbish as it was making an asinine point that
a person can be prosecuted for a crime committed by someone else for apparently
no other reason than proximity to that individual AND that somehow a BlackBerry
would "immunize" one from such prosecution.
All the talk of mobile forensics came about AFTER that original premise was
demonstrated, clearly and with case law, to simply be wrong. Note that not
even the OP is making or defending that argument any longer.
In Virginia a driver can be held criminally liable if a minor has alcohol on their person even if the driver did not know. There is no reason the same thing couldn't happen with child pornography.
The Cellbrite device, as I understand it, boots an iPhone and many Android devices to a special operating system and takes an image of the devices storage and memory. The lock status of the phone does not matter. This is not currently possible with BlackBerry.
To think Police cannot image your mobile device without probable cause does not appear to be supported by case law.
I have not stopped supporting my post, it is just all my points have been made by others even if you choose to ignore them.08-05-12 06:18 PMLike 0 - amazinglygracelessRetired Mod@jrohland If you are going to try to prove the validity of your assertion you'd be better served finding a source that is NOT trying to sell a solution to the problem you are alleging could, kinda, sorta, like you know, maybe exists.08-05-12 06:29 PMLike 0
-
Say it ain't so!
It's so much more reasonable to only allow oneself to associate with Blackberry users. If one's spouse has an iPhone or Android, well, grounds for divorce. Cut off all contact just in case you should get pulled over and they MIGHT have naughty pictures. It's clearly the fault of the non Berry user, even if the Berry user is driving and did something to cause them getting pulled over in the first place.
This thread delivers. Just not what was intended.amazinglygraceless and pantlesspenguin like this.08-05-12 06:35 PMLike 2 - Annnnnnnnnnd also the 'teen sexting survey' was done by a group with strong right wing tendencies that are against a woman's right to choose, and that children are born to 'stable, two parent families' with strong hints that their idea of a stable two parent family is only a man and a woman.
Yeah, no thanks. No agenda there at all.
Ick.pantlesspenguin likes this.08-05-12 06:39 PMLike 1 - Tre LawrenceBetween Realities*GASP* you mean someone may take advantage of paranoia to turn a profit?
Say it ain't so!
It's so much more reasonable to only allow oneself to associate with Blackberry users. If one's spouse has an iPhone or Android, well, grounds for divorce. Cut off all contact just in case you should get pulled over and they MIGHT have naughty pictures. It's clearly the fault of the non Berry user, even if the Berry user is driving and did something to cause them getting pulled over in the first place.
This thread delivers. Just not what was intended.reeneebob and amazinglygraceless like this.08-05-12 06:42 PMLike 2 - Like I said in an earlier post, iPhone 4S users currently control their own fate against Cellebrite and other quality forensic tools. Apple burns a 256-bit AES key right into the processor, so offline attacks are not possible. Add many iterations of PBKDF2 to the hardware based key, and it becomes very difficult to crack a STRONG password and retrieve useful information.amazinglygraceless and reeneebob like this.08-05-12 07:08 PMLike 2
- Like I said in an earlier post, iPhone 4S users currently control their own fate against Cellebrite and other quality forensic tools. Apple burns a 256-bit AES key right into the processor, so offline attacks are not possible. Add many iterations of PBKDF2 to the hardware based key, and it becomes very difficult to crack a STRONG password and retrieve useful information.
Sent from mah brainzzzzz via Galaxy S III and Tapatalk 208-06-12 09:21 AMLike 0 -
- Forum
- Popular at CrackBerry
- General BlackBerry News, Discussion & Rumors
Another security matters
LINK TO POST COPIED TO CLIPBOARD