" 'POOH -PHONE- POOH' "
ENCRYPTION AND ANALYSIS : Police and law enforcing agencies, just about the world over, can bypass encryption and monitor almost anything. The law is not keeping up.
Read My Phone, then?
Students/USERS can protect mobile phones by setting passcodes that restrict access. And not all the phones are created equal.
"Your best bet for default privacy is, hands down, getting a modern iPhone," says Mr. Adam Ghetti, a cyber-security expert. "There's no close second."
" YOU can tell me who you are," says Leeor Ben-Peretz, an executive at Cellebrite, an Israeli security-tech company. "But give me 15 minutes with your phone and I can tell you who you really are."
Mr. Ben-Peretz's office windows have a lovely vista of the low-slung skyline of Petah Tikva and the burnished mountains beyond, but the real view is on a large monitor in front of him.
A young engineer connects a smartphone to what looks like a desktop computer with several ports on the front. After a login and a few clicks, the computer identifies the phone type.
The user can then bypass the locked phone's passcode and continue to use one one of several extraction methods. "Logical extraction" reveals immediately accessible data : stored text messages, e-mails, pictures and instant messages.
With more time, Cellebrite's machines can also perform a "physical extraction", reveals more information, including data that may have been deleted. The neatly organised, labelled data can then be viewed, saved, shared, filtered and searched.
Police officers can also carry with them a tablet-sized device that does a basic device search - a sort of digital triage that lets them decide quickly whether a fuller investigation and extraction is merited. "Crime scenes in the past were about fingerprints and footsteps," says Mr. Ben-Peretz.
"Today it's digital : mobile devices, connected cars and tablets. Our digital footprint : this is the strongest indicator for what really happened."
The spread of such technology - more than 10,000 aw-enforcement agencies in 150 countries use Cellbrite's services - raises profound privacy concerns.
Most countries have laws offering people's homes protection from intrusive searches. But laws governing devices are not nearly so clear.
Cloud computing makes things even more complex. As Adam Ghetti, a cyber-security entrepreneur, points out, "The law and the constructs that it was built on were written at a time when everything you had was near you and could be touched."
That is no longer the case, he says. "The average human in a developed country has more data that they created in a faraway place than in a tactile place at home."
Cracking the Code
One response is encryption, which has grown from a niche market to a standard feature of digital life. As one veteran European intelligence analyst puts it :
"Encryption was dodgy when I joined. Now the modern economy runs on it. "WhatsApp, Signal, Telegram and Facebook Messenger offer end-to-end encryption meaning that messages can be read only by the sender and the receiver; they cannot be intercepted in transit, nor can the companies themselves read them.
The easiest way for law enforcement to read encrypted messages is to gain access to the phone of the sender or receiver.
The Honor and Serving of the latest Global Operational Research on Wireless, Privacy and Encryption continues.
With respectful dedication Technologists, Students, Professors and Teachers of the world. See Ya all "register" on : wssciw.blogspot.com -The World Students Society for every subject in the world and Twitter - !E-WOW! - the Ecosystem 2011 :
"' Cracks & Codes "'
Good Night and God Bless
SAM Daily Times - the Voice of the Voiceless
0 comments:
Post a Comment
Grace A Comment!