TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cellphone Spy Tools Have Flooded Local Police Departments

246 点作者 rasmi超过 8 年前

14 条评论

sh-run超过 8 年前
I&#x27;ve lived in Fort Worth, TX for about a year. I was already aware of the existence of these devices. I had no clue that my local PD was spending such an insane amount of money on surveillance. It&#x27;s also worth mentioning that our population is <i>only</i> 792K.<p>I&#x27;ve lived in Texas most of life and in general I think the people here are great. However, Texans do have a tendency to blindly support anything the Military and Police want to do, while at the same time complaining about big government.<p>I guess I&#x27;d better start bringing this up in my circles. I don&#x27;t think many people are fully aware of what&#x27;s going on.
评论 #13648843 未加载
评论 #13649763 未加载
评论 #13649486 未加载
评论 #13648490 未加载
troncheadle超过 8 年前
So what is the move if you are caught with your pants down, and a LEO is requesting access to your actual phone? Does a factory restore wipe all data, or is in necessary to wipe, fill up with bunk data, wipe again?<p>I don&#x27;t know about everyone else but my phone is has data including me talking about controversial opinions, intimate photos, and various other data that I would not want anyone else to have.
评论 #13648983 未加载
评论 #13651746 未加载
评论 #13648830 未加载
评论 #13650169 未加载
jakelarkin超过 8 年前
&#x27;Cellebrite &quot;Pro Series&quot; purchases all appear to include the firm’s Cloud Analyzer tool, which extracts “private-user cloud data” by &quot;utilizing login information extracted from the mobile device.&#x27;<p>Chilling that is can be done without a warrant e.g. arrested protesters or to citizens crossing the US border.
评论 #13648426 未加载
评论 #13651765 未加载
arca_vorago超过 8 年前
“Criminals tend to try and make tracking their data more difficult, so this kind of mass collection of telephony data will more easily find our political activists, our civil society leaders, and just regular people,” he says. “If the courts—if the public—knew how powerful these tools were, they would move to restrict their use.”<p>The mass surveillance system is about control, not security, and I think time and time again that is being proven. On the constitutional post-warrant data anlysis tools I have these issues:<p>1) This is local law enforcement wising up and playing a similar game to the big three letters.<p>2) I have concerns about the privacy protections for those associated with suspects, and see ripe abuse potential for guilt by association or even &quot;using data from a warrant to get the data on the person you really want but can&#x27;t get the warrant&quot; type of situations.<p>3) I have concerns with the level of data sharing between the LEA&#x27;s, and the post shared protections of said data.<p>4) I have concerns with private companies providing these services because private companies often have sub-par data security practices, and often have strange third-party data selling loopholes so they often end up &quot;scrubbing&quot; data and selling it, but most of us know it&#x27;s not that hard these days to &quot;unscrub&quot; that kind of data.<p>All of this is assuming we are just talking about constitutional methods too. What I find even more insidious and dangerous is the unconstitutional tools like imsicatchers and others being used for parallel construction.<p>Bottom line is this: the LEA&#x27;s and LEO&#x27;s need to remember that they swear an oath:<p>&quot;I, [name], do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same;&quot;<p>The problem as I see it, is that I tracked down the law that punishes congress for a few specific violations of oath of office (5 U.S. Code § 7311), but I have yet to find any law for punishing people in the executive branch for violation of oath of office. If anyone knows of such, please let me know. IANAL, so perhaps 5 U.S. Code § 7311 could apply to the executive and I just misunderstand it.
评论 #13648198 未加载
al2o3cr超过 8 年前
Holy passive voice, Batman. Surely a better title would have been &quot;Local Police Departments Buying Loads of Cellphone Spy Tools&quot;, since it&#x27;s not like the damn things are mysteriously appearing unbidden...
dandare超过 8 年前
I think the only thing that can prevent the US from spiraling into a dictatorship is a successful Netflix show about US spiraling into a dictatorship. Maybe it is too late for that too.
DyslexicAtheist超过 8 年前
hackingteam breach has shown that law enforcement are among the biggest customers of HackingTeam. They supply not just the tools but also a subscription (to the constantly changing) payloads to breach a target. Kind of a poor man&#x27;s TAO for the &quot;neighborhood&quot; police-unit. These tools make planting evidence just as easy so it is a massive change in the amount of trust put into individuals working in LE. This is even more scary when you think of how little the average cop knows about the tech they use from some questionable outside private vendor.<p><a href="https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire" rel="nofollow">https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;30C3_-_5439_-_en_-_saal_1_-_201312292...</a><p><a href="https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;543991&#x2F;the-growth-industry-helping-governments-hack-terrorists-criminals-and-political&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;543991&#x2F;the-growth-industr...</a>
theonespy大约 8 年前
I think it&#x27;s not just the Govt and Police who involves in spying on people&#x27;s data. Multiple spy apps i.e. TheOneSpy, PhoneSherif, FlxiSpy, and much more are readily available in the online market to spy on anyone&#x27;s data through his&#x2F;her smartphone. In my point of view first, we should ban these data and privacy breach apps in our state then move on the other Governmental monitorings and protect our privacies.
JustSomeNobody超过 8 年前
Do the cell site simulators spoof existing towers? How hard would it be to write an app to detect when you connect to another tower and shut the phone down. Unless Google and Apple don&#x27;t let you programmatically shut down the phone.
评论 #13650626 未加载
评论 #13649798 未加载
评论 #13649504 未加载
M_Grey超过 8 年前
Huh. Is there a good, open, secure encryption messaging system you can get on Android?
评论 #13648356 未加载
评论 #13648956 未加载
Jill_the_Pill超过 8 年前
Analyzing this sort of data is why the NYPD is suddenly hiring 100 statisticians?<p><a href="https:&#x2F;&#x2F;www.linkedin.com&#x2F;jobs&#x2F;view&#x2F;245927769" rel="nofollow">https:&#x2F;&#x2F;www.linkedin.com&#x2F;jobs&#x2F;view&#x2F;245927769</a> <a href="http:&#x2F;&#x2F;www.nypdrecruit.com&#x2F;statistician-level-1&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.nypdrecruit.com&#x2F;statistician-level-1&#x2F;</a>
a3n超过 8 年前
So if the Washington D.C. police, or anyone who can afford it, are tracking protesters, or merely tracking, near the White House, they may inadvertently intercept calls from all those insecure, non-presidentially locked phones carried by top White House aides, and by the President?
analogmemory超过 8 年前
I have no idea how this works. Can someone explain the site simulators? When the site simulators intercept the traffic, they can see all the data. If it&#x27;s encrypted, can they still read it or decrypt it somehow?
评论 #13648341 未加载
评论 #13648039 未加载
lfender6445超过 8 年前
Would wifi calling help in a situations like these?
评论 #13652324 未加载