Criminals Remote-Wiping Cell Phones 191
An anonymous reader writes "Crafty criminals are increasingly using the remote wipe feature on the Apple iPhone and other business handsets, such as RIM's BlackBerry, to destroy incriminating evidence, the head of the UK's Serious Fraud Office Keith Foggon has warned. Foggon told silicon.com that the move away from PCs towards using mobile phones was causing a headache for crime fighters who were struggling to keep up with the fast pace of new handsets and platforms churned out by the mobile industry."
I can't be the only one on /.... (Score:5, Interesting)
Re: (Score:2)
I did. I thought hmm, I'd want all the data loaded from a CF card that would be set to wipe if either an incorrect or emergency password were entered. Heck, you could even have a secure CF card that was guaranteed to wipe once its emergency code was sent. Basically, you've got to reformat and copy from another card if you want to reuse it. Or if you really want to go scifi you could have the card and phone turn to dust once the emergency code is entered.
Heck,
Re:I can't be the only one on /.... (Score:4, Interesting)
Actually, if you slot a microSD card in a BlackBerry, you can set it up to encrypt the card along with the rest of the device, and it's scrubbed along with everything else if too many wrong passwords are entered in*
*The password and encryption is done device-side, so it even works in Linux.
Re:I can't be the only one on /.... (Score:5, Funny)
Re: (Score:2)
Indeed. And this has very little to do with the remote wipe feature. If I have access to a laptop, I can wipe the data there, too. If police get access to my smartphone, they should be able to turn on "airplane mode" and prevent anyone from wiping it.
In fact, it might be a bit suspect for them not to disable the wireless connection as their first act. Imagine if they confiscated your laptop and then immediately connected it to the Internet and left it connected. How could they claim to have secured an
Re: (Score:2)
Just days ago, I tried so hard to explain why insecure smart phone can be the most evil thing and one can simply own your real life, identity with it. That happens on a technical site. I just couldn't explain to iPhone owners why their data or simply the smart device itself matters.
There are also opposite camp of idiots who thinks running pirated antivirus with root access to their device is a security solution!
I think the "phone" in "smartphone" confuses people. If they understand it is a mini laptop with
Good. (Score:3, Insightful)
Re: (Score:2)
Err... How about kiddy porn on their phone?
News At 11 (Score:5, Funny)
Re:News At 11 (Score:4, Funny)
Re: (Score:2)
not even as newsworthy as what you ridicule (Score:2)
I actually RTFAd, and there's no evidence whatsoever in the article of criminals actually, you know, doing this sort of thing. It's a forensics expert saying that this cell phone feature "could be exploited by lawbreakers." Gee. And he even says it's not a big problem if it actually ever does happen as it's easily countered by any forensics shop: "He added the unit took precautions to guard against the feature being exploited. 'Because we isolate the devices immediately, and never reconnect them to their
Re: (Score:2)
And after commercial break: Criminals give new uses to existing technology! :(
photos (Score:5, Interesting)
Don't forget to view the photos. I thought the photos were more interesting than the article.
http://software.silicon.com/security/0,39024655,39270417,00.htm [silicon.com]
Encryption (Score:3, Insightful)
Here's an interesting bit too. Looks like they try simple password protection breaking, but...
The team does not attempt to crack high-grade encryption, relying instead on the threat of a prison sentence for individuals refusing to hand over passwords or decrypted files.
Re:Encryption (Score:4, Informative)
Except that a Vermont judge recently ruled [cnet.com] that password(s) contained in one's head are protected under the 5th Amendment to the United States Constitution. [wikipedia.org] just like any other information in your head. It was discussed right here [slashdot.org] on Slashdot.
As for threatening law enforcement officers: say nothing, know your rights, and keep your cool. The law enforcement officer is NOT your friend and you shouldn't speak to them or answer their questions. You have a right to remain silent and you should use it. BTW every attorney that I have ever heard opine on the subject has said that it is better to say nothing than to answer some of the questions but not others. Don't let them scare you into giving up your rights with their Gestapo crap. Remember, if they are questioning you, especially if they are threatening, then there is NO way that you are NOT going to be held (i.e. arrested) for a while anyway until the matter either goes before a judge or they have to let you go (48 hours max w/out cause before any attorney can force them to let you out), so don't be dumb and tip your hand right at the start. Also, remember that if you ever get your equipment back then you can never use it or those passwords again (who knows what bugs they may have planted before releasing it back to you). You basically have to wipe and start over on new hardware.
Disclaimer: IANAL so if you find yourself in a situation like the one above find yourself one that you can trust and let them do the talking, but remember that the police are NOT your friends.
Re: (Score:2)
Except that a Vermont judge recently ruled [cnet.com] that password(s) contained in one's head are protected under the 5th Amendment to the United States Constitution. [wikipedia.org] just like any other information in your head. It was discussed right here [slashdot.org] on Slashdot.
As for threatening law enforcement officers: say nothing, know your rights, and keep your cool. The law enforcement officer is NOT your friend and you shouldn't speak to them or answer their questions. You have a right to remain silent and you should use it. BTW every attorney that I have ever heard opine on the subject has said that it is better to say nothing than to answer some of the questions but not others. Don't let them scare you into giving up your rights with their Gestapo crap. Remember, if they are questioning you, especially if they are threatening, then there is NO way that you are NOT going to be held (i.e. arrested) for a while anyway until the matter either goes before a judge or they have to let you go (48 hours max w/out cause before any attorney can force them to let you out), so don't be dumb and tip your hand right at the start. Also, remember that if you ever get your equipment back then you can never use it or those passwords again (who knows what bugs they may have planted before releasing it back to you). You basically have to wipe and start over on new hardware.
Disclaimer: IANAL so if you find yourself in a situation like the one above find yourself one that you can trust and let them do the talking, but remember that the police are NOT your friends.
yeah right but its not 48hours in the uk anymore.....you try keeping quiet for 42DAYS
Re: (Score:2)
Here's an interesting bit too. Looks like they try simple password protection breaking, but...
The team does not attempt to crack high-grade encryption, relying instead on the threat of a prison sentence for individuals refusing to hand over passwords or decrypted files.
Yep, the Regulation of Investigatory Powers Act gives them that power. If they believe you know how to get access to something that they can't (eg. you know a password), you are obliged to tell them or you face 3 years in prison.
You'll note that the wording of the above paragraph turns "innocent until proven guilty" on its head. Furthermore, how on Earth can anyone prove that they have forgotten (or indeed never knew) a password?
There was another clause to the effect "tell anyone that you've been coerced
Re: (Score:2)
phil
Re: (Score:2)
OTOH, maybe there's a series of tubes in there.
Well... (Score:5, Insightful)
If the only evidence the police have on said 'criminal' is a string of bits on his cell phone, they probably didn't have much of a case anyway, and likely shouldn't be arresting this criminal.
I genuinely hope small time 'criminals' continue getting these sorts of victories to the point that our police forces are forced to admit they have failed in the war on consensual acts between adults. The change certainly isn't going to come about while our various wars continue to make a tidy profit for those at the top.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I imagine police forces would have a lot more cooperation on those things if so many people weren't worried that they'd turn on them for smoking the wrong thing.
Re: (Score:2)
Somebody who just won't stop sending you a picture of their wang?
What's wrong with a good Wang? [wang2200.org]
Criminals Destroy Evidence on iPhones? (Score:3, Funny)
...that could be used against them?
Honestly, if the only case the prosecution has is possible evidence on an iPhone, their case is pretty shaky to begin with. Do REAL WORLD investigation you Nazi-a-holes, not worry about virtual evidence that you might or might not be able to get to!
Re: (Score:2)
Agreed; they make it sound like such a hardship and yet they can't even point to a single instance of a criminal ever actually doing this (plus they name an easy fix in the first few paragraphs of the article). Gee, guys, think how hard it must have been for investigators before iPhones, when they had to actually look for physical evidence and talk to complaining witnesses in order to document crimes.
Laptops and cell phones for the paranoid (Score:2, Interesting)
If you are really paranoid, you'll want your laptop or cell phone to:
Communications crime (Score:2)
Data Recovery Much? (Score:2)
Re: (Score:3, Informative)
If you manually enable "Content Protection" on your BlackBerry, doing a Security Wipe will take on the order of hours, and will overwrite the data several times with different patterns to the point that it's not recoverable by anyone, even RIM (if you don't have that mode enabled, a Security Wipe will only erase user-specific information, and it would be relatively trivial to recover it).
If you're on a BES (meaning your BlackBerry was issued and is controlled by your workplace), your BlackBerry administrato
Does the iPhone us a HD? No, then your are an idio (Score:2)
We remote wipe our data in hands of criminals (Score:4, Interesting)
Sorry it sounds like a "In Soviet Russia" thing but it is true.
Symbian/WinMobile smart phones have tools to lock the handset remotely or in case of new Kaspersky antivirus/security or other 3rd solutions, you can remotely instruct phone to delete all personal data irrecoverably and lock itself. I am almost sure Blackberry, being an enterprise focused device must have similar option.
Once the Apple decided not to allow background running processes, they lost that possible solution. Not just they don't allow anyone to implement it, they don't implement it themselves too.
It is a completely fool safe thing. User sends a previously set SMS to device, device locks itself. Or in Kaspersky case, it doesn't just lock itself, it wipes its data and optionally transforms itself to a white hat (for you) rootkit/trojan and sends the number of first SIM card plugged to device to previously set number.
Re:We remote wipe our data in hands of criminals (Score:4, Informative)
Remote wipe is a feature of BlackBerry/BES and Windows Mobile/Exchange. No third-party software is needed, unless your phone isn't connected to a BES/Exchange server. When the phone receives the wipe signal, all data stored on the device will be wiped.
The iPhone has remote wipe, but I don't think it has encryption of any of the content stored on the device.
BlackBerry has content encryption and the latest Windows Mobile (6.1) has encryption for the entire user-writable storage area. The key is stored on the device, encrypted with a password. BlackBerry overwrites the key in RAM when the device is locked (that is, when the device is inactive for a certain amount of time or when it is placed in its holster); since WM's encryption operates at a lower level, the key does stay in memory while the device is powered on. Either way, cutting power to the RAM will erase the decrypted copy of the key. Both support encryption of storage cards as well.
As long as the device is set to automatically lock itself out and there is no way to bypass the lock screen [engadgetmobile.com], there's not a whole lot you can do to a fully encrypted WM6.1 device without resorting to a RAM attack [tgdaily.com] or finding a weakness in the implementation. Since the BlackBerry will erase the unencrypted copy of the key when the device is not active, it's secure against searching for the key in RAM, too.
Re: (Score:2)
I don't know about BES as much, but in Exchange, you can trigger the remote wipe function two ways. The user can do it by logging into Outlook Web Access (usually www.blarf.com/owa), hitting options, finding their device and selecting it to be wiped. The Exchange admin can also do it from the management console. You get a confirmation once the device is wiped, so you can delete the device from the "wipe as soon as it connects" list and repurpose if you recover it.
Exchange's wipe works because the device
I love my Treo (Score:3, Interesting)
I have a program on there that'll reformat the hard drive and zero everything else out, as well as disabling the SIM card, if I text it a certain phrase. Of course, it isn't all that helpful if whoever gets ahold of my phone just turns the radio off or removes the antenna so it can't receive that message, but I guess I have to count on criminals not knowing much about PalmOS since it's apparently a dying platform or something.
Re: (Score:2)
What program is that? (Link please).
I love the idea of being able to program my phone to self destruct if needed.
This way if my phone is ever stolen, I can immediately brick it.
Though fucking noogies (Score:2)
It seems that law enforcement sees itself as more and more godlike when it comes to assume power over mere mortals they are investigating. This arrogance has to be stopped dead, because if left to themselves, they will expect total compliance and disclosure upon request to anyone without any safeguard whatsoever against abuse.
We have to resist indomitably, in order to drive the point home that our information is not a plaything to be rummaged through at will; if the administration of justice suffers for it,
Re: (Score:2)
Have you reached the point yet, as I have, where the next person who says, "If you aren't doing something wrong, what are you afraid of" is liable to get a quick kick in the arse in lieu of an extended lesson in civics, freedom, rights and responsibilities?
Re: (Score:2)
For more than thirty years I have endured my sheep of parents getting shafted left and right, and whenever I wanted to point out they were shafted and that they happenned to have right, I was laughed-off.
Your phone is a honeypot. (Score:2)
Most of the UK's 'cell' tech came from ex Government Communications Headquarters workers.
It was designed on the lessons learned by the UK gov in 1970's in Ireland.
Interception, tracking, impersonation.
The idea that the UK gov ever lost this 'network' is really lol.
The work and deaths of Adamo Bove, head of security at Telecom Italia
and Costas Tsalikides, Vodafone's network planning manager in Greece,
show that all aspects of cell phone use are wide open to all.
Good, I'm tired of hearing cops complain (Score:2)
that the world isn't completely a police state, yet. Let them figure out how to fix their 'problem'.
Hmm - next feature set??? (Score:2)
Automatic wipe when certain *signals* aren't received periodically???
Maybe the crooks already thought of it...
If not - don't read this - my idea has been stored in printed form, in a sealed mason jar, under the front porch.
Highly specialized knowledge (Score:2)
186s? That will come in very handy if they happen to catch a criminal mastermind happens to be carrying around a BBC Master 512, Tandy 2000 or Wang Office Assistant in his pocket.
White paper on date deleting & recovery (Score:3, Informative)
Since every time something like this comes out all kinds of FUD pops up about data erasure, etc...
A classic paper on secure data deletion & recovery:
http://www.cs.cornell.edu/people/clarkson/secdg/papers.sp06/secure_deletion.pdf [cornell.edu]
Enjoy
Re:Woah (Score:4, Informative)
what do they mean by irretrievable:
destroying the filesystem table? (easy to get the data back)
writing all bits to zero? (still retrievable)
writing over all bits with (psuedo-)random data? (aparaently this can be retrieved)
writing over all bits repeatedly?
Re: (Score:2, Insightful)
on a hard disk you would be correct, try it with anything else and you get bupkis back.
Re:Woah (Score:5, Insightful)
Remember, this is flash, not magnetic bits stored on a spinning metal platter were header drift and other things would theoretically allow you to retrieve data that has long been removed.
Recovering from (intentionally overwritten flash) may be considerably harder than a traditional drive. Most flash recovery apps for cameras, etc. are really just reading the stray bits, as the formatting, etc. does not actually wipe each sector (because flash is rated in number of write operations the individual bits can support before going bad, so you want to minimize that).
Overwriting a flash storage partition on an iphone or other device also makes this harder because you can't easily pop those things open and mount the custom flash chip into some universal adapter and read its filesystem like you can do with any old hard drive (they even make forensic, read only, hard drive enclosures).
So I zero out the data on my iphone, and well, there aren't any jailbroken or app store apps that you can run on the damn thing to do a low level recovery anyway, and I don't know of any target disk raw access mode to the device when attached to a computer that is available outside of apple's developer labs.
Re:Woah (Score:5, Interesting)
you can't easily pop those things open and mount the custom flash chip into some universal adapter
Very very few devices use custom flash chips. The iPhone uses off the shelf standard flash memory chips. And in addition to readers that require the removal of the chip, there are units that have cables with clips that just attach right to the chip in the (powered off) device and can pull the data straight off.
And yes you can pop them open pretty easy. Some ipods are harder to open than an iPhone.
Re: (Score:2)
I'd be willing to wager all it does is offer features like "clear addressbook" which just resets the addressbook database.
In other words, fairly trivial to undo.
Re: (Score:2)
writing all bits to zero? (still retrievable)
How is that possible, I assume it's a hardware vulnerability?
Re:Woah (Score:5, Informative)
You have to use something like squid, but it's because of magnetic hysteresis. (I could explain, but Wikipedia is pretty acccurate.)
It's possible in theory, but in practice, it's technology that law enforcement doesn't have access to.
Re: (Score:2)
What does a caching proxy have to do with securely deleting files?
Re:Woah (Score:5, Informative)
For instance, say that anything above "0.5" (half of the full possible theoretical strength of the magnetic field there) is a 1, and anything below is a 0. Maybe, the drive would actually write "0.9", which would be correctly interpreted as 1. If that number was blanked, maybe it becomes "0.3"....low enough to be a 0, but maybe another detector could tell the difference and know what the original value was.
Re:Woah (Score:4, Interesting)
And there's probably a certain amount of hysteresis too, so maybe that 0.3 gets overwritten with a 1 to become 0.93, and then with another 0 to become 0.393, and you can recover previous values to a degree limited by the amount of hysteresis, sensitivity of the detector, and noise floor. Or at least that's the theory I've always heard on why you're supposed to overwrite hard drives multiple times... I've never actually heard of it being done, but the assumption has always been that 'they' have the ability to do it. Anyone care to provide more substantial information on the feasibility of this sort of recovery?
Re:Woah (Score:5, Interesting)
We had a guest speaker that told us some of what he does, he's a forensic analyst that pulls information from drives in criminal cases. He said that it takes somewhere around 72 hours to read a decent sized drive and costs around $10k to get it done.(It's been a few years so the details are fuzzy but that sounds about right)
But he wasn't too specific on what tools they use etc. Something around 10 full wipes is easy enough to recover the original data but if you write over it and delete actual data it becomes more corrupted and harder to get back than just all 1 then all 0.
Re: (Score:3, Insightful)
When I took my computer forensics class they showed that you could use a hex editor on a zero wiped floppy disk and recover most of the data that was on it previously.
Do you know how this is done? Because if one just uses a hex editor, wouldn't the hex editor simply see a disk full of nulls?
Re: (Score:3, Insightful)
yeah that sounds like BS to me, I'd like to hear an explanation too. The magnetic explanations people have posted above are far more consistent with what I've heard about data recovery from wiped disks, which all involved hardware -- I've never heard of recovery through software alone, and it doesn't seem plausible. A hex editor would obviously be able to "undelete" data that had been "deleted" in the normal way, but I can't see how it would get to data that had been nulled.
Re: (Score:2)
the 7 pass random wipe is generally accepted as sufficient
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
In a disk,the tracks have a physical size, and the heads don't always get to exactly the same position when they re-write the track. So if you write a data track, then overwrite it, the overwrite may be slightly to the left or right of the original, and a little bit of the original is not overwritten. If you then deliberately command the read to a small fraction out, you may get enough signal to pick up the deleted data.
To actually overwrite the data, I would guess you have to have one overwrite slightly to
Re:Woah (Score:5, Informative)
Modern hard drives pack bits *very* densely. The bits overlap by a large amount. The technology to determine whether a bit is 1 or 0 by calling everything above 0.5 a "1" is already necessary to read the bit *normally*. Writing random data to the drive is enough to make any active sectors unrecoverable.
However, modern drives have a huge count of spare sectors, and sectors get retired constantly, and there's no way to wipe those with normal reads and writes. So there's a random sampling of everything you've ever written stored in the retired sectors of a hard drive, and no in-band way to wipe those sectors.
The is why the government standard for hard drves that have ever contained classified information is to shred the hard drive so that the pieces fit through a 1mm sieve. Of course, in reality, the government is just as likely to sell the drives unwiped on Ebay, but that's bureaucracy for you.
Re: (Score:2)
However, modern drives have a huge count of spare sectors, and sectors get retired constantly, and there's no way to wipe those with normal reads and writes. So there's a random sampling of everything you've ever written stored in the retired sectors of a hard drive, and no in-band way to wipe those sectors.
Does anyone know, off-hand, a way to query a sata disk for at least a count of how many sectors have been re-allocated, if not an actual map of them?
Re:Woah (Score:5, Informative)
Does anyone know, off-hand, a way to query a sata disk for at least a count of how many sectors have been re-allocated, if not an actual map of them?
In linux, you can use smartctl (from smartmontools, I think)-- /dev/sda, and look for "Reallocated_Sector_Ct" in the output.
smartctl --all
Re: (Score:2)
Re: (Score:2)
Modern drives come with a huge number of spare sectors pre-allocated (nearly half for SCSI drives I think, giving them a longer life). Sectors fail in the normal operation of modern drives. Thanks to good error correction, this rarely results in data loss - less data loss than drives of 20 years ago, that you did want to toss on the first bad block.
The hard drive business is *very* competitive. The manufacturers go to extremes to increase density, including raming the density up so high that the failure
Re: (Score:2)
I strongly doubt they allocate that much space (as you claim) for spare sectors.
From what I see it's a small percentage - maybe at most thousands of spare sectors for hundreds of million sectors.
Just a google for complaints shows that people are already in serious trouble when their drive starts using hundreds of spare sectors.
Thus I think my current policy is safer.
As for SCSI vs SATA there is evidence that the failure rates are not significantly different (at least for recent drives):
http://labs.google.co [google.com]
Re: (Score:2)
One drive I studied had a policy of one spare sector per track plus one spare track per cylinder (this was a while back, when disks often had five platters). Which meant that performance fell sharply as the number of faults passed one per track.
Re: (Score:2)
You need to distinguish between sectors reallocated at manufacturing time, which are relatively benign, and those auto-replaced later. For the latter, I would mostly agree with you. One or two reallocations don't seem to be a problem, but as many as five have usually shown a drive on its last legs.
Re:Woah (Score:4, Interesting)
any tool that accesses the drive's smart data can get this. the drive has to be directly connected to the computer, you cannot read smart via usb or firewire bridge. All drives track a small set of smart data including reallocated blocks. Most drives have additional smart parameters whose meaning varies.
Re: (Score:2)
The technology to determine whether a bit is 1 or 0 by calling everything above 0.5 a "1" is already necessary to read the bit *normally*.
It's all about size. The drives pack data as close as something that can fit in the drive and be powered by a computer can do and still get an accurate threshold value while spinning the disk at 7.2KRPM. Now, take the platter out of the drive (in a vacuum, or clean-room environment) and hook it up to a STEM or similar. You'll find that the accuracy of the analogue signal improves a lot.
Often you can do well simply by replacing the controller. The thresholding is done in the ADC, which is on the bottom
Re:Woah (Score:4, Interesting)
First, ever had a magnet accidentally come into contact with your TV? Ever tried to fix it with another magnet, and deemed it "close enough"? There you go. You are a floating head. Your TV is a disk platter.
Second, hand in your geek card.
Re:Woah (Score:5, Informative)
Go to Options-Security Options-General Settings. Enable password and content protection. Set the security timeout and password attempts to your preference. Now, when the timeout expires (X minutes after you stop hitting buttons) or you hook it to a PC, it asks for a password. If someone types in the wrong password Y times (10 is default, but you can go lower), it forces a reboot, and scrubs down the memory, which takes 20 minutes to an hour.
To force the scrub, go to Options-Security Options-General Settings. Click the menu button, select "Wipe Handheld", type blackberry.
Send me a PIN message at 244EB7DA if you need a hand.
Re:Woah (Score:5, Informative)
PS: For remote wiping, you need to be on a BlackBerry Enterprise Server (BES), which usually means your BB is company-issued. If you need it nuked, call up your admin and ask him to trigger the remote wipe. Keep in mind that the BES can (and usually does) track anything and everything that happens on a BES-connected BB, so a wipe will do nothing to hide things from your company.
Re: (Score:2)
It is nice that RIM releases a free registration code to use with ONE blackberry. I have an Exchange setup here with BES tied in. It's nice how much you can actually do remotely. Everything from remote application install, to remote lock/change pin, remote wipe, etc.
Not that I ever lose my phone in bars like people do with theirs. like socks, but it's reassuring knowing all this can be done if it does ever get out of my reach.
Re: (Score:2)
so a wipe will do nothing to hide things from your company.
Plus it might seem just a little suspicious when you call the admin and ask them to wipe your machine.
Re: (Score:2)
Send me a PIN message at 244EB7DA if you need a hand.
I would, but I just wiped all my data and deleted the PIN...
Re: (Score:2)
Re:First POST (Score:5, Insightful)
I'm glad these articles focus on the negative facts that police have trouble with, and not the USEFUL part of remote data wipe so that millions of customers data can be deleted when a device is lost, instead of having that information in the hands of people that could do some damage. I'll take a wipe of evidence for that security any day.
Re:First POST (Score:4, Interesting)
if the cops had any brains they would shut off the phones (remove battery) the second they get it and then give it to forensics that should have the IQ to operate it in a faraday cage so that it cant be tampered with remotely. Do they take laptops and PC's they capture and hook them to the net and turn them on? Why do they connect phones to the network when they look at them?
Come on, I though they taught the police how to handle evidence. Are you telling me that CSI tv show is a LIE!!!!
Re: (Score:2)
Removal of battery is feasible, since most of the information of interest is stored in flash, but it doesn't work for all phones since a few uses ordinary RAM and a backup capacitor, which effectively will wipe the phone completely if the battery is removed for too long.
So you have to know the phone to take the correct measures to allow the forensic team to have something to work with.
Re: (Score:3, Funny)
Re: (Score:3, Funny)
The idea made me curious. I just wrapped my phone (mobile) in a rather large ball of aluminum foil. I then called it. Err... It still rang. I don't have any scientific evidence to say why, how, or all that but it rang. I obviously couldn't answer it.
Re: (Score:2)
The frequency you are using on your phone is very high, any tiny gaps in the foil will allow the signal in.
Carefully wrap the phone in foil, make all seams double folded, creased and taped and then wrap it again that way and try again.
Re: (Score:3, Interesting)
Re: (Score:3)
If it's truly a proper Faraday cage for the frequencies involved, it doesn't matter if the object and the cage are electrically separated or not -- it'll still work. This is a function of Gauss's law [wikipedia.org].
In this case, either the aluminum foil wasn't thick enough, or the gaps in it were too large. A cell phone is generally pretty sensitive, so even if you reduce the signal by a factor of one million, it may still be able to pick it up.
Re: (Score:3, Funny)
NOT A SCIENTIST... So... I was curious. The dimensions were *about* 8" across with the phone in the center. Since I have had people tell me to drill holes in it. I will try that next.
Re:First POST (Score:4, Funny)
Re: (Score:2)
Will ground in the morning.
Re: (Score:3, Interesting)
Wrapped carefully and it did not ring. :)
Re:First POST (Score:5, Insightful)
Not to mention right near the top of the ARTICLE ITSELF:
"Because we isolate the devices immediately, and never reconnect them to their network, the remote wiping capability does not present us with much of a problem," he noted.
Um, so the problem is? Talk about sensationalism.
Re: (Score:2)
"Because we isolate the devices immediately, and never reconnect them to their network, the remote wiping capability does not present us with much of a problem," he noted.
So, law enforcement is deliberately keeping my company from protecting it's customers' data? Great. My customers will feel much more secure knowing that their data is safe in some random evidence locker in some random town than having it be gone.
Re: (Score:3, Interesting)
I suppose if you are an organized crime syndicate, yes, they are interfering with your business plan. Perhaps you should inform all of your employees, er... henchmen, to please refrain from leaving their iPhone at any crime scenes they have created.
Re: (Score:2)
No doubt. They should have said "Remote wipe is useful in situations such as..." and then link to all the stories we've seen about lost laptops in the last year.
Re:First POST (Score:5, Informative)
It was added as part of the 2.0 firmware upgrade.
http://www.apple.com/iphone/enterprise/ [apple.com]
eatures include:
* Push email
* Push contacts
* Push calendar
* Global Address List (GAL) support
* Certificates and identities
* WPA2/802.1X
* Enforced security policies
* Cisco logo More VPN protocols
* Device configuration
* Remote wipe
No different (Score:2)
Than leaving incriminating notes or phone numbers written in a book. Instead of flipping through pages they dump your sim card. If you're going to do illegal things then don't leave anything tangible.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The Humourous Fraud Office are mostly known as the people you call if you buy a pet which, when you get it home not half an hour later, turns out not to have been just resting at all, but in fact to be stone dead and nailed to the perch.