Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Monday September 26 2016, @05:49PM   Printer-friendly
from the taking-bites-of-apples dept.

BBC technology correspondent Rory Cellan-Jones has met with representatives of the Israeli company Cellebrite, which helps police forces gain access to the data on the mobile phones of suspected criminals. They were rumoured to have aided the FBI in gaining access to the iPhone used by the San Bernardino shooter (though some reports contradict this). From the article:

It's an Israeli company that helps police forces gain access to data on the mobile phones of suspected criminals.

Cellebrite was in the headlines earlier this year when it was rumoured to have helped the FBI to crack an iPhone used by the San Bernardino shooter.

Now the company has told the BBC that it can get through the defences of just about any modern smartphone. But the firm refuses to say whether it supplies its technology to the police forces of repressive regimes.

[...] Mr Ben-Moshe claimed that his firm could access data on "the largest number of devices that are out there in the industry".

Even Apple's new iPhone 7?

"We can definitely extract data from an iPhone 7 as well - the question is what data."

He said that Cellebrite had the biggest research and development team in the sector, constantly working to catch up with the new technology.

He was cagey about how much data could be extracted from services such as WhatsApp - "It's not a black/white yes/no answer" - but indicated that criminals might be fooling themselves if they thought any form of mobile communication was totally secure.


Original Submission

Related Stories

Used Universal Forensic Extraction Devices (Phone Cracking Devices) Found on eBay 11 comments

Phone-Hacking Tool Law Agencies Use Cost Just $100 on eBay

When smartphone companies refuse to help law enforcement agencies access encrypted devices, investigators often turn to companies like Cellebrite, which offers its Universal Forensic Extraction Device (UFED) to help them hack the phone in question to access secure data The problem? This week, Forbes reported that UFEDs--which normally cost between $5,000 and $15,000--can now be bought on eBay for as little as $100.

In addition to letting anyone with a likeness of Benjamin Franklin break into other people's devices, these used UFEDs were also found to contain data from previous investigations.

Forbes said Hacker House co-founder Matthew Hickey bought a dozen UFEDs to see what secrets they might contain. He reportedly found that the "secondhand kit contained information on what devices were searched, when they were searched and what kinds of data were removed," as well as the searched phones' IMEI (international mobile equipment identity) codes.

Related: Washington Post: The FBI Paid "Gray Hat(s)", Not Cellebrite, for iPhone Unlock
Meeting Cellebrite - Israel's Master Phone Crackers
Cellebrite Appears to Have Been Hacked
Federal Court Rules That the FBI Does Not Have to Disclose Name of iPhone Hacking Vendor


Original Submission

Washington Post: The FBI Paid "Gray Hat(s)", Not Cellebrite, for iPhone Unlock 35 comments

The Washington Post reports that the FBI did not require the services of Israeli firm Cellebrite to hack a San Bernardino terrorist's iPhone. Instead, it paid a one-time fee to a group of hackers and security researchers, at least one of whom the paper labels a "gray hat". It's also reported that the U.S. government has not decided whether or not to disclose to Apple the previously unknown vulnerability (or vulnerabilities) used to unlock the iPhone (specifically an iPhone 5C running iOS 9):

The FBI cracked a San Bernardino terrorist's phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter. The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone's four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.

The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.

[...] The bureau in this case did not need the services of the Israeli firm Cellebrite, as some earlier reports had suggested, people familiar with the matter said. The U.S. government now has to weigh whether to disclose the flaws to Apple, a decision that probably will be made by a White House-led group.

FBI Director James Comey told students at Catholic University's Columbus School of Law that "Apple is not a demon," and "I hope people don't perceive the FBI as a demon." What a saint.


Original Submission

Federal Court Rules That the FBI Does Not Have to Disclose Name of iPhone Hacking Vendor 5 comments

The FBI will not have to disclose the name of the vendor that it paid to hack into an iPhone used by one of the San Bernardino terrorists:

A federal court ruled yesterday that the FBI does not have to disclose either the name of the vendor used or price the government paid to hack into the iPhone SE of mass shooter Syed Farook, according to ZDNet. The device became embroiled in a heated national controversy and legal standoff last year when Apple refused to help the FBI develop a backdoor into it for the purpose of obtaining sensitive information on Farook and his wife Tashfeen Malik, both of whom participated in the terrorist attack that left 14 dead in San Bernardino, California in December 2015.

The Justice Department originally filed a lawsuit against Apple to compel it to participate by creating a special version of its mobile operating system, something Apple was vehemently against because of the risk such a tool posed to users. But very soon after, the government withdrew from the case when a third-party vendor secretly demonstrated to the FBI a workable method to bypass the iPhone's security system. Three news organizations — the Associated Press, Vice News, and USA Todayfiled a Freedom of Information Act lawsuit in September 2016 to reveal details of the hacking method used. Because it was not clear how many phones the workaround could be used on, and whether the FBI could use it surreptitiously in the future, the lawsuit was seeking information that would be pertinent to the public and security researchers around the globe.

But it's probably Cellebrite.

Previously: Washington Post: The FBI Paid "Gray Hat(s)", Not Cellebrite, for iPhone Unlock
FBI Can't Say How It Hacked IPhone 5C
Meeting Cellebrite - Israel's Master Phone Crackers
Cellebrite Appears to Have Been Hacked
Senator Dianne Feinstein Claims That the FBI Paid $900,000 to Break Into a Locked iPhone

Related: FBI Resists Revealing its Tor User Identification Methods in Court


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by Anonymous Coward on Monday September 26 2016, @07:15PM

    by Anonymous Coward on Monday September 26 2016, @07:15PM (#406721)

    "We can definitely extract data from an iPhone 7 as well - the question is what data."

    This is the type of answer which sounds meaningful, but isn't. I can extract data from an iPhone 7 as well. If you hand me one, I can determine if the phone has a charge, if the phone has a locking system, and even the type of locking system the owner has chosen to use.

    I only wonder why they chose to give this kind of ominous and omnipotent sounding non-answer. Are they trying to scare people, are they trying to hide how little (or possibly how much) data they are able to extract, are they trying to drum up new business, or something else?

    • (Score: -1, Flamebait) by Anonymous Coward on Monday September 26 2016, @07:56PM

      by Anonymous Coward on Monday September 26 2016, @07:56PM (#406730)

      They probably have people inside companies so its a simple task to break the devices. They have the keys. If they cannot get the keys, they threaten manufacturers with attacks and total destruction until the manufacturer gives in.

      this kind of ominous and omnipotent sounding non-answer

      They give non-answers like the above. They make non-arguments: "how can anyone argue with that?" It is a characteristic of that race. They work their magic through suggestion.

      • (Score: 0) by Anonymous Coward on Monday September 26 2016, @09:46PM

        by Anonymous Coward on Monday September 26 2016, @09:46PM (#406756)

        If you just hadn't added "characteristic of that race" you may have had a decent point to discuss. As it stands, you're an asshole.

    • (Score: 0) by Anonymous Coward on Monday September 26 2016, @11:33PM

      by Anonymous Coward on Monday September 26 2016, @11:33PM (#406774)

      I think that was an admission that they can't break into everything. Some data is vulnerable to their hacks, some not.

      They have no need to be ominous, they have the market cornered there. They most likely deal with oppressive governments (haha he has no info on that uh huh) and don't want their shortcomings or capabilities known.

    • (Score: -1, Troll) by Anonymous Coward on Tuesday September 27 2016, @12:44AM

      by Anonymous Coward on Tuesday September 27 2016, @12:44AM (#406792)

      For me it just says, you can't trust anything coming from that country, so check the Made In label before you buy.

    • (Score: 0) by Anonymous Coward on Tuesday September 27 2016, @05:20PM

      by Anonymous Coward on Tuesday September 27 2016, @05:20PM (#407025)

      Wait, Verizon put a "Cellebrite" app on my phone (antique Treo) when I got the account with them.

      Coincidence?

  • (Score: -1, Troll) by Anonymous Coward on Monday September 26 2016, @07:40PM

    by Anonymous Coward on Monday September 26 2016, @07:40PM (#406726)

    Ironic that jews are finding criminals. All they have to do is look in the mirror and see a criminal.

    When the criminal is the jew, there is no question he knows more about "breaking" encryption and getting the goodies inside than actually working for a living. He lies, cheats, steals, breaks things in order to take what the goy has created. But he won't take anything from his fellow jew because that is forbidden by his devil god.

    The jews got to where they are ("Financially" Not morally, artistically, scientifically or any other way) by opening and reading letters sent through communication channels they controlled. At one time, they were the only way to send communications and they read all letters. Now they break cell phone encryption to read communications. They haven't changed one bit. Communication carries all the goodies anyway and the jew knows that. Once a jew ... always a jew.

  • (Score: 4, Insightful) by TheGratefulNet on Tuesday September 27 2016, @02:59AM

    by TheGratefulNet (659) on Tuesday September 27 2016, @02:59AM (#406824)

    you can rationalize all you want - that they 'catch criminals'. but just remove the word criminal and put in, instead, citizen or even person.

    they don't care who they spy on and its NEVER been about 'catching bad guys'. we are in post-snowden era and we know what you assholes are up to. its no good and we don't trust or like you anymore.

    I'd love to see the spy-masters get a dose of their own medicine. I'd almost cheer on the terrorists if they can put a dent into the spy machinery that we seem to support with our tax dollars. if this company was blown up, I'd not shed a single tear.

    what they are doing is wrong and I don't fall for the 'but its ok when its the Good Guys(tm) doing it'. NO, ITS NOT.

    having an elite group that can break the encryption or use bugs to break in is WRONG and it WILL backfire eventually. we are playing with fire and we don't seem to care.

    so very sad.

    --
    "It is now safe to switch off your computer."
    • (Score: 2) by DannyB on Tuesday September 27 2016, @02:59PM

      by DannyB (5839) Subscriber Badge on Tuesday September 27 2016, @02:59PM (#406971) Journal

      I might not have a problem with it if I somehow could actually believe that the spies were working in our best interests. Going after actual bad guys. And not going after people for a political or revengeful purpose. Not spying on our own citizens. Not spying on our allies and their politicians or their matters of internal business.

      The National Security Letters and gag orders stink to high heaven. They want to ensure that it is impossible for people to have a private conversation. Or have private files.

      Searching for a needle in a needle stack never seems to uncover an act of terror before it happens.

      When each separate removal of our rights started, it may have been with the best of intentions. And was only intended to be temporary. But once allowed to continue it is nothing less than tearing up the constitution. They can keep repeating that what they are doing is legal. But it is not.

      --
      If your boy is chewing on electrical cords, then ground him until he conducts himself properly.
    • (Score: 0) by Anonymous Coward on Tuesday September 27 2016, @05:51PM

      by Anonymous Coward on Tuesday September 27 2016, @05:51PM (#407046)

      I don't agree.

      Cellebrite is providing a tool/service- breaking the encryption on a cell phone. It is the responsibility of the people contracting this service to assure that it is being used effectively.

      For the most part Canada has some pretty good privacy protection laws (though it seems that every time I blink there are new proposals on the books to erode those protections or some department that is outright ignoring those protections). Being held on suspicion is not enough to justify the breaking of any locks, having a search warrant that specifically covers the breaking of locks (which normally requires enough evidence to convict for a crime already but police want to determine the extent of the crime- which is important because we don't have compounding sentences) can only turn over evidence related to THAT crime (at least in theory- see my point about departments ignoring protections).

      Essentially how this should play out is- There is a counterfeiter operating between 1993-2003 the criminal passed 5 billion in false bills, police have enough evidence to convinct the individual of counterfeiting to the tune of about 6000, but there is no 'multiple counts' in canadian court, so if they charge the individual with counterfeiting between 1993-2003 and he only gets a sentence of 5 years. However if they can find evidence during their discovery of the extent of the crime of the full 5 billion he will serve 9 years. A warrant is issued that includes the breaking of digital locks and they break his cellphone encryption, find the 5 billion, and the counterfeiter goes to prison for 9 years.

      With those factors in place I am ok with there being organizations which can assist with the legal execution of a warrant which has been written to include the circumvention of locks or security measures.