TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cellphone Spy Tools Have Flooded Local Police Departments

246 pointsby rasmiover 8 years ago

14 comments

sh-runover 8 years ago
I&#x27;ve lived in Fort Worth, TX for about a year. I was already aware of the existence of these devices. I had no clue that my local PD was spending such an insane amount of money on surveillance. It&#x27;s also worth mentioning that our population is <i>only</i> 792K.<p>I&#x27;ve lived in Texas most of life and in general I think the people here are great. However, Texans do have a tendency to blindly support anything the Military and Police want to do, while at the same time complaining about big government.<p>I guess I&#x27;d better start bringing this up in my circles. I don&#x27;t think many people are fully aware of what&#x27;s going on.
评论 #13648843 未加载
评论 #13649763 未加载
评论 #13649486 未加载
评论 #13648490 未加载
troncheadleover 8 years ago
So what is the move if you are caught with your pants down, and a LEO is requesting access to your actual phone? Does a factory restore wipe all data, or is in necessary to wipe, fill up with bunk data, wipe again?<p>I don&#x27;t know about everyone else but my phone is has data including me talking about controversial opinions, intimate photos, and various other data that I would not want anyone else to have.
评论 #13648983 未加载
评论 #13651746 未加载
评论 #13648830 未加载
评论 #13650169 未加载
jakelarkinover 8 years ago
&#x27;Cellebrite &quot;Pro Series&quot; purchases all appear to include the firm’s Cloud Analyzer tool, which extracts “private-user cloud data” by &quot;utilizing login information extracted from the mobile device.&#x27;<p>Chilling that is can be done without a warrant e.g. arrested protesters or to citizens crossing the US border.
评论 #13648426 未加载
评论 #13651765 未加载
arca_voragoover 8 years ago
“Criminals tend to try and make tracking their data more difficult, so this kind of mass collection of telephony data will more easily find our political activists, our civil society leaders, and just regular people,” he says. “If the courts—if the public—knew how powerful these tools were, they would move to restrict their use.”<p>The mass surveillance system is about control, not security, and I think time and time again that is being proven. On the constitutional post-warrant data anlysis tools I have these issues:<p>1) This is local law enforcement wising up and playing a similar game to the big three letters.<p>2) I have concerns about the privacy protections for those associated with suspects, and see ripe abuse potential for guilt by association or even &quot;using data from a warrant to get the data on the person you really want but can&#x27;t get the warrant&quot; type of situations.<p>3) I have concerns with the level of data sharing between the LEA&#x27;s, and the post shared protections of said data.<p>4) I have concerns with private companies providing these services because private companies often have sub-par data security practices, and often have strange third-party data selling loopholes so they often end up &quot;scrubbing&quot; data and selling it, but most of us know it&#x27;s not that hard these days to &quot;unscrub&quot; that kind of data.<p>All of this is assuming we are just talking about constitutional methods too. What I find even more insidious and dangerous is the unconstitutional tools like imsicatchers and others being used for parallel construction.<p>Bottom line is this: the LEA&#x27;s and LEO&#x27;s need to remember that they swear an oath:<p>&quot;I, [name], do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same;&quot;<p>The problem as I see it, is that I tracked down the law that punishes congress for a few specific violations of oath of office (5 U.S. Code § 7311), but I have yet to find any law for punishing people in the executive branch for violation of oath of office. If anyone knows of such, please let me know. IANAL, so perhaps 5 U.S. Code § 7311 could apply to the executive and I just misunderstand it.
评论 #13648198 未加载
al2o3crover 8 years ago
Holy passive voice, Batman. Surely a better title would have been &quot;Local Police Departments Buying Loads of Cellphone Spy Tools&quot;, since it&#x27;s not like the damn things are mysteriously appearing unbidden...
dandareover 8 years ago
I think the only thing that can prevent the US from spiraling into a dictatorship is a successful Netflix show about US spiraling into a dictatorship. Maybe it is too late for that too.
DyslexicAtheistover 8 years ago
hackingteam breach has shown that law enforcement are among the biggest customers of HackingTeam. They supply not just the tools but also a subscription (to the constantly changing) payloads to breach a target. Kind of a poor man&#x27;s TAO for the &quot;neighborhood&quot; police-unit. These tools make planting evidence just as easy so it is a massive change in the amount of trust put into individuals working in LE. This is even more scary when you think of how little the average cop knows about the tech they use from some questionable outside private vendor.<p><a href="https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire" rel="nofollow">https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;30C3_-_5439_-_en_-_saal_1_-_201312292...</a><p><a href="https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;543991&#x2F;the-growth-industry-helping-governments-hack-terrorists-criminals-and-political&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;543991&#x2F;the-growth-industr...</a>
theonespyover 8 years ago
I think it&#x27;s not just the Govt and Police who involves in spying on people&#x27;s data. Multiple spy apps i.e. TheOneSpy, PhoneSherif, FlxiSpy, and much more are readily available in the online market to spy on anyone&#x27;s data through his&#x2F;her smartphone. In my point of view first, we should ban these data and privacy breach apps in our state then move on the other Governmental monitorings and protect our privacies.
JustSomeNobodyover 8 years ago
Do the cell site simulators spoof existing towers? How hard would it be to write an app to detect when you connect to another tower and shut the phone down. Unless Google and Apple don&#x27;t let you programmatically shut down the phone.
评论 #13650626 未加载
评论 #13649798 未加载
评论 #13649504 未加载
M_Greyover 8 years ago
Huh. Is there a good, open, secure encryption messaging system you can get on Android?
评论 #13648356 未加载
评论 #13648956 未加载
Jill_the_Pillover 8 years ago
Analyzing this sort of data is why the NYPD is suddenly hiring 100 statisticians?<p><a href="https:&#x2F;&#x2F;www.linkedin.com&#x2F;jobs&#x2F;view&#x2F;245927769" rel="nofollow">https:&#x2F;&#x2F;www.linkedin.com&#x2F;jobs&#x2F;view&#x2F;245927769</a> <a href="http:&#x2F;&#x2F;www.nypdrecruit.com&#x2F;statistician-level-1&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.nypdrecruit.com&#x2F;statistician-level-1&#x2F;</a>
a3nover 8 years ago
So if the Washington D.C. police, or anyone who can afford it, are tracking protesters, or merely tracking, near the White House, they may inadvertently intercept calls from all those insecure, non-presidentially locked phones carried by top White House aides, and by the President?
analogmemoryover 8 years ago
I have no idea how this works. Can someone explain the site simulators? When the site simulators intercept the traffic, they can see all the data. If it&#x27;s encrypted, can they still read it or decrypt it somehow?
评论 #13648341 未加载
评论 #13648039 未加载
lfender6445over 8 years ago
Would wifi calling help in a situations like these?
评论 #13652324 未加载