An anonymous reader shares an excerpt from a report via Motherboard: Mobile phone forensic extraction devices have been a law enforcement tool for years now, and the number of agencies using them is only rising. As part of an ongoing investigation, we have finally been able to turn up some usage logs of this equipment, from Tulsa Police Department, and Tucson Police Department. While the logs do not list the cause of the crime or any other notes about why the phone was being searched, it does list the make of the phone, the date, and the type of extraction. First, let’s go over what extraction devices are being used here. Tucson PD opted for the brand that is arguably the worldwide leader in mobile device forensics, the Israeli company Cellebrite. Tulsa Police Department however opted for a few different models — they purchased two different password breakers from Teel Technologies in 2015, and in March 2016 gave about $1, 500 to Susteen for their SecureView extraction device (SecureView was the product Susteen created when the FBI requested they create a more advanced extraction device for them). It does its work instantly, and has an incredible reach into a phone’s data. They renewed this contract in 2017. In August 2016 they also purchased the Detective extraction device from Oxygen Forensics. Oxygen is much less common than Cellebrite, from what we have found. The kicker really is how often these are being used — it is simply really hard to believe that out of the 783 times Tulsa Police used their extraction devices, all were for crimes in which it was necessary to look at all of the phone’s data. Even for the 316 times Tucson PD used theirs in the last year, it is still a real stretch to think that some low-level non-violent offenders weren’t on the receiving end. There are some days where the devices were used multiple times — Tulsa used theirs eight times on February 28th of this year, eight again on April 3rd, and a whopping 14 times on May 10th 2016. That is a whole lot of data that Tulsa was able to tap into, and we aren’t even able to understand the why. Read more of this story at Slashdot.
View post:
Police In Oklahoma Have Cracked Hundreds of People’s Cell Phones
Tom Mendelsohn, reporting for Ars Technica: Some smartphone users of Facebook are reporting that they’re no longer able to access their messages from the mobile site, and that they’re being directed towards the free content ad network’s dedicated Messenger app. Users of the regular Facebook mobile app were shunted over to Facebook Messenger to access their chats a while ago. Now, folk who access the service on their phone’s Web browsers, or via third-party apps such as Tinfoil or Metal, are beginning to find that they can no longer view their messages. Complaints are popping up from users who are being told by Facebook that “your conversations are moving to Messenger.” Some Android users are even finding themselves automatically redirected to the download link on the Google Play store when they try and view their messages on the mobile site. Read more of this story at Slashdot.
It’s a dark day for Lord of the Rings necklace collectors and elaborate pet furniture enthusiasts everywhere. This morning, SkyMall’s parent company, Xhibit Corp. ( different Xzibit ) has filed for bankruptcy. Let’s take a moment of silence for the garden bigfoots that may never be. Read more…
Last year, we discovered that Iranian hackers had breached Navy computer systems , which sent an understandable wave of panic through the administration. But it looks like that might’ve just been the tip of a much bigger, more sophisticated and more deadly iceberg. Read more…