Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Cellphones Security Hardware

A Device to Grab Data From Cell Phones 161

what about writes "Apparently there is a quick, simple, and undetectable way to grab all of your cellphone data. CNet reports on the Cellular Seizure Investigation (CSI) Stick, developed for law enforcement but available to the public, which 'connects to the data/charging port and will seamlessly grab e-mails, instant messages, dialed numbers, phone books and anything else that is stored in memory. It will even retrieve deleted files that have not been overwritten. And there is no trace whatsoever that the information has been compromised, nor any risk of corruption. This may be especially troublesome for corporate employees and those that work for government agencies.' I use mobile knox, a secure storage application, for my important data, but I would be very upset if somebody grabbed my telephone list, SMS, or anything else from my locked phone."
This discussion has been archived. No new comments can be posted.

A Device to Grab Data From Cell Phones

Comments Filter:
  • *duh* (Score:1, Offtopic)

    Abby and McGee have had a copy of that for what... five seasons?

    • by GNUChop ( 1310629 )

      This device will never be used to solve a real crime. Cell phone companies already keep the required records for billing. This will simply allow TSA and other would be snoops to dig into people's private business. I had to laugh when I saw this:

      The good news: the device should find wide acceptance by parents who want to monitor what their kids are doing with their phones, who they are talking to and text messaging, and where they are surfing. It could also be valuable in secure areas where employees nee

      • by Anachragnome ( 1008495 ) on Saturday August 30, 2008 @03:07PM (#24812997)

        That is precisely the sort of crap they spooned out when Verichip tried to persuade parents it was a good idea to have their kids RFID chipped ("If your kid is lost or kidnapped, they can be located!").

        And that, my friends, was just the first salvo in the attempt to get people-chipping popularly accepted.

        As I once said, the day they start chipping people is the day I start offering my services to remove them and feed them to the migrating geese that pass through our area, in little balls of bread dough.

      • Re: (Score:3, Interesting)

        by Anonymous Coward
        Posting anonymously because i'm about to bash a company that specializes in digital forensics products.

        I've used this device, physically. Had the csi sticks in the lab and attempted to seize cell phone information via this device...

        Your data is perfectly safe. It couldn't acquire data from any phones more recent than 3 years old and even then, a quick click through your cell phone would yield just as much results. (doesn't retrieve deleted items).

        Put your tinfoil hats away, I've had better methods
  • Anyone have any doubts left about the importance of software freedom for all your devices?

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      I think its great. Theres now a way to copy DRM-laiden MP3s and ringtones from your phone.

    • by davolfman ( 1245316 ) on Saturday August 30, 2008 @01:02PM (#24812071)
      It's a failure of security through obscurity. The cell phone companies have concentrated so much on selling the syncing systems for absurd amounts that they never bothered to actually secure the interface.
  • I always knew that cell phones are vulnerable, but to know there is a device which can basically clone your data out, with NO trace, that's downright scary! Even when LOCKED? We should start reading our contracts and our EULAs on our phone, somehow, somewhere, there's got to be something to rely on legally, if this can happen.
    • Re:oye! (Score:5, Insightful)

      by plover ( 150551 ) * on Saturday August 30, 2008 @12:08PM (#24811549) Homepage Journal

      I always knew that cell phones are vulnerable, but to know there is a device which can basically clone your data out, with NO trace, that's downright scary! Even when LOCKED? We should start reading our contracts and our EULAs on our phone, somehow, somewhere, there's got to be something to rely on legally, if this can happen.

      Such a device is called a "computer", and many people already own one. By means of a secondary device, called a "USB cable", one can attach a computer to a cell phone and read the contents from it.

      If you read the "instruction manual" that comes with your cell phone, you can see plainly that a cable can be connected between the phone and the computer and the contents read from it. No phone manual I have ever read says anything about authentication of the USB cable connection. Therefore you have already been informed of as much as you need to know, legally.

      • Re: (Score:2, Interesting)

        by houbou ( 1097327 )
        Gee, I must have dumb written all over my forehead for you to write that, because, I know that IF I take MY OWN PHONE and I hook it up to my PC I can clone it. The article is about phones that can be cloned while locked. The lock feature isn't working as advertised, I believe that's the issue here. It can be easily overriden. There is software out there to do so, maybe that's what that original article was all about. My worries is that what's the point of locking your phone and someone can rip the data
        • Isn't it just a little bit naive to put your secrets in your phone and then permit untrusted people unmonitored physical access to it?

          • Re: (Score:3, Insightful)

            by houbou ( 1097327 )

            Uh.. gee, let's put imagination 101 to the test.. say for example, your phone is:

            1. locked, and
            2. lost or stolen..

            In real life, who the hell would locked their phone and maybe lose it uh? right? can't possible happen, that's way to fictional, going on sci-fi here..

            You would THINK your phone numbers and whatever else is stored, at least is somewhat safe, but wait.. not anymore.. if a company sells you a phone and says it's safe when it is locked, only for anyone with the right software to override the locked feat

  • by davidwr ( 791652 ) on Saturday August 30, 2008 @11:29AM (#24811203) Homepage Journal

    Phones without a data port are immune.

    Phones whose firmware will not send a particular piece of data over the data port are immune as long as the firmware isn't updated. Updating the firmware leaves a trace.

    This goes to show that in many cases, physical access is ultimate access.

    I see a market for "secure" phones where the data part of the data/charging port is disabled unless you plug in a key or type in a code. Many companies will gladly pay for such a device.

    • by linzeal ( 197905 )
      Physical access still is not going to break some encryption, what worries me is that phone companies are not allowing you to have that level of encryption for your contact list, SMS and other "proprietary" parts of the phone's logic.
      • Re: (Score:2, Interesting)

        Whilst this is getting better pretty damn rapidly with newer smartphones, I wouldn't have thought most phones would be able to handle that much encryption. Tis rather processor intensive, killing the battery. Although I guess they could add in extra hardware for the purpose, again killing the battery.

        For a lot of people phones should be basic things that make calls, send texts, and not die on them, enryption doesn't even enter their head. With the phone makers, it not about not allowing you to have strong e

        • Re: (Score:3, Insightful)

          by phoenix321 ( 734987 ) *

          We're not talking about a stream cipher that encrypts megabytes of data per second but phone number, a string with a maximum of about 15 digits, maybe more.

          And then the contents of SMS, again 160 half-bytes at max. I mean, these phone CPUs can decrypt tiny videos at 15fps and not break a sweat, come on, they CAN encrypt less than a dozen kilobytes without killing the battery.

          Then again, I'd rather recharge the phone every fourth day instead of every fifth when I can be sure that no one can clone its content

    • by Anonymous Coward on Saturday August 30, 2008 @12:34PM (#24811803)

      I see a market for "secure" phones where the data part of the data/charging port is disabled unless you plug in a key or type in a code. Many companies will gladly pay for such a device.

      You know what those "secure" phones are called? Blackberries. Go buy one today!

      On a blackberry, you can have all content on the phone strongly encrypted with AES. If your company has a blackberry enterprise server, you can even make this mandatory and prevent the user from disabling content encryption.

      If content encryption is on, then the blackberry won't send data via the data port or bluetooth until the password is entered. Enter the wrong password 10 times and the blackberry securely wipes itself.

      Despite the proliferation of mobile phones & wireless email, no one comes close to the blackberry platform for features & security. Not iphone, not windows mobile, not nokia. Some very smart people at RIM have looked at wireless email from end-to-end. The blackberry platform has also been audited from end-to-end by many governments and tech experts. What RIM really needs is a good marketing campaign to establish themselves as a "cool" brand.

      • by Anonymous Coward

        adds a whole new meaning to the term "crackberry."

      • by pdxp ( 1213906 )
        Sounds like they've got the software licked. Now if they would only make some decent hardware, people might start to believe the whole "cool" thing.
      • by SuperBanana ( 662181 ) on Saturday August 30, 2008 @03:44PM (#24813231)

        Despite the proliferation of mobile phones & wireless email, no one comes close to the blackberry platform for features & security. Not iphone, not windows mobile, not nokia. Some very smart people at RIM have looked at wireless email from end-to-end.

        Um- wrong. Blackberry wanted to get government contracts, so they went through all the government security requirements.

        You make it sound like this is some sort of rocket science. It's preposterous to suggest that only RIM has the talent to design a "secure" phone. It's not a matter of talent; it's a matter of whether or not the market demands it. We've seen it with the iPhone; after the initial crazy rush for v1.0, v2 has much more for enterprise users.

        What RIM really needs is a good marketing campaign to establish themselves as a "cool" brand.

        You incorrectly assume that RIM wants to compete in a "cool" market. Many companies purposefully restrict the market they target.

      • they need to adopt a moron urban vibe, maybe do a commercial with kanye west.

        yo, where you at, dawg?

      • Proprietary encryption, like any other proprietary software, is untrustworthy. You don't really know what you have or who can read the encrypted data when it's encrypted with proprietary software.

      • You smoke something really really good. There are so many issues with blackberry security that it is scary. To start - everything goes through their "cloud". They own your keys. What makes you think that there's no backdoor in there? If someone as big as IBM/Lotus Notes will put a backdoor in, can a small company like RIM, which actively targets the govt market, not put something in?

      • You know what those "secure" phones are called? Blackberries. Go buy one today!

        Hah! RIM doesn't even support it's own device security properly. Want to get your encrypted photos back off the device? Good luck! You have to downgrade your desktop software installation to a special old version just to do it because the later revisions that feature a Roxio application in place of the media manager don't seem to support decrypting photos.

        Just Google ".jpg.rem" to see the extent of the problem.

      • What RIM really needs is a good marketing campaign to establish themselves as a "cool" brand.

        They need to lose about 99 buttons too, the user interface and physical design are messes.

    • The connector on it looks like a Nokia handsfree connector, so it'll only work on those phones that have that sort of connector... and even then only those that have a data port there (very few in fact.. most have the data port under the battery these days).

      A single device that would get data off *any* phone is impossible - there are too many differences in them. You need a device per phone model, and even then you'd need the data format which is often proprietary (connecting to an iphone is totally unlike

    • Re: (Score:3, Insightful)

      by dotancohen ( 1015143 )

      I see a market for "secure" phones where the data part of the data/charging port is disabled unless you plug in a key or type in a code. Many companies will gladly pay for such a device.

      So long as the data port is not playing double duty as the charging port, take a screwdriver to it. That's what people in sensitive government jobs to the cameras in their cellphones. In Israel, it doesn't even void the warranty under most circumstances.

    • by Kanasta ( 70274 )

      since when were data ports standardized anyway?

    • I was kind of thinking of doing this myself.

      Finding out which contact(s) in the port are for data transfer, and wire in an INTERNAL (as in, have to take the fucking thing apart) switch to manually sever the data circuit(s). While I was at it, I was wondering if I could also hardwire a switch for the camera lense in case my phone ever becomes compromised (without my knowledge), it couldn't be used for visual snooping.

      Then I realized that my tinfoil hat would probably interfere with the transmission of such s

  • How much? Where? (Score:3, Interesting)

    by damn_registrars ( 1103043 ) <damn.registrars@gmail.com> on Saturday August 30, 2008 @11:30AM (#24811211) Homepage Journal
    Anyone know where I could pick one up? It could be useful for backing up my phone. I occasionally move my SIM card between phones (or multiple cards between my phone, depending on the need) and some phones drop certain things when they detect a SIM card swap.
    • by Fred_A ( 10934 )

      Anyone know where I could pick one up? It could be useful for backing up my phone.

      My thoughts exactly. It would be nice if it could also *write* to the phone though. Backing up without being able to restore isn't all that useful.

      • Re: (Score:3, Informative)

        by EdIII ( 1114411 ) *

        My thoughts exactly. It would be nice if it could also *write* to the phone though. Backing up without being able to restore isn't all that useful.

        It is a forensic product. Any product in that field that changes the evidence is worthless, therefore it is entirely appropriate that it does not write anything at all to the phones.

    • just plug it into your pc, this is just an automated gadget that speeds up the process.

      • just plug it into your pc, this is just an automated gadget that speeds up the process.

        Not all phones support all functions by plugging into the PC. Some barely even support charging through USB. If this gadget is as great as the summary claims, then it would be worthwhile for those phones that don't cooperate as well through USB.

        • Re: (Score:3, Informative)

          by barzok ( 26681 )

          Not all phones support all functions by plugging into the PC

          *cough*Anything from Verizon*cough*

          • how would verizon change what the hardware/firmware support. apart from getting moded informative for being a shot at verizon i doubt a network could change how the phone behaves when plugged into your pc.

            Also if a phone doesn't support a function when plugged into a pc how is it going to support it when plugged into a piece of hardware with only a subset of the abilities a pc has

    • Re:How much? Where? (Score:5, Informative)

      by GodBlessTexas ( 737029 ) on Saturday August 30, 2008 @01:08PM (#24812123) Journal
      Yeah, you can find it at csistick.com [csistick.com]. Price is $299 for the hardware + Device Seizure Lite software to access the acquired data.

      I have a couple of these at work, since my job is as a forensics investigator, and they're nifty, but they're very limited in what you can do with them since they only support Motorola and Samsung. There are better tools out there:
      PDA Seizure, Cell Seizure, Pilot-Link (Open Source), BitPIM (Open Source), ForensicSIM, etc.
  • Re: (Score:2, Insightful)

    Comment removed based on user account deletion
    • Re: (Score:3, Insightful)

      by andy1307 ( 656570 )
      I think they're talking about other companies(in the case of corporate cellphones) and unauthorized people(in the case of govt. cell phones) getting access to the data.
      • I think you could say.... Well thats what you get for using a phone as a data storage unit. We all know that once some one has physical access it's just a matter of time. So all this just showed us is that its a small matter of time. You want you data secured? Keep it on a secure server somewhere. Access it in a way that doesn't leave copies on your phone.

        • Re: (Score:3, Insightful)

          by Hyppy ( 74366 )

          You want you data secured? Keep it on a secure server somewhere. Access it in a way that doesn't leave copies on your phone.

          So, how does one exactly go about dialing a number without leaving a trace on the phone?

    • by EdIII ( 1114411 ) * on Saturday August 30, 2008 @12:25PM (#24811713)

      You completely missed the point. This is not about the employee being able to keep their actions private from the world, or even their own employer. It is about the company being able to keep their actions private from the world, which obviously includes the actions of all of their employees.

      It is a completely reasonable expectation, and indeed quite desirous by corporations, that an employee be able to maintain some level of privacy (and security) from the rest of the world. So when the article mentions that it is "troublesome for corporate employees" it is really talking about the implications for security for the entire company.

  • by curmudgeon99 ( 1040054 ) on Saturday August 30, 2008 @11:34AM (#24811253)
    How can anyone feign surprise at having your entire electronic life be compromised. If you have a device smart enough to keep up with several email accounts and manage them all, of course you've also opened up a pig portal. If you want to have secrets, fill your world with post it notes under desks.
    • Post-it notes under desks aren't very secure: as soon as someone has access to the desk, all your security is gone. Filling your world with a few hundred low-capacity encrypted SD cards or flash drives (all identical, of course), and each using a different password, would be secure: sure, you'd have to remember a lot of stuff, but even if someone gets their hands on all of them, they 1) wouldn't be able to crack the encryption, and 2) even if they were able to, they would have to crack it possibly hundreds
  • All phones? (Score:2, Informative)

    by gevreet ( 1295795 )
    Seems to only support motorola/samsung (and I suspect usb only) http://csistick.com/models.html [csistick.com]
    • So it doesn't support even most phones let alone all phones. Not even the common ones, even. Seems a bit of a waste.

    • Since I own a Samsung, it has settings to be recognized as a USB device. Plugged in with the right cable, my computer recognizes it.

      My guess is if the phone can be set up as a USB device, it can be breached.

      So I wonder when they will have one for the iPhone?

  • I wonder if those are the most common phones, or the easiest to mess with via the port?

    • Re: (Score:3, Insightful)

      by Tony Hoyle ( 11698 )

      Well it's missing the largest cellphone company in the world - Nokia - and within that the most popular phone in the world - the 3310.

      So no, they are not the most common ones. (You'd need Sony Erricson and LG in there as well for the popular ones, even if you limited it to phones in the last year or two).

      Possibly easiest to hack.

  • by Anonymous Coward on Saturday August 30, 2008 @11:39AM (#24811311)

    Then why is it so hard for me to sync my phone?!

    • Use a nokia and its not an issue.

      I've been using various Nokia S60 smartphones since 2003 and I've always used the nokia pc suite to sync outlook contacts and calendar with my phone. Initially the PC suite software was extremely flakey, but its improved a _Lot_ in the last year or so. Still leaks memory badly though...

      Yes this is a windows/outlook solution only, but it has worked extremely well for me. I get a new phone, sync with outlook, change sim cards and sync again.

      The PC suite software also lets m

  • by Doc Ruby ( 173196 ) on Saturday August 30, 2008 @11:40AM (#24811325) Homepage Journal

    In the US, we used to have this requirement that the government protect our rights:

    Amendment IV [wikipedia.org]
    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    Without probable cause and a legitimate warrant based on it, there is no reasonable search or seizure, no usable evidence. There's only an armed gang assaulting and violating their victim.

    A fancy new way to invade privacy is just an expensive and effective battering ram.

    • Re: (Score:3, Informative)

      by noco80 ( 1193081 )
      Actually, you should read up on your Supreme Court jurisprudence. The Court, led by Justice Thomas, has begun to read the text literally. If you notice, there is no requirement that a search be made after a warrant is granted. Instead, it protects people from unreasonable searches. WHEN a warrant is issued, that warrant must be based upon probable cause. Generally, it has been presumed that a search of an area where a person has a legitimate expectation of privacy is only reasonable when done pursuant
      • Re: (Score:3, Insightful)

        by Doc Ruby ( 173196 )

        Like I said: we used to have requirements to protect our rights.

        Clarence Thomas, as everyone not blinded by Republican loyalty knows, isn't a "Constitutional" justice. He's a rightwing pawn.

        Which is why he and his Republican Supreme Courts have tended to throw out the requirements that the government protect our rights. Including the long-understood requirement that a warrant be produced from probably cause to be reasonable.

        But hey, if you want a "literal Constitution", let's finally dismiss that standing a

        • by Xonstantine ( 947614 ) on Saturday August 30, 2008 @02:58PM (#24812939)

          Clarence Thomas, as everyone not blinded by Republican loyalty knows, isn't a "Constitutional" justice. He's a rightwing pawn.

          Statements like this is why you're a commie stooge, Doc. Clarence Thomas has been on the side of individual rights far more often than Ginsburg, Souter, Stevens, or Breyer.

          Kelo vs Connecticut...who sided with government power and who sided with individual property rights?

          Heller vs DC...who sided with government police power and who sided with an individual's right to self defense?

          Raich vs US...who sided with personal growth and consumption of marijuana and who sided with the government's prosecution of such under the Commerce Clause?

          As for the expectation of privacy when crossing the border, there has NEVER been an implied or explicit right. The US government has always maintained the power to search your belongings on entry. Your allegation that Thomas is somehow throwing out the Constitution with this decision illustrates your basic ignorance on the Constitution, Constitutional law, and Clarence Thomas...in other words, par for the course for you.

          • Re: (Score:3, Informative)

            by daigu ( 111684 )

            I notice you failed to address cases that support the parent's argument, perhaps the most obvious was Clarence Thomas agreement with the Bush administration regarding executive authority in Hamdi v. Rumsfield. Please feel free to outline an argument that indicates Clarence Thomas was not acting as - what does the right wing call it - an "activist judge" promoting an ideology over law. Also, for extra credit, add in a comment or two about Clarence Thomas and stare decisis and what that means in a legal syste

          • Re: (Score:3, Informative)

            by sgt_doom ( 655561 )
            Statements like this is why you're a commie stooge, Doc.

            Doc...a commie stooge???? Hilarious???

            Niggling points about Thomas are truly silly, as he is indeed a rightwing stooge, and the Justices, similarly to "our" senators and representatives, practice something known as "throwaway votes" (or decisions in this case), whereby the vote one way after ascertaining the way the majority is voting to appear to be politically rightwing, or leftwing or centrist. If your state has two senators of the same party - d

  • I think this should be highly illegal. What about the whole secure in your person, papers, and property bit? This is like copying all your papers and transactions for the past few months so that they can just look at them when ever! If the law enforcement needs this, it needs to be required by law that they need a warrant signed by a judge to use!

    On corporate phones/PDAs, it's completely impractical to say that you aren't going to have a data/charging port. You've pretty much have to have one. Now, initiall

    • Re: (Score:3, Insightful)

      by EdIII ( 1114411 ) *

      Do you mean the product should be illegal, or the act of using the product as it is intended?

      This is being marketed as a forensic product. The primary user of this device is going to be a forensic technician in the field. That usually implies crime scenes, etc. There are no problems legally in that context as the technician clearly has rights to be there, or is working in a lab on evidence.

      So the product itself is legal as any use in a forensic capacity does not violate the 4th amendment. There are quit

  • Synch vs snarf (Score:2, Interesting)

    Umm, why is it easier for them to steal my data than its for me to synch my phone to my computer? :(

    • Re: (Score:3, Funny)

      by russotto ( 537200 )

      Umm, why is it easier for them to steal my data than its for me to synch my phone to my computer?

      Because compliance with the government's requirements are enforced by large men with guns and the power to throw people in jail forever (ask Qwest's former CEO), and compliance with your requirements... isn't.

  • by SuperKendall ( 25149 ) on Saturday August 30, 2008 @11:57AM (#24811471)

    Of all the things you can worry about, this seems to be one of the sillier ones - a phone is one thing pretty much never out of sight or touch in public. How is anyone going to plug in anything without your permission?

    Look to your Bluetooth stack if you are concerned about data leakage.

    • Of all the things you can worry about, this seems to be one of the sillier ones - a phone is one thing pretty much never out of sight or touch in public. How is anyone going to plug in anything without your permission?

      Any occasion where you undress... Imagine having a sex-date, and while you have fun in the bedroom, an accomplice of your date is having it with your phone that you carelessly left on the coffee table.

      • Any occasion where you undress... Imagine having a sex-date, and while you have fun in the bedroom, an accomplice of your date is having it with your phone that you carelessly left on the coffee table.

        Nice fantasy life you have there, Mr. Bond.

        The rest of us won't be worrying about this....

        • Yes, indeed. In most cases, the perp would be more interested in rummaging through your wallet than through your phone... unless (s)he was trolling for phone numbers of hotties in your addressbook, hehe...
  • This is likely not be a casual things. It looks like the tool costs $200, and then at least $100 to read the stick. And while text data is going be easily acquired, the thing only has a gig of RAM. Enough to acquire all the data of a regular phone, but it is likely to choke on a smart phone with 4-32 GB or memory.

    Then of course it is only going to download at the speed of the phone, so it is in no way instantaneous. There is a warning on the product that says downloading an entire phone could take hou

    • Yes, there are excruciatingly easy ways to unlock certain phones without the password..

      When I got my first cell phone, a Razr V3C, I put a password lock on it, only to find out on the first try what if you power it up and then close the lid while it boots, it will simply not ask for your password, and you'll be in.

      Fantastic!

  • How many people are actually going to be running around stealing data by plugging a device into someone's phone. The only thing that I can see from this is someone actually writing a virus that can use the same program from this technology and add a simple mailto command, emailing all your data to them to use for statistics as well as more devious things.
  • Ok, so after RTFA, I'm a bit confused. What exactly does this device do that you couldn't already do with a laptop using bitpim and bluetooth or the correct usb cable for the phone??

    Sure, it's more portable, but it's still not so small that you wouldn't notice someone using it.

    • Nothing at all that I can see. And it's only for a limited number of phones at that.

      I'm sure it has a use in its field but to sell it as a general use device is just silly.

  • Why use something like that?
    Don't you know the super-secret-one-world-government PIN code? 0, 0, 0, 0, YES.

    It works in 99.9% percent of the cases.
    Those 0.1% must be used by some kind of hackers.
    You know... Like Keanu Reeves.

  • ...or can i sue them for copyright infringement or violating other peoples intellectual property rights when they steal my crazy frog ringtone?
  • I do have to object to the term 'undetectable', it's not wireless or something so as long as you keep your phone in your pocket nothing happens. That being said, i'd like to have such device for ehr... dunno, i want one !
  • by Anonymous Coward

    The device requires physical access .
    Warning ! If somebody stuck a device in my cellphone , I wonder if the hospital can remove it from their Arse or stomach . because that is where it would be, and I'm not Joking

  • I didn't RTFA, but does this apply to BlackBerrys too? I thought the entire partition on the phone was supposed to be encrypted.
  • by erroneus ( 253617 ) on Saturday August 30, 2008 @01:16PM (#24812201) Homepage

    http://csistick.com/models.html [csistick.com] -- Remember, before buying or recommending a phone, check this list to be sure your phone is not on it.

    • Sheesh! This device does NOT work on the V3 and V3r ( I have tested it with the latest firmware EVEN THOUGH They are listed on the site as supported. Grrr....
  • I'm sorry, but if someone runs up and connects something to my data port on my phone, I am pretty sure I am going to notice it.

  • From TFA:
    "It plugs directly into most Motorola and Samsung cell phones to capture all data that they contain. More phones will be added to the list, including many from Nokia, RIM, LG and others, in the next generation, to be released shortly."

    Ask anyone in the mobile forensics field, and they will tell you what a joy it is to have so many choices of software/hardware that can get data from every mobile phone out there. [/sarcasm]

    Take a look through the documentation of any of the mobile phone forensi
  • by Anonymous Coward
    All, 1. This device supports a VERY small list of phones. 2. Of the phones that are supported, the device rarely works. due to firmware diversity inherent in all phones. 3. You have a better chance of getting the data out of your phone using bitpim (www.bitpim.org). 4. The company that sells the device (Paraben) is notorious for making (and selling) poor software and feeding off the FUD (Fear Uncertianty and Doubt) of local PD that don't know better. It's stories like this that the company uses to se
  • ...is good at what it does, but isn't the real problem getting your hands on the cell phone at all? When it's not charging at home, it's usually in my pocket and you'd have to be a pretty good pickpocket to steal and return it. I don't usually leave it anywhere due to thieves, so what would you do? Break into the locker at the gym? Ask me to borrow it to make a call? If I had something sensitive on it I wouldn't unlock it and give it to you. If you steal it or have a warrant it doesn't matter one bit what y

Like punning, programming is a play on words.

Working...