From a Telegraph story today:
Apparently this was first introduced in 2012, yet US authorities claimed they couldn’t access the phone of a gunman just a couple of years ago.
Admittedly, it isn’t clear from the article whether they need a user password to access the data.. but the implication is no user consent is required. It is also reported as being used for very low level crime, both from suspects and victims.. and the data taken isn’t selective, it’s bulk.
Any IT bods here know more about this kind of technology, and if the police have it, do criminal gangs have it yet?
Recently Browsing 0 members
No registered users viewing this page.