1. kbz1960's Avatar
    No wonder they push android.
    08-03-12 08:19 PM
  2. MartyMcfly's Avatar
    While the cop has a phone back in his car, just grab the playbook, tether, sign into BBprotect and put message on screen after locking "problem occifer?" and then go wipe device, lulz
    Lol, how funny would that be...

    Sent from my Galaxy Nexus using Tapatalk 2
    08-03-12 08:25 PM
  3. Roo Zilla's Avatar
    Once again, here's the capabilities of mobile forensics tools at present: If ANY device is unlocked, expect full retrieval of all the data on the phone, including any deleted data that has not been overwritten. Investigators would have to root a locked iPhone 4S and crack the passcode before obtaining much useful data from the phone itself. It takes about 20 minutes to brute force a 4 digit pin on an iPhone 4S, but cracking a complex password is slow and painful. You cannot perform an offline password attack against an iPhone 4S, and attacks are limited to just a few 'guesses' per second.
    The 4 digit passcode is an option. You can set it to take alphanumberic/symbols.
    08-03-12 08:27 PM
  4. hootyhoo's Avatar
    Once again, here's the capabilities of mobile forensics tools at present: If ANY device is unlocked, expect full retrieval of all the data on the phone, including any deleted data that has not been overwritten. Investigators would have to root a locked iPhone 4S and crack the passcode before obtaining much useful data from the phone itself. It takes about 20 minutes to brute force a 4 digit pin on an iPhone 4S, but cracking a complex password is slow and painful. You cannot perform an offline password attack against an iPhone 4S, and attacks are limited to just a few 'guesses' per second.

    A good forensic tool will bypass the passcode and extract all user data from most popular Android devices. The newer portable Cellebrite UFED units now bypass the passcode on 59 different Android phones.

    No tool or software will bypass the password on a locked BlackBerry, and researchers have still not figured out a way to attack its passcode. Skilled investigators can obtain a raw memory dump with specialized equipment however, so encrypt your data if you wish it to remain confidential.
    This is the information that is in my now worthless link.

    It should be noted that these methods to extract data are very unlikely and most likely not possible to be used in a random roadside stop by a traffic cop. As I stated earlier, the impetus to see your phone by most traffic cops is to find out if you were texting while driving.
    08-03-12 08:30 PM
  5. hootyhoo's Avatar
    No wonder they push android.
    Who is they?
    jonathon.94 likes this.
    08-03-12 08:31 PM
  6. hornlovah's Avatar
    It should be noted that these methods to extract data are very unlikely and most likely not possible to be used in a random roadside stop by a traffic cop. As I stated earlier, the impetus to see your phone by most traffic cops is to find out if you were texting while driving.
    LOL, unless you're stopped by the Michigan State Police.

    The "probable cause" searches are not as worrisome to me as searches subsequent to arrest. I'm not qualified to discuss legal issues, but some of the recent "subsequent to arrest" cell phone search rulings are concerning. It's not common, but you can be arrested for very minor traffic offenses in my state.
    08-03-12 08:51 PM
  7. eve6er69's Avatar
    You can lock any phone. Iphone,android and blackberry.

    So that whole secure phone statement from the op is rubbish.

    Sent from my Bold using Tapatalk
    Roo Zilla and Laura Knotek like this.
    08-03-12 10:49 PM
  8. hornlovah's Avatar
    You can lock any phone. Iphone,android and blackberry.

    So that whole secure phone statement from the op is rubbish.
    The original post was far from rubbish, and the author brought up important points. Despite assertions to the contrary, mobile forensic units are being used and misused during traffic stops. The Michigan State Police quoted $544,680 to retrieve records for just 5 of these devices when presented with a FOIA request from the ACLU.

    Some under-18 teenagers enjoy sharing very naughty pictures of themselves. A discussion of the consequences and a reminder to always lock their phones is well-advised.

    Many people don't know how to properly secure private data on their phones, or they assume more protection than what is actually provided. An honest, informed discussion of security strengths and weaknesses should always be welcomed. In some cases, a small change like using a stronger iPhone password, will yield good results.
    jrohland likes this.
    08-04-12 04:33 AM
  9. eve6er69's Avatar
    you really dig too deep into this subject and have no real world idea on what goes on in a troopers mind when he pulls someone over.

    you can read all the articles you want but trust me when i say the last thing we would want to do is prolong the time spent with an offender.
    08-04-12 08:29 AM
  10. hornlovah's Avatar
    you really dig too deep into this subject and have no real world idea on what goes on in a troopers mind when he pulls someone over.

    you can read all the articles you want but trust me when i say the last thing we would want to do is prolong the time spent with an offender.
    I have a good idea of what went on between the Michigan State Police and the ACLU because the ACLU posted relevant correspondence between the two entities.

    Facts: The ACLU received complaints about how these devices were being used during traffic stops. They tried to obtain data for nearly three years. After the initial estimate of over half a million dollars to retrieve usage records for 5 Cellebrite units, the MSP claimed that no data was found for specific time periods. That lack of governmental accountability and transparency is completely unacceptable in a democratic country.
    kbz1960 likes this.
    08-04-12 10:11 AM
  11. amazinglygraceless's Avatar
    The original post was far from rubbish, and the author brought up important points. Despite assertions to the contrary, mobile forensic units are being used and misused during traffic stops............
    I have to disagree despite the fact that I have learned tons from you on the issue of
    making devices more secure. On that score I defer to your expertise.

    The original point of this thread was rubbish as it was making an asinine point that
    a person can be prosecuted for a crime committed by someone else for apparently
    no other reason than proximity to that individual AND that somehow a BlackBerry
    would "immunize" one from such prosecution.

    All the talk of mobile forensics came about AFTER that original premise was
    demonstrated, clearly and with case law, to simply be wrong. Note that not
    even the OP is making or defending that argument any longer.
    08-04-12 02:28 PM
  12. hornlovah's Avatar
    You're right amazinglygraceless, and I appreciate the clarification.
    08-04-12 02:43 PM
  13. reeneebob's Avatar
    Interesting results from teen sexting survey. Got me thinking about privacy again and why the security of a mobile phone seriously matters. When I think of an adult riding in a car with a teenager and what could happen if the police stopped them. Since police can search your phone anytime they want. Imagine the cop grabs the teen's phone, scans it and finds a naked picture of a minor. The adult could, and I have no doubt would be charged with possession of child pornography. Really wants me to insist everyone in the car have a locked BlackBerry.

    Go ahead tell me a politically ambitious prosecutor would not bring such a case. Tell me you have nothing to hide on your iPhone or Android so it doesn't matter if the cops take an image of it. Privacy, everyone's privacy, matters to all of us.
    Holy paranoia. Maybe the adults in the car could be arrested for not keeping better control over their children, and that includes teenagers.

    Here's a cool idea - don't have anything on your phone or do anything with your phone that could GET you arrested. There. Problem solved.
    pantlesspenguin likes this.
    08-05-12 05:15 PM
  14. reeneebob's Avatar
    The cell phone imaging equipment the police have can grab the image of iPhone and Android even if they are locked. That is not true with BlackBerry. A locked BlackBerry is almost impossible to image or access.

    The point is, you could be the victim of a prosecution even if you are totally innocent simply because someone near you has a phone with weak security. If you think the US Constitution will protect you, I'm afraid you are living in an America that no longer exists. Yes, maybe the Supreme Court of the US will overturn your conviction about 10 years after you are convicted. In the meantime you are bankrupt and your life is ruined. Go on with your insecure phones. You have nothing to worry about.
    So you are saying that one should only hang out with people who use BlackBerry devices, just in case they may have sexting pictures, and the BB user ends up in jail?

    Um...oooooooooooooookay then.

    Is it a full moon out?
    08-05-12 05:21 PM
  15. Tre Lawrence's Avatar
    ^^^ I only roll with cats that rock Nokias. All those other smartphones are whack busters, yo.
    pantlesspenguin likes this.
    08-05-12 05:34 PM
  16. reeneebob's Avatar
    ^^^ i only roll with cats that rock nokias. All those other smartphones are whack busters, yo.
    symbian beeyotches!
    08-05-12 06:06 PM
  17. jrohland's Avatar
    I have to disagree despite the fact that I have learned tons from you on the issue of
    making devices more secure. On that score I defer to your expertise.

    The original point of this thread was rubbish as it was making an asinine point that
    a person can be prosecuted for a crime committed by someone else for apparently
    no other reason than proximity to that individual AND that somehow a BlackBerry
    would "immunize" one from such prosecution.

    All the talk of mobile forensics came about AFTER that original premise was
    demonstrated, clearly and with case law, to simply be wrong. Note that not
    even the OP is making or defending that argument any longer.
    Just because such a prosecution hasn't happened yet, does not mean the point is asinine. Even if there is no criminal charge, there can be civil liabilities. See U.S. Sexting Laws | Mobile Media Guard scroll down to Civil Liability for Parents.

    In Virginia a driver can be held criminally liable if a minor has alcohol on their person even if the driver did not know. There is no reason the same thing couldn't happen with child pornography.

    The Cellbrite device, as I understand it, boots an iPhone and many Android devices to a special operating system and takes an image of the devices storage and memory. The lock status of the phone does not matter. This is not currently possible with BlackBerry.

    To think Police cannot image your mobile device without probable cause does not appear to be supported by case law.

    I have not stopped supporting my post, it is just all my points have been made by others even if you choose to ignore them.
    08-05-12 06:18 PM
  18. amazinglygraceless's Avatar
    @jrohland If you are going to try to prove the validity of your assertion you'd be better served finding a source that is NOT trying to sell a solution to the problem you are alleging could, kinda, sorta, like you know, maybe exists.
    08-05-12 06:29 PM
  19. reeneebob's Avatar
    @jrohland If you are going to try to prove the validity of your assertion you'd be better served finding a source that is NOT trying to sell a solution to the problem you are alleging could, kinda, sorta, like you know, maybe exists.
    *GASP* you mean someone may take advantage of paranoia to turn a profit?

    Say it ain't so!

    It's so much more reasonable to only allow oneself to associate with Blackberry users. If one's spouse has an iPhone or Android, well, grounds for divorce. Cut off all contact just in case you should get pulled over and they MIGHT have naughty pictures. It's clearly the fault of the non Berry user, even if the Berry user is driving and did something to cause them getting pulled over in the first place.

    This thread delivers. Just not what was intended.
    08-05-12 06:35 PM
  20. reeneebob's Avatar
    Annnnnnnnnnd also the 'teen sexting survey' was done by a group with strong right wing tendencies that are against a woman's right to choose, and that children are born to 'stable, two parent families' with strong hints that their idea of a stable two parent family is only a man and a woman.

    Yeah, no thanks. No agenda there at all.

    Ick.
    pantlesspenguin likes this.
    08-05-12 06:39 PM
  21. Tre Lawrence's Avatar
    *GASP* you mean someone may take advantage of paranoia to turn a profit?

    Say it ain't so!

    It's so much more reasonable to only allow oneself to associate with Blackberry users. If one's spouse has an iPhone or Android, well, grounds for divorce. Cut off all contact just in case you should get pulled over and they MIGHT have naughty pictures. It's clearly the fault of the non Berry user, even if the Berry user is driving and did something to cause them getting pulled over in the first place.

    This thread delivers. Just not what was intended.
    Kind of like Symantec/Norton letting us know of all the Android viruses out of the goodness of their hearts. LOL.
    08-05-12 06:42 PM
  22. hornlovah's Avatar

    The Cellbrite device, as I understand it, boots an iPhone and many Android devices to a special operating system and takes an image of the devices storage and memory. The lock status of the phone does not matter. This is not currently possible with BlackBerry.

    Like I said in an earlier post, iPhone 4S users currently control their own fate against Cellebrite and other quality forensic tools. Apple burns a 256-bit AES key right into the processor, so offline attacks are not possible. Add many iterations of PBKDF2 to the hardware based key, and it becomes very difficult to crack a STRONG password and retrieve useful information.
    08-05-12 07:08 PM
  23. reeneebob's Avatar
    Like I said in an earlier post, iPhone 4S users currently control their own fate against Cellebrite and other quality forensic tools. Apple burns a 256-bit AES key right into the processor, so offline attacks are not possible. Add many iterations of PBKDF2 to the hardware based key, and it becomes very difficult to crack a STRONG password and retrieve useful information.
    Nah, it makes much more sense to cut off all communication with friends or family that choose to use something other than a BlackBerry. Do not pass go and don't collect $200. Also don't ever leave your house in case someone around has, or may at some point, broken a law and you could be collateral damage, don't leave your home in a rain storm in case you may get hit by lightning...

    Sent from mah brainzzzzz via Galaxy S III and Tapatalk 2
    08-06-12 09:21 AM
  24. jrohland's Avatar
    Kind of like Symantec/Norton letting us know of all the Android viruses out of the goodness of their hearts. LOL.
    Or perhaps an Air Conditioner manufacturer suggesting it might get hot outside?
    08-06-12 09:39 AM
  25. Tre Lawrence's Avatar
    Or perhaps an Air Conditioner manufacturer suggesting it might get hot outside?
    In winter at the North Pole, yep.

    Mobile post via Tapatalk
    08-06-12 09:42 AM
53 123
LINK TO POST COPIED TO CLIPBOARD