fasted58
fasted58 SuperDork
9/30/11 1:24 a.m.

Michigan Police May Be Using Cellphone Hacking Device During Routine Traffic Stops

The American Civil Liberties Union (ACLU) is currently engaged in a war of words and requests for information on a device used by the Michigan state police that can extract information from cellphones. The device, which has reportedly been in use since at least 2008, is apparently being used by the police during minor traffic violations.

The device, called the Cellebrite UFED, has been tested by the Department of Justice which reported the device was capable of pulling all photos and video from an iPhone in under a minute and a half. Cellbrite says their devices also can extract, “existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.” It can also extract your highly incriminating ringtones. These devices can also circumvent password protection, and are reported to work on over 3,000 cellphone models.

Understandably, the ACLU has voiced concern that the device breaches the protection against unreasonable search and seizure guaranteed by the 4th Amendment of the U.S. Constitution. The argument that innocent people have nothing to hide is, to my mind, insufficient against a device that cannot distinguish incriminating data. From the information provided by manufacturer, an officer would need to sort through the data piece-by-piece on a computer. Meaning that during a short traffic stop there seems to be little chance that police would be able to find useful information. Moreover, even an innocent person would likely have qualms with a stranger, police officer or not, pawing through their personal information.

Furthermore, one wonders how officers would have time to sort through reams of this information.

Though these devices are certainly valuable during investigations, the risk is that indiscriminate uncessarily exposes the information of private individuals. Interestingly, the ACLU’s attempts to determine how the device is being used in the field have met with spectacular opposition from the Michigan police. The ACLU has filed Freedom of Information Act requests about the device, detailing the use of the device. A FOIA request generally compels the recipient to respond with all non-sensitive information. The police have responded by requesting $544,680 in exchange for the information.

Perhaps the most unfortunate result of using this device is that it will almost certainly increase public distrust toward law enforcement officers. Though the Michigan police likely have the best of intentions at heart, their apparent unwillingness to reveal how these devices are being used certainly does not bode well. It’s an unfortunate note to end on, but those driving in or through Michigan should probably educate themselves on their rights.

http://www.geekosystem.com/cellebrite-cellphone-hacker/

Cellebrite Corporate site: http://www.cellebrite.com/forensic-products/forensic-products.html

more: http://translogic.aolautos.com/2011/04/29/police-device-used-to-steal-your-cell-phone-data-during-traffic/?icid=maing-grid10|verizon|dl6|sec1_lnk2|100054


Another step in electronic forensics but this one is now on the streets. It first raised concerns when it became known that Michigan State Police had been using the tool to access cell phones during traffic stops. When and how it is used should be put under strict scrutiny. Surely a warrant is required but PD may also download a device if the owner submits w/o a warrant.

OnStar and FB data collection doesn't bother me, this one does.

Appleseed
Appleseed SuperDork
9/30/11 2:39 a.m.

Note to self: turn off phone at next traffic stop.

MrJoshua
MrJoshua SuperDork
9/30/11 5:39 a.m.
Appleseed wrote: Note to self: turn off phone at next traffic stop.

Note to self: fill phone with fake pictures of Police Chief giving me awards and drinking beer with me.

DoctorBlade
DoctorBlade Dork
9/30/11 7:03 a.m.

I love my dumbphone. Can't do anything but take calls.

pinchvalve
pinchvalve SuperDork
9/30/11 8:34 a.m.

My iPhone has software to block this, not just from the cops, but from any hacker. My company provided it, but really, who wants pictures of my cats?

93EXCivic
93EXCivic SuperDork
9/30/11 8:36 a.m.
pinchvalve wrote: My iPhone has software to block this, not just from the cops, but from any hacker. My company provided it, but really, who wants pictures of my cats?

What is the software?

Strizzo
Strizzo SuperDork
9/30/11 8:45 a.m.

the way the people trafficking guides get around this is to not carry the phone in a functional manner. they carry the phone in one pocket and the battery in another. the border patrol are not allowed to make the phone workable in order to search through it for numbers or other information..

seems like taking the battery out of your phone when you get stopped wouldn't be a bad idea until this whole thing gets sorted out.

slantvaliant
slantvaliant Dork
9/30/11 9:18 a.m.

Do you really want to be seen fiddling with a small metal/polymer object as a cop approaches your car?

Hint: 380, 38, 32, 25, 22

92CelicaHalfTrac
92CelicaHalfTrac SuperDork
9/30/11 9:24 a.m.

Just throw the phone in your center console cubby if you've got one. They have to get a warrant or you have to consent to a search for them to even get the phone at that point.

Due to past experiences, i WILL be that shiny happy person letting them know that they can search by car when they have a warrant, and not a moment before.

Then when they find the phone, they can try to pull whatever they want off my stone age device that.... makes calls.

Don't you even have to have ANOTHER warrant in order to go through electronic files like this?

carguy123
carguy123 SuperDork
9/30/11 9:28 a.m.

More things like this seem to come out of Michigan.

integraguy
integraguy SuperDork
9/30/11 9:37 a.m.

In 1937 (yes, 65 years ago) Sinclair Lewis wrote the book "It Can't Happen Here". Much like the book "1984", it IS happening here, and just like in the book, we are sitting still for it...to a large extent.

spitfirebill
spitfirebill SuperDork
9/30/11 9:52 a.m.

This is all BS. This big brother stuff all stopped when W left office. BO would never allow this stuff to happen.

mndsm
mndsm SuperDork
9/30/11 9:59 a.m.

Carry two phones. "Here ya go officer, check it all you want".

EastCoastMojo
EastCoastMojo GRM+ Memberand SuperDork
9/30/11 10:02 a.m.

There must be an app that will brick one of these Cellebrite devices once hooked up to the phone. There's an app for everything.

jrw1621
jrw1621 SuperDork
9/30/11 10:09 a.m.

I am more concerned that "the freedom of information" request results in the police wanting to charge $544k for the information. Is this really how this type of thing works?

DoctorBlade
DoctorBlade Dork
9/30/11 10:17 a.m.
jrw1621 wrote: I am more concerned that "the freedom of information" request results in the police wanting to charge $544k for the information. Is this really how this type of thing works?

Oh Yes. It's their way of denying the request. They can't "Officially" deny it, so they charge you $100 a page for photocopying and the like.

Volksrodden
Volksrodden Dork
9/30/11 10:34 a.m.

Funny thing is, as long as your cell is not in plain site, they can not search your car for it (search and seizure). Next thing, using this during a routine traffic stop...sounds a little fishy to me, unless they have stop some body that has a history. Far as extracting information from phones...what are they going to be doing with the info after the traffic stop. I'll look up some stuff about search, seizure, and traffic stops later today and find out some thing

Appleseed
Appleseed SuperDork
9/30/11 11:25 a.m.
slantvaliant wrote: Do you really want to be seen fiddling with a small metal/polymer object as a cop approaches your car? Hint: 380, 38, 32, 25, 22

Better he notice that than the loaded .357 magnum on the seat and the dead hooker in the trunk.

Grtechguy
Grtechguy SuperDork
9/30/11 12:11 p.m.

Have I ever mentioned how much I love this state?

You'll need to log in to post.

Our Preferred Partners
d90iIkF1OKhC6eCyCnskvtmIFpUksRdMPvrXzLR9eAsPKcpDRi8kpZZp3r71ZOnA