Midwestern Members IA, IL, IN , KY, MI, MN, MO, NE, OH, WI, KS, OK

Michigan: Police Search Cell Phones During Traffic Stops

Thread Tools
 
Search this Thread
 
Old 04-21-2011, 06:18 AM
  #1  
Launching!
Thread Starter
 
TrueBlueGTO's Avatar
 
Join Date: Jan 2005
Location: Northern NJ
Posts: 272
Likes: 0
Received 1 Like on 1 Post

Default Michigan: Police Search Cell Phones During Traffic Stops

Might not want to video your street races!


http://www.thenewspaper.com/news/34/3458.asp


ACLU seeks information on Michigan program that allows cops to download information from smart phones belonging to stopped motorists.

The Michigan State Police have a high-tech mobile forensics device that can be used to extract information from cell phones belonging to motorists stopped for minor traffic violations. The American Civil Liberties Union (ACLU) of Michigan last Wednesday demanded that state officials stop stonewalling freedom of information requests for information on the program.

ACLU learned that the police had acquired the cell phone scanning devices and in August 2008 filed an official request for records on the program, including logs of how the devices were used. The state police responded by saying they would provide the information only in return for a payment of $544,680. The ACLU found the charge outrageous.

"Law enforcement officers are known, on occasion, to encourage citizens to cooperate if they have nothing to hide," ACLU staff attorney Mark P. Fancher wrote. "No less should be expected of law enforcement, and the Michigan State Police should be willing to assuage concerns that these powerful extraction devices are being used illegally by honoring our requests for cooperation and disclosure."

A US Department of Justice test of the CelleBrite UFED used by Michigan police found the device could grab all of the photos and video off of an iPhone within one-and-a-half minutes. The device works with 3000 different phone models and can even defeat password protections.

"Complete extraction of existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags," a CelleBrite brochure explains regarding the device's capabilities. "The Physical Analyzer allows visualization of both existing and deleted locations on Google Earth. In addition, location information from GPS devices and image geotags can be mapped on Google Maps."

The ACLU is concerned that these powerful capabilities are being quietly used to bypass Fourth Amendment protections against unreasonable searches.

"With certain exceptions that do not apply here, a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity," Fancher wrote. "A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched."

The national ACLU is currently suing the Department of Homeland Security for its policy of warrantless electronic searches of laptops and cell phones belonging to people entering the country who are not suspected of committing any crime.

it's just this easy:
http://www.cellebrite.com/forensic-p...-tutorial.html
Old 04-21-2011, 06:27 AM
  #2  
TECH Apprentice
iTrader: (2)
 
Wimimc's Avatar
 
Join Date: May 2010
Location: Somerset NJ
Posts: 391
Likes: 0
Received 0 Likes on 0 Posts
Default

hello big brother.
Old 04-21-2011, 08:33 AM
  #3  
TECH Regular
iTrader: (20)
 
Eagle02's Avatar
 
Join Date: Mar 2007
Location: NW Burbs of Chicago
Posts: 452
Likes: 0
Received 0 Likes on 0 Posts
Default

I thought I read at one point they can't search it if the battery is removed before they find the phone. Might be something to keep in mind. Also, always keep a pwd on your phone and keep it locked.
Old 04-21-2011, 08:45 AM
  #4  
11 Second Club
iTrader: (11)
 
babbage1109's Avatar
 
Join Date: May 2010
Location: Southside,Indiana
Posts: 1,646
Likes: 0
Received 1 Like on 1 Post

Default

what the hell this country is going to hell in a handbasket
Old 04-21-2011, 08:47 AM
  #5  
TECH Resident
iTrader: (32)
 
1badWS6's Avatar
 
Join Date: Nov 2005
Location: Chicago, IL
Posts: 909
Likes: 0
Received 0 Likes on 0 Posts

Default

This is why I will not cooperate with police unless they have a warrant to search any of my ****. Regardless if its my home or my car. I'm not committing a crime so leave me the hell alone.
Old 04-21-2011, 08:58 AM
  #6  
12 Second Club
iTrader: (1)
 
DetroitSpeedJunkie's Avatar
 
Join Date: Aug 2010
Location: Canton, MI
Posts: 7
Likes: 0
Received 0 Likes on 0 Posts
Default

yea.......so........i would be f*cked.

iPhone-password-1500 pics+vids

I wonder what they are of?

smh, time to backup and erase
Old 04-21-2011, 10:04 AM
  #7  
Dre
Teching In
 
Dre's Avatar
 
Join Date: Sep 2009
Location: Chicago, IL
Posts: 13
Likes: 0
Received 0 Likes on 0 Posts
Default

Originally Posted by Eagle02
I thought I read at one point they can't search it if the battery is removed before they find the phone. Might be something to keep in mind. Also, always keep a pwd on your phone and keep it locked.
This thing can crack your passwords as well according to another article.
Old 04-21-2011, 10:21 AM
  #8  
TECH Apprentice
iTrader: (2)
 
Wimimc's Avatar
 
Join Date: May 2010
Location: Somerset NJ
Posts: 391
Likes: 0
Received 0 Likes on 0 Posts
Default

so i suppose you can just put pictures and videos on a removable card
Old 04-22-2011, 02:17 AM
  #9  
Teching In
 
blksun1's Avatar
 
Join Date: Aug 2008
Location: Plainfield, IN
Posts: 17
Likes: 0
Received 0 Likes on 0 Posts
Default

That is some BS for sure!!!
Old 04-22-2011, 10:23 AM
  #10  
On The Tree
iTrader: (2)
 
datenbrick's Avatar
 
Join Date: Feb 2007
Posts: 120
Likes: 0
Received 0 Likes on 0 Posts
Default

we dont have a chance
Old 04-22-2011, 10:56 AM
  #11  
TECH Junkie
iTrader: (33)
 
LS1-450's Avatar
 
Join Date: Aug 2005
Posts: 3,783
Likes: 0
Received 9 Likes on 8 Posts

Default

Originally Posted by babbage1109
what the hell this country is going to hell in a handbasket

It's not going, it's gone. Liberty, Justice & Freedom have been killed off by criminals who have controlled the Senate since end of the World War II. If a cop wants to scan my phone, "she" better blow me first & damn well better swallow.
Old 04-23-2011, 04:28 PM
  #12  
Registered User
 
WS_SIKK's Avatar
 
Join Date: Apr 2011
Posts: 0
Likes: 0
Received 0 Likes on 0 Posts
Default

i agree with eagle02 just pull your battery
Old 04-25-2011, 11:11 AM
  #13  
Launching!
Thread Starter
 
TrueBlueGTO's Avatar
 
Join Date: Jan 2005
Location: Northern NJ
Posts: 272
Likes: 0
Received 1 Like on 1 Post

Default

Once they arrest you they'll just take the batter off your person and plug it in or simply power the device up once it's plugged into the unit.
Old 04-25-2011, 11:13 AM
  #14  
Launching!
Thread Starter
 
TrueBlueGTO's Avatar
 
Join Date: Jan 2005
Location: Northern NJ
Posts: 272
Likes: 0
Received 1 Like on 1 Post

Default

Think they can't just break into your house and take your info/computer? You're damned if you do (password protect so they can positively identify EVERYTHING you do) damned if you don't. Think again!!

http://news.yahoo.com/s/ap/20110424/..._wi_fi_warning

BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.

That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.

"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."

"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."
"You're a creep ... just admit it," they said.

Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.

Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child ****, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.

For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.

Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.

It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.

Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.

Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.

A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.

The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.

The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.

For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .

"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.

"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues. Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.

The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.

People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.

For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.

It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.

"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.

"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.

The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.

But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.

On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.

The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.

Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.

After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.
Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.

"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'

"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."

In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.

The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.

Last edited by TrueBlueGTO; 04-25-2011 at 11:22 AM.
Old 04-27-2011, 04:02 PM
  #15  
11 Second Club
 
BODUKE's Avatar
 
Join Date: Jul 2010
Posts: 545
Received 2 Likes on 2 Posts

Default

They wont get mine without a warrant.
Old 04-28-2011, 03:45 PM
  #16  
Teching In
 
mparker916's Avatar
 
Join Date: Apr 2011
Posts: 0
Likes: 0
Received 0 Likes on 0 Posts
Default

They do that in Indiana too. I really dont understand why they can. Password lock!



Quick Reply: Michigan: Police Search Cell Phones During Traffic Stops



All times are GMT -5. The time now is 05:47 PM.