WeAreChange recently got a chance to meet up with Alex from Federal Jack and Hack Miami, to get the full story of his arrest and destruction of evidence by the Miami Police Department. Alex was arrested for merely filming the police in Miami, the police…
Police May Soon Be Able Check For Illegal Drug Use Via Breathalyzer Test
Imagine if this Swedish invention were to become a part of stop-and-frisk. US News and World Report
Ah, the social network. A Boston Phoenix story detailing law enforcement’s hunt for “Craigslist Killer” Philip Markoff reveals what Facebook sends to the cops when they subpoena your profile information (a topic about which Facebook has been very tight-lipped). What do the police receive? All of your wall posts and shares, everyone you’ve ever friended or defriended, every photo you’ve ever been tagged in (even if private or deleted), all of your “likes”, and your entire step-by-step history of activity, including every time you’ve viewed anyone’s profile:
POSTED FROM DISINFORMATION
Matt Brian writes on The Next Web:
It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.
The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.
In short, it can copy everything on your smartphone in a matter of minutes.
Learning that the police had been using mobile forensic devices, the American Civil Liberties Union (ACLU) has issued freedom of information requests which demand that state officials open up the data collected, to better assess if penalised motorists warrant having their data copied.