Advice: what to expect when authorities confiscate your electronics


It’s unfortunate that we have to consider these matters, but with governments worldwide obsessed with violating the privacy of ordinary citizens we found a well documented post which puts some flesh on what some naively view as skeletal paranoia.

In this comprehensive article Violet Blue of ZDNet outlines the tools and techniques government agents worldwide use to extract data from and plant spyware on your devices. The article has its genesis in the plight of David Miranda, whose devices were taken by UK authorities and by law can be kept for 10 days. They explain in some detail the types of intrusions which we can except should our electronic property be misappropriated by government, including hardware and firmware mods, certificate material addition, changes to software/apps, and of course data dump.

Perilous times indeed…

This entry was posted in documentation, encryption, people, security, surveillance and tagged , , , .

Comments

  1. Adrian says:

    I can’t see the UK spies making any changes to Miranda’s equipment.

    He’s not going to trust them when / if they’re returned anyway, so they won’t produce any valuable information. But they will be very closely examined .. if any changes are made it’s likely they will be found (because the people examining them are at least as expert as the spies), which will give away further information about the spies’ capabilities.

    Modifications made like this are only valuable if the owner doesn’t suspect the change has been made.

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notify me of followup comments via e-mail. You can also subscribe without commenting.