Click to enable Adobe Flesh.
✅
Now you rent your own body monthly.
I do stuff, I have opinions. These are not necessarily my employers opinions. I think I'm funny.
I, like Mark Twain, believe that "Under certain circumstances, profanity provides a relief denied even to prayer."
I also believe that "Profanity is the crutch of the inarticulate motherfucker."
#fedi22 #infosec #shitposter #captainjustice
Web | https://captain-justice.com |
Pronouns | he/him |
Just My Toots | https://justmytoots.com/@cjust@infosec.exchange |
Signal | cjust.17 |
Click to enable Adobe Flesh.
✅
Now you rent your own body monthly.
The S in MCP stands for safety and security. This is all.
lol, people asking why admins blocked threads.
My brother in the void, that company has violated self determination, human dignity, and the marginalized.
Hell yes it was a preemptive block. Why wouldn’t you?
Acknowledgments
The greatest thanks belong to @JayeLTee , who discovered the leak, clearly recognised the severity and started the chain of events that led to the closure of the leak.
Special thanks to "Dissent Doe" of DataBreaches.net for reaching out to the Bozeman Police Department, who responded promptly by calling her to get IP addresses and details so they could investigate and follow up. They made contact with the state lab, who notified the police that they had just heard from the vendor and had unplugged everything while they investigated.
Thanks to the FBI and Bozeman PD for the prompt and professional contact. Beside them, no official that was contacted reached out.
I also wish to thank (in alphabetical order) Abraham, Andy, Ben, Cody, Dhruv, Emma, Frank, Harlo, Jeff, Jerry, JollyOrc, Judie, Royce, Russ and Rysiek for providing assistance. If I omitted someone, I apologise for the oversight. The communication turned into a frenzy on June 17th and some may have escaped the analysis for my PostMortem.
Closing Remarks
It is clearly necessary that we have at least one public contact in each country that investigates and closes data leaks reported to them. The effort to close even the worst leaks is unbearable and currently rests on the shoulders of security researchers and their supporting environment.
Time spent on this leak from my side (without the time for this report) is 12+ hours. My best estimate on the effort of all people involved closing this leak would be in the multiple hundreds of hours. The amount of time spent by the person responsible for the leaking system on security issues: None.
I assume the the leak is somehow tied to the DOJ Montana. This is not 100% sure, but i received multiple indicators that they are closely connected the leak.
There were more attempts to reach official contacts than documented here in the PostMortem. The list only includes those I could pinpoint with a reasonable degree of certainty.
I will not answer questions on how the forensics software works. This is out of scope for me. If you want to keep your phone safe: make it stay in the BFU state most of the time, choose a long and complex PIN, avoid cloud backups and do not install tracking apps.
I do not know if the share was writeable for everyone. This is also out of scope. Therefore I cannot say how difficult it would have been to manipulate an investigation. But my guess would be, that at least for a skilled atacker this would seem quite possible.
Purpose of the PostMortem is to provide an opportunity to learn for the affected party and those in danger of making similar mistakes. Futhermore I feel responsible to give all the people involved some closure.
Analysis
This is not a complete failure analysis. This are only my observations. A full detailed analysis is most likely to be even more shocking.
Failures:
Impact
It can be safely assumed (due to duration and easiness to discover) that all data on those shares is now in the hands of inttelligence services with non-friendly attitude towards the United States of America (e.g. Russia, China)
3/4
Timeline
**Update 3:** You can find my PostMortem here: https://infosec.exchange/@masek/114721620930871030 **Update 2:** As far as I can tell, the servers that caused the leak belonged to the DOJ in Montana. We reached them in two ways: - Through this post we got contact to the vendor of the software. With the Serial# (in the extraction reports) they could identify whom to call. - A friend had a contact in one of the affected police department and they reached out to the DOJ. Thanks to this community I was also able to get a contact within the FBI. Furthermore some media contacted me and a lot of Mastodon users provided me with additional contacts. Event though I contacted the AG in Monatana and one PD, no one has reached out to me from the DOJ side. **Update 1:** Leak is closed. Will write more tomorrow. Thank you to everyone who helped. **Phone forensics** Usually law enforcement is very secretive about them analyzing the phones of suspects. But a forensic lab in #montana is extremely transparent about it. They put the dump of every phone on a public share. Everyone with Internet access can access those dumps. While I am usually a proponent of government transparency, this takes it a bit too far even for my taste. Every phone dump is one directory and some case names can be easily connected to crime & death headline news in the U.S. So for one case I am pretty sure, that I can even say which Sheriff is responsible for that one of the investigations. I sent that Sheriff an email, i sent him a text message and I even spoke on his voicebox. I even sent him the extraction report from Graykey. It is really frustrating that I get no response at all. The leak is still open. The security researcher that found the leak also tried some contacts but had as little success as I do. I personally believe that this leaks even constitutes a federal crime. Some cases have names ending on CSAM. The security researcher stayed away from any of those and I did not access the files on that server at all. So does anybody know someone within the #fbi that would give a shit about that. I am getting very tired. #graykey #cellebrite #forensics