What the Government Can Get From Your iPhone
Posted on Feb 27, 2013
A court document obtained by the ACLU reveals the kind of data federal agents are able to pull off of a seized iPhone using âadvanced forensic analysis tools.â
âThe list,â writes electronic privacy expert Chris Soghoian, âstarkly demonstrates just how invasive cell phone searches areâ"and why law enforcement should be required to obtain a warrant before conducting them.â
The iPhone was seized from a suspectâs bedroom during a drug bust. In a single sweep, Immigration and Customs Enforcement agents were able to extract call activity, contact lists, voice mails and text messages, photos and videos, apps, eight different passwords and 659 âgeolocation points,â including connections to 227 cellphone towers and 403 Wi-Fi networks.
Before smartphones arrived, Soghoian writes, police had to gain a warrant to access such information, which would be stored in a suspectâs home or office. âOur pockets and bags simply arenât big enough to carry paper records revealing that much data. We would have never carried around several yearsâ worth of correspondence, for exampleâ"but today, five-year-old emails are just a few clicks away using the smartphone in your pocket. The fact that we now carry this much private, sensitive information around with us means that the government is able to get this information, too.â
Although the ICE obtained a warrant to search the phone in this case, courts are divided about whether one is necessary in these circumstances, and no law requires it. Police officers have claimed they donât need a warrant during moments of lawful arrest [1] and at U.S. border crossings [2] .
â"Posted by Alexander Reed Kelly .
Chris Soghoian at ACLU:
The police should not be free to copy the contents of your phone without a warrant absent extraordinary circumstances. However, that is exactly what is happening. Last year in California, for example, Governor Jerry Brown vetoed a common-sense bill that would have required the police to obtain a warrant before searching seized phones, despite the billâs broad bipartisan support in the state legislature.
Intrusive cell phone searches are becoming ever easier for law enforcement officers to conduct. Companies such as Cellebrite produce portable forensics machines that can download copies of an iPhoneâs âexisting, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotagsâ in minutes. This type of equipment, which allows the government to conduct quick, easy phone searches, is widely available to law enforcement agenciesâ"and not just to federal agents.
While the law does not sufficiently protect the private data on smartphones, technology can at least provide some protection. All modern smartphones can be locked with a PIN or password, which can slow down, or in some cases, completely thwart forensic analysis by the police (as well as a phone thief or a prying partner). Make sure to pick a sufficiently long password: a 4 character numeric PIN can be cracked in a few minutes, and the pattern-based unlock screen offered by Android can be bypassed by Google if forced to by the government. Finally, if your mobile operating system offers a disk encryption option (such as with Android 4.0 and above), it is important to turn it on.
New and Improved Comments
If you have trouble leaving a comment, review this help page [4] . Still having problems? Let us know . If you find yourself moderated, take a moment to review our comment policy .
Links
- ^ lawful arrest (papers.ssrn.com)
- ^ U.S. border crossings (www.aclu.org)
- ^ Read more (www.aclu.org)
- ^ this help page (docs.disqus.com)
- ^ comments powered by Disqus. (disqus.com)
No comments:
Post a Comment