RE: [Fed-Talk] Response to Higher over The "Apple Tracking"Headlines?
RE: [Fed-Talk] Response to Higher over The "Apple Tracking"Headlines?
- Subject: RE: [Fed-Talk] Response to Higher over The "Apple Tracking"Headlines?
- From: "Moore, Dallas T." <email@hidden>
- Date: Thu, 21 Apr 2011 17:17:20 -0400
- Thread-topic: [Fed-Talk] Response to Higher over The "Apple Tracking"Headlines?
I think the overall point is this: the data is being generated by iOS
and stored on the devices and in backups. There are multiple ways for
that information to be retrieved - whether the device phones home to
Apple (which I've heard happens), someone accesses the device remotely
(via an app or other access method), the device is hooked up to a
forensic tool like the Cellbrite, or someone accesses an un-encrypted
backup on a computer...
Which then brings us to the question... why is the data being generated
in the first place? If it's used for geo-tagging pictures or used in a
location based app (Foursquare, etc...), then that's ok, so long as the
user accepts that part of the device/app functionality (which most do).
If the device or your workstation is sending the information back to
Apple because they want it... then what use does Apple derive from such
a data set?
__________________
v/r
Dallas Moore
703.495.6573 - Office
571.499.7371 - Mobile
703.495.6680 - Fax
http://dea-st
-----Original Message-----
From: fed-talk-bounces+dallas.t.moore=email@hidden
[mailto:fed-talk-bounces+dallas.t.moore=email@hidden] On
Behalf Of Villano, Paul Mr CIV USA TRADOC
Sent: Thursday, April 21, 2011 5:07 PM
To: Rimar, Lee D Mr CTR USA USACE USA
Cc: email@hidden
Subject: Re: [Fed-Talk] Response to Higher over The "Apple
Tracking"Headlines?
But you keep saying physically has the equipment. Nothing I've read says
that. Since the data is unencrypted the mapping software would make no
sense then. As I understand it the Iphone or 3G Ipad *transmits* the
data triangulated from cell towers based on the presence of the phone at
any moment. Supposedly it's not going to Apple or anyone in particular.
But the software posted online by a former Apple employee can capture
that info, map it & track you. It has nothing to do with the info at
rest on the phone (except that it's written unencrypted there, too).
That's how I'm reading the articles & why I brought it up in the first
place reference Soldiers.
On Apr 21, 2011, at 4:09 PM, "Rimar, Lee D Mr CTR USA USACE USA"
<email@hidden> wrote:
> Moore, Dallas T. wrote:
>> Individuals with a Cellbrite UFED (or similar) can still extract the
data directly from your phone.
>
> Cellbrite UFED (or similar): A forensic tool that requires physical
access to the device. Presents a completely different range of issues
than the location database.
>
> Bottom line, if someone gets has your phone, they have your data. Not
just the rough locations database, but everything else in there also.
So you have to train people to safeguard this piece of equipment at
least as well as computers and documents.
> _______________________________________________
> Do not post admin requests to the list. They will be ignored.
> Fed-talk mailing list (email@hidden)
> Help/Unsubscribe/Update your Subscription:
>
il
>
> This email sent to email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
ov
This email sent to email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden