|
in:
|
|
| Forums > IC Magazine > Marijuana News > Why Smart Crooks Don't Use Smartphones | ||
| Why Smart Crooks Don't Use Smartphones | Thread Tools |
|
|
#1 |
|
Guest
Posts: n/a
|
Why Smart Crooks Don't Use Smartphones
How does the modern criminal plan out a caper? Not on a cellphone -- if he's smart, that is. Smartphones can take pictures tagged to a particular location and time, provide turn-by-turn directions, find the closest gas station or the best nearby Italian restaurant, and communicate via voice, texting, e-mail and even videoconferencing. They can also store all that information, yielding everything the cops need to capture a bad guy. The iPhone is particularly popular with cops, because it's so popular with consumers. Forensics experts say that when an iPhone or other smartphone is involved in an investigation, it can provide an extensive set of digital fingerprints -- and digital footprints -- telling law enforcement where you've been, when you were there, and whom you've been communicating with. "There's plenty of information an iPhone hangs onto," Jonathan Zdziarski, author of iPhone Forensics, told FoxNews.com. "For example, the iPhone takes a screen shot every time you hit the home button, including shots of your e-mail with the time stamped on it." Such information can be critical in a criminal investigation. "When someone tells me they have an iPhone in a case, I say, 'Yeah!' I can do tons with an iPhone," Detective Josh Fazio told the Chicago Sun-Times. It's not difficult to understand law enforcement's enthusiasm for the iPhone. Equipped with GPS, a camera, and a Web browser, it can provide a wealth of data to police trying to track a criminal's movements and actions: * Mapping software will store locations you've searched or directions you've received. * The auto correcting typing feature of iPhones actually stores words you've typed, which could potentially be accessed months after a message was sent and deleted. * Photos taken with the phone can contain information about where, when and with which device the image was captured. * Web browser information is also often stored, such as reservations the owner has made or sites they have visited. The iPhone is obviously a major focus in terms of forensic work, given its popularity, but similar vulnerabilities exist with the growing number of Android-based phones on the market, such as the Motorola Droid X, according to Andrew Hoog, chief investigative officer, at viaForensics. "Many [Android] apps are being rushed to market, and they can have substantial holes," Hoog told FoxNews.com. Furthermore, some passwords end up being stored as plain text on phones, including corporate e-mail and eBay passwords. "It's practically impossible for an end user to completely wipe a phone clean," says Hoog. So if you're not planning to commit a crime, should you worry? Maybe. Smart phones are rapidly replacing desktop computers as the repository for a wealth of personal information, including banking passwords, personal contact information, text messages, and social-networking pages. Give someone access to your phone and you're giving them access to your life. Many people are banking on their iPhones, for example. Watch out. Citigroup recently revealed that its mobile-banking application for the iPhone was secretly storing personal information, possibly including account numbers, access codes, and balance information. "We discovered that our U.S. Citi Mobile iPhone banking app was accidentally saving information related to customer accounts in a hidden file on their iPhones," Citi said in a prepared statement. The company then issued an updated version of the software to correct the problem, but the vulnerability shows that even a bank -- which focuses intently on security -- can leave smartphone users vulnerable. Do you carefully delete all of that personal data to play it safe? No matter, it still may be accessible to thieves or law enforcement. "If you delete a file, the message remains on the phone" until the software overwrites it with another piece of data, explained Zdziarski. And that may be a long time. Zdziarski cited cases he's worked on with law enforcement where he recovered messages that had been deleted months before. Remember, as well, that former Detroit Mayor Kwame Kilpatrick landed in hot water and eventually jail two years ago because he didn't realize personal text messages were being stored on his SkyTel device. Indeed, even if you're using another carrier or service, your deleted text message may be stored elsewhere. Typically, AT&T and Verizon keep cellphone text messages for only about 3 days. After that they are deleted from the carriers' computers. However, many companies store text messages longer to meet legal and fiduciary responsibilities. So if you're using a company phone, all your messages may be stored on the company computers. Zdziarski concedes that iPhones aren't particularly better or worse than other smart phones on the market in terms of the information they store. However, he does have some advice for consumers. "People need to be aware that that racy picture you took is still going to be on there even after you delete it," he warned. "So figure out what information is valuable to you, and don't put that on your phone." Follow John R. Quain on Twitter @jqontech or find more tech coverage at J-Q.com. |
|
1 members found this post helpful. |
|
|
#2 |
|
Member
Join Date: Sep 2013
Location: BLUEGRASS
Posts: 57
![]() |
dead on point, good stuff.
|
|
|
|
|
|
#3 |
|
Banned
Join Date: Mar 2012
Posts: 2,614
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
I just shit my pants........
|
|
|
1 members found this post helpful. |
|
|
#4 |
|
Omnis Vita est Aequus
![]() |
We aren't crooks.
__________________
Theres way too much incredible and awesome knowledge on ICMag, for anyone person to have the time to keep up with just a fraction of what this entire industry is doing. Politically, economically, medicinally, socially, recreationally changing the world, and eye salute you all, everyone of you, for helping make the world a better place, one grow at a time. Sat Nam |
|
|
8 members found this post helpful. |
|
|
#5 |
|
Banned
Join Date: Feb 2006
Location: gilligans island
Posts: 13,142
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
not suprising . I have the dumbest phones I can find. technology always backfires and can be used against ya too.i aint gonna make it that easy for anyone.
|
|
|
1 members found this post helpful. |
|
|
#6 |
|
Member
Join Date: Feb 2009
Location: Guantanamo Bay
Posts: 998
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Damn, what happen to pagers...Old school...
OP |
|
|
1 members found this post helpful. |
|
|
#7 |
|
Banned
Join Date: Feb 2006
Location: gilligans island
Posts: 13,142
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
pagers are out . for 40$ you can buy and activate and call from a phone from walmart over someone else wireless within 40 minutes. toss em at will. pagers would work ok but theres a serious lack of pay phones now adays lol. don't use a phone that's smarter than you . end of story
|
|
|
1 members found this post helpful. |
|
|
#8 |
|
Guest
Posts: n/a
|
This is all silly and pointless. Look at the information from the nsa leaks. They have backdoors into https and tor, the English and Americans have been collecting most of the data that travels, so they know what's going on here inherently. Times have greatly changed and I fear unless legalization comes a grower online's only defense is being a small enough fish that they don't notice you in this great big data pond. The nsa only keeps 5 days worth of storage atm. What happens when they can store a year or two of data and backtracking your internet behavior if you are a suspect for something becomes possible? I say this not as a tin foil conspiracy nut but as someone rational who gets the technology. There's no more hiding your with tor, or secure logins, or disposable email. If you want anonymity in today's web you better go buy a netbook with cash, never use it on any network you could be identified with, and never use it for anything but illicit activities. The only other option is hoping you're a very small fish in a very big pool.
|
|
1 members found this post helpful. |
|
|
#9 |
|
Senior Member
Join Date: Jul 2009
Location: Sanctum Sanctorum
Posts: 1,183
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
The correct phrase is: "I am not a crook". You need the right accent, to shake your head as you say it and to make the V finger sign, too.
|
|
|
4 members found this post helpful. |
|
|
#10 |
|
Omnis Vita est Aequus
![]() |
Sorry I don't understand. But I stand firm by the statement "We are not crooks" because this is a community that needs recognition and motivation/support from within and well as externally.
__________________
Theres way too much incredible and awesome knowledge on ICMag, for anyone person to have the time to keep up with just a fraction of what this entire industry is doing. Politically, economically, medicinally, socially, recreationally changing the world, and eye salute you all, everyone of you, for helping make the world a better place, one grow at a time. Sat Nam |
|
|
1 members found this post helpful. |
|
|
|
|