Hacking Android, Apple smartphones in use by the Ministry of Internal Affairs: the fight against crime or total control of the population?

    imageI heard on the radio while driving in a car. And then he was not too lazy to find a link:

    Sverdlovsk police will soon be able to “crack” smartphones and tablets of the American company Apple: for this, the Borodin department will buy a special analytical complex for two million rubles!

    The State Department of the Ministry of Internal Affairs of Russia in the Sverdlovsk Region plans to purchase a unique complex for the investigation of Apple devices with a video analysis module for 2 million rubles, which will allow them to quickly solve crimes and collect evidence. This equipment will help you easily remove all data from any Apple devices, as well as smartphones and tablets running the Android platform. The complex will also help the Sverdlovsk security forces find out literally everything - points of movement, made and received calls, correspondence in social networks and instant messengers, photo and video materials. At the same time, even deleted data and data from secure stores such as iCloud, Dropbox and Android backups are susceptible to hacking and extraction, the newspaper Izvestia reports.

    In the near future, the department of Mikhail Borodin will purchase an analytical complex with licenses for ten software products worth almost 2 million rubles. It will include devices for recovering data from flash drives, hard drives of computers running OS X, iOS, Windows, Android. According to the technical regulations, the data extraction module will allow you to read information using a wired connection from any device. Moreover, the program will not matter if the device is locked or not. Such a complex is necessary for police officers to solve crimes and collect the necessary evidence.

    “This technique is necessary for use in forensic laboratories,” they told federal media reporters at the press center of the Main Directorate of the Ministry of Internal Affairs of Russia for the Sverdlovsk Region. - In the case of using Apple products for criminal purposes, this complex will allow an examination of the object for the presence of data relevant to the case.

    According to technical documentation, the complex should be able to open locked devices, including those protected by a fingerprint scanner, which are used by Apple and other manufacturers in smartphones and tablets. The complex will be able to receive complete information that is stored or previously stored in a computer or mobile device: contacts, photos, calls, information from the organizer about meetings, reminders, and read all messages. The system will need to be able to analyze photo and video materials, including skin tones, as well as stitch them into a single video. “The presence of a built-in interpreter of GPS coordinates, detection systems for images containing skin tones, and the analysis of key frames of video images of our own design,” the technical requirements are given in the document.In addition, with the help of the complex, police will be able to see a list of visited addresses on the Internet, receive passwords from identifiers from iCloud cloud storage (in the case of Apple) or accounts from an Android device. In addition, data from more than 400 applications, such as Apple Maps, Facebook, Google+, PayPal, Viber, WhatsApp, etc., can be accessed . Thus, investigators and operatives will theoretically be able to track the financial transactions of the criminal, his correspondence or his location for the desired period of time.

    “Complexes can be mobile and stationary,” said Nikolai Golubev, the official representative of the company-supplier of such systems, Oxygen Software. - In the first case, the complex has the form of a case with a display and a set of wires: this allows the employee directly at the crime scene or a search to get all the data on the phone. In the stationary version, the software is simply installed on a computer in the forensic laboratory.

    Moreover, according to the expert, the extraction of remote and hidden content from the phone and computer memory is only one aspect of the operation of such a system.

    “In the investigation of crimes, the chronology of actions and movements of the owner is usually much more interesting,” Golubev notes to Izvestia. - It can be tracked through the restoration of photos, geo-coordinates and Wi-Fi points to which the device was connected. There are many techniques, there are many sources of data, and such programs allow you to collect all this data in one place.

    According to investigators, the criminals are well aware that most of the crimes are now solved precisely by analyzing data on the activity of mobile phones, so they try to protect themselves.

    - Some are trying to secure an alibi before the crime - they leave a mobile phone for relatives or their friends to use it. It’s called “walking the phone,” one of the investigators of the TFR told reporters. - Therefore, data on the activity of a mobile phone is always subject to verification and only after that can become evidence in court.


    The office that is mentioned in the article really exists .
    I’m wondering, are similar analytical complexes developed jointly with smartphone manufacturers?
    Or just divorced the Sverdlovsk police department)

    Only registered users can participate in the survey. Please come in.

    Hacking smartphones armed with the Ministry of Internal Affairs


    Also popular now: