2 min read

Mobile Data of British Suspects to Be "Arrested"

Loredana BOTEZATU

May 18, 2012

Mobile Data of British Suspects to Be "Arrested"

Law enforcement has quite an arsenal to access personal data to chase suspects, but installing remote access Trojans to pry on users` online activity or simply sending a subpoena to the ISP is so out of fashion.

According to the official announcement issued by Radio Tactics, a company that specializes in forensic software, 16 London boroughs have been equipped with the ACESO mobile device data extraction solution, a piece of software that can extract call history, texts and contacts, as well as GPS positioning data in a pre-determined period of time.

This software is running on “purpose-built terminals” and will allow law enforcement officers to gather all relevant data and produce a print of it by simply connecting to the suspect`s phone.

“Mobile phones and other devices are increasingly being used in all levels of criminal activity,” said Stephen Kavanagh, Deputy Assistant Commission of the Metropolitan Police Service. “Our ability to act on forensically-sound, time-critical information, from SMS to images contained on a device quickly gives us an advantage in combating crime, notably in terms of identifying people of interest quickly and progressing cases more efficiently,” he concluded.

The ACESO software can extract data even if the SIM is PIN-locked, but the police needs to require a Pin Unlock Code, an action that is regulated by the Regulation of Investigatory Power Act (RIPA) and the Police and Criminal Evidence Act (PACE).

Despite these regulations, Privacy International has expressed serious concern over the system.

“We are looking at a possible breach of human rights law,” spokeswoman Emma Draper reportedly stated. “It is illegal to indefinitely retain the DNA profiles of individuals after they are acquitted or released without charge, and the communications, photos and location data contained in most people’s smartphones is at least as valuable and as personal as DNA.”

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Google Drops All Support for Android 2.3.7 and Older Google Drops All Support for Android 2.3.7 and Older
Silviu STAHIE

August 04, 2021

1 min read
A Heads-Up on Stalkerware, the Wolf Software in Sheep’s Clothing A Heads-Up on Stalkerware, the Wolf Software in Sheep’s Clothing
Silviu STAHIE

August 03, 2021

4 min read
NSA Releases Guidance on Securing Wireless Devices While in Public NSA Releases Guidance on Securing Wireless Devices While in Public
Filip TRUȚĂ

August 03, 2021

2 min read