Law enforcement tool paves way for full data extraction on iPhones

Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9

Law enforcement agencies will soon have access to a tool that can breach a raft of the latest flagship smartphones including the most recently-launched iPhone models.

Using a newly launched tool, developed by data extraction firm Cellebrite, organisations like the FBI and MI5 will be able to breach any iOS device and a host of high-end Android handsets.

At a time where tech manufacturers are placing a greater emphasis on user privacy, the UFED Premium tool can be used to perform full file system extractions on their flagship devices.

Law enforcement agencies can then gain access to third-party app data, chat conversations, downloaded emails and email attachments, as well as deleted content. Moreover, the tool's developers promise to "increase your chances of finding the incriminating evidence and bringing your case to a resolution".

Advertisement
Advertisement - Article continues below

Smartphones vulnerable to UFED Premium include the Samsung Galaxy S6 through to S9 models, as well as "popular device models" from Motorola, Huawei, LG and Xiaomi. The tool also supports all Apple devices running iOS 7 to iOS 12.3.

With UFED Premium, law enforcement agencies can determine passcodes and perform unlocks for all Apple devices, as well as make use of sophisticated algorithms to minimise unlock attempts. Android devices, similarly, can be bypassed with ease, with users then accessing unallocated data to maximise the chances of recovering deleted items.

As an 'on-premise' tool, law enforcement officers can use the UFED Premium to extract data and infer results without the need to use any additional Cellebrite services, meaning it can be deployed at their discretion. 

But the company has given clients the option of using in-house services, provided by certified forensic experts, to gain access to evidence from locked, encrypted or damaged devices using in-lab only techniques.

Apple and other smartphone manufacturers have begun placing a much greater emphasis on user privacy and information security in their marketing to consumers. This has come at a time where the EU's General Data Protection Regulation (GDPR) hit mainstream consciousness, and large-scale data breaches regularly populate newspaper headlines.

The likes of Facebook and Google, for example, have also come under heavy public scrutiny for allegations of disregarding user privacy, the former in particular given the scale of the Cambridge Analytica scandal.

Manufacturers, therefore, are unlikely to approve of a tool that can be harnessed to break a fundamental component of their sell to the market. The conflict this could spark between tech giants and governments bears similarity to that which exists over end-to-end encryption.

The UK government, in particular, has been especially vocal about the need for tech giants to compromise the absolute privacy that end-to-end encryption offers. This is because, as politicians and law enforcement agencies argue, this allows criminals to organise freely through social networks, such as WhatsApp, that use encryption.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019