Ǵ

Hunting for evidence, Secret Service unlocks phone data with force or finesse

At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations.

A Secret Service agent waited for then-candidate Donald Trump during a campaign event in King of Prussia, Pa., on Nov. 1.

Carlo Allegri/Reuters

February 2, 2017

On July 20, 2014, a missing Conway, N.H., teenager walked back into her home, ending a heinous nine-month-long kidnappingordeal.

About a week later, police arrestedNathaniel Kibby at his home and charged him with the abduction. Duringa warranted search, investigators confiscated severalmobile devicesthat may have contained valuable information in the case.

But there was one smartphone they couldn't crack, a password-protectedZTE.That's whenNew Hampshire State Policeturned to the Secret Service, which has becomeago-tofederal agencyto helppolice departments with warrantstoextract data frompassword-protected smartphones and other devices for criminal investigations.

The Supreme Court has given Trump early wins. Now, it has to explain why.

The information on the ZTE contained "a huge piece of evidence," says Sgt. Michael Cote, a New Hampshire State Police detective.In May,Mr. Kibbypleadedguilty to kidnapping and rape, among other charges. A judge sentenced himto consecutiveprison termstotaling 45 to 90 years.

As smartphones are interwoven into daily life – collecting text messages, emails, phone numbers, photos, location data, and chat logs – they can be incredibly important to criminal investigators. And since many of the phones that police confiscate are locked by passwords or contain encrypted data, law enforcementagencies arelooking for new and creative ways ofgettingthatevidence out.

While some large metropolitan police departments may have resources to hack phones themselves,theSecret Service, part of the Homeland Security Department, has become a valuable resource forlaw enforcement unitsthat may not havestrong enough decryption tools.

To do that work, the Secret Service has been running its Cell Phone Forensics Facility, a10,000 sq. foot lab, in Tulsa,Okla., since 2008. TwoSecret Service agents workthere full time, aided bystudents and faculty at the University of Tulsa Cyber Corps Program. The facility trains federal agents in digital device forensics, invents its own hardware and software for parsing evidence from electronics, and uses thattechnology to examine40 phones a year from police departments around the country.

When the lab received the ZTE phone in the Kibby case, it attempted to open it by connecting forensic software that is designedto exploit specific vulnerabilities inaparticular device.Butit wasstill unable to get around thephone’s password.

Portland’s ICE office is already federally protected. So why is the National Guard needed?

After roughly a week, the Tulsa facility was able totake the device apart and pull the flash memory chip out to read the memory,said James Darnell, assistant to the special agent in charge at the lab. In this case, theSecret Service agents applied physical force to gain access to Kibby's ZTE.

The experts at the lab often have to get creative to crack phones. In another case, involving apassword-locked HuaweiH883Gphone, agents boughtmultiple copies of the same model and practiced carefully polishing off material from the back of the device with an automated sander.

Often, agents can apply heat to phones to open them up. ButHuawei built this particular model in a way that applying too much heat could damage its memory. So, agentssanded off material from the back of the Huawei H883G device to excise sexually explicit images for a case involving a different New Hampshire man.

A less damaging approach to getting into password-protected phones can ofteninvolveconnecting the device to special software designed to exfiltrate data.

In one case, agents used a tool known as the Cellebrite UFED Touch Physical Boot Loaderto obtain information from a Samsung Galaxy S5. The deviceis part of an ongoingfirst-degree murder case in Virginia. The productdeveloped byCellebrite, an Israeli firm that makes phone-cracking software, isdesignedtocopy the phone’sentire memory,Mr. Darnellsaid.

Typically, a devicetakes anywhere from a day to a month to break into, depending on whether Secret Service computer engineers need to disassemble the device and software to figure out how it was programmed.

Digital tools "simply do not go around the passwords on many phones," Darnell said.

,FBI Director James Comey described the problem of law enforcement's inability to access evidence on some phones that are encrypted as "going dark," meaning agents are unableto extractdata even with a warrant.

Perhaps the most high-profile example of this issue involved the iPhone used byoneshooter in the 2015 San Bernardino terrorist attack. The FBIobtained a court order to compel Apple's help to openthe encrypted phone. The company refused, saying its assistance couldeffectivelyweakensecurity for all of its customers. The FBI eventually opened the device with the help of an unidentified third party.

"Technical assistance in and of itself isn't of concern from a privacy perspective," says Gabe Rottman, deputy director of the Freedom, Security and Technology Project at the Center for Democracy and Technology.

"But to the extent that the Secret Service or the FBI or any other federal agency becomes kind of a gun-for-hire when you're talking about hacking into people's cellphones or computers or other electronic devices, it could become an issue, just as it starts to normalize that practice,"Mr. Rottman adds.

But manycybersecurity experts say theSecret Service's work on phone hacking is exactly what law enforcement needs to be doing to confront the "going dark" problem.

Watering down encryption on phones is "not a good path," saysDave Aitel, a former National Security Agencyresearch scientist who currently runs the cybersecurity firmImmunity."The path of hacking is much nicer – from a policy perspective."

The Secret Service is adamant that it examines phones only when a judge has issued a warranttoauthorities.It also does not refer to its work as "hacking" phones.

Fortunately for investigators, the data on both the ZTE andHuaweiphones that Secret Service agents worked on wasn't encrypted."If a device is using encryption at rest ... that could be problematic, especially if the implementation of the encryption is good,” he said.Encryption at rest protects data while it's stored inside the device.

The agency wouldn't say how many phones from which it can't access data.

When itcomes to breaking into phones, it's tougher to accessdevicesthataren't as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers don't waste their time trying to find design flaws in off-brand phones, they said.

"A cheaper phone that might be less popular, it seems like it'd be easier for the vendors to get into it," says Darnell of the Secret Service phone lab. "But it's actually quite the opposite."