What to do before turning device over to law enforcement? - General Questions and Answers

A friend's daughter died a couple of years ago. At the time the death was ruled accidental overdose. Long story short, the police and coroner didn't investigate much of anything and what they did, was shoddy. The case was closed and friend was able to take possession of two of her daughters android phones, one was on network, other just used on wifi. Friend does not have any of the passwords and can't get into them.
Since then, new evidence was discovered that shows close to 100% she was murdered. The police however have refused to reopen the case. Friend has tried everything and recently started a Facebook group (#AnswersForMeagan) as a last resort. Group has taken off and much more info discovered. They are getting a lot of attention so today the Sheriff called my friend and they will be meeting soon.
That said, the sheriff didn't know of the two phones. Friend is obviously apprehensive about turning them over, afraid they could botch things up again, or even intentionally mess up the data (there are indeed bad folks corrupted by the money of trafficking and drugs). This is SC. Is anyone aware of a good place that can get into the phones and minimally save off a copy of the data? If you were doing this, what would your process be?
I used to root my android back in the gs3 days. Before that I actually had a palm Pre. I'm IT, I know my way around well, but I haven't fooled with things for several years. Worst case I can help the friend with the right process, but I'd rather a current professional do it.
Strange question and kind of way off topic, but I used to come here all the time and know someone will have advice. If you're interested, come join the group on fb.
Thanks,
Chuck

If on phone MTP mode is enabled and phone supports a USB-C connection then it should be possible to retrieve user-data stored on phone.
MTP functions a lot like USB mass storage. For example, an MTP device shows up in Windows Explorer so you can browse and transfer files.

Related

[Q] New to smart phones, but 2nd charge

Hey all, so far cool site. So long story short, I bought the charge last Wed. Got it home and started to play with it. I'm no programmer or a computer guy, but I tend to learn quickly. The phone came with a 25 dollar gift card for the media hub (which is a joke, for another thread). I down loaded 2 movies via wifi. Neither move would play. Ended up, it would play any video file. Also, it wouldn't load some of the apps that came pre-installed. I took it back Sunday and the swapped it out. The new phone seems to work great. Really, I couldn't be happier. The one bug I have is with the 4g, but it isn’t the phone but more Verizon. I’m in Austin TX and apparently the sales person forgot to mention that Austin doesn’t have 4g yet, and wont for a few more weeks.
As for the phone, I do have a question. When I’m searching or loading a page I see that the arrows under the 3g disappear and is replaced with a D. At this point it stops loading the page. I’m guessing this means something like Disconnect? Usually it’ll only last for a few seconds and then the arrows come back and the page will load. Is this a signal issue or what? Is there anything I can do to speed things up? I have a buddy that is more advanced at this kind of thing and wants to jailbreak it. I’m not to sure I want to do that. If something happens and I need to take it in (I’ve got insurance on it) I don’t want Verizon to say they can’t help because I did something. So, besides that. I look forward to reading this forum, if I have any questions I’ll let you know.

How would one go about disabling/enabling when a phone can and cannot be charged?

I have a very unique situation.
I dropped my phone in the trash at work(IT Company), accidentally one day, and a small amount of disturbingly gross liquid managed to make it's way into my phone.
I wiped it down, made sure it didn't smell like crap - etc.
Everything worked FINE at first, I said ah, good. Apparently it was not not good.
Now, the phone gets stuck in a loop where it thinks to itself it's charging for a second, then it's not, keeping the screen on and flashing the charging notification repetitively until it decides to stop for an hour, then come back.
Radioshack screwed me over BIG TIME on my phone insurance, I filed a ripoff report etc, and given I need my phone for work related issues I really cannot afford to have any downtime having it be sent in and repaired. NO, I cannot receive an immediate replacement, and NO, I cannot afford another phone.
So, therefore I come to you, my great friends at XDA.
I've a fairly decent background in programming, I understand the just of it. I've taken classes in ASM(Microcomputer Architecture and Programming), C/Java and Python.
And no, I'm not a college-fed programmer, I've been programming in VB, C/C++, PERL etc. since I was 13(22 now.)
So, to the specifics:
My phone is a Samsung Transform Ultra, Android 2.3, rooted and running a "ROM" if you could call it that, but it shouldn't make that much of a difference(just installed it to get rid of CIQ)
Now, I've never wrote a mobile app before but I have the android SDK (1.6-4.0), and I'm fairly certain I could get a hello world going in a matter of minutes.
I'm willing to do the research myself, I just need some good pointers and some people who might be able to answer a few questions along my journey, and when the app is done I will be releasing it in full, yes, to you XDA.
Programming costs time, replacing the phone costs money. I have more time than money.
Best regards!
Bump.
Any help on this issue would be GREATLY, GREATLY appreciated as this is quite possibly the most angering issue imaginable.
I don't know if this will help, but I had a similar problem with my galaxy S. It turned out to be a tiny piece of silver paper that had managed to get into the micro usb slot. A quick shake later and problem solved.
Sent from my GT-I9000 using XDA App
thebotnet said:
I have a very unique situation.
I dropped my phone in the trash at work(IT Company), accidentally one day, and a small amount of disturbingly gross liquid managed to make it's way into my phone.
I wiped it down, made sure it didn't smell like crap - etc.
Everything worked FINE at first, I said ah, good. Apparently it was not not good.
Now, the phone gets stuck in a loop where it thinks to itself it's charging for a second, then it's not, keeping the screen on and flashing the charging notification repetitively until it decides to stop for an hour, then come back.
Radioshack screwed me over BIG TIME on my phone insurance, I filed a ripoff report etc, and given I need my phone for work related issues I really cannot afford to have any downtime having it be sent in and repaired. NO, I cannot receive an immediate replacement, and NO, I cannot afford another phone.
So, therefore I come to you, my great friends at XDA.
I've a fairly decent background in programming, I understand the just of it. I've taken classes in ASM(Microcomputer Architecture and Programming), C/Java and Python.
And no, I'm not a college-fed programmer, I've been programming in VB, C/C++, PERL etc. since I was 13(22 now.)
So, to the specifics:
My phone is a Samsung Transform Ultra, Android 2.3, rooted and running a "ROM" if you could call it that, but it shouldn't make that much of a difference(just installed it to get rid of CIQ)
Now, I've never wrote a mobile app before but I have the android SDK (1.6-4.0), and I'm fairly certain I could get a hello world going in a matter of minutes.
I'm willing to do the research myself, I just need some good pointers and some people who might be able to answer a few questions along my journey, and when the app is done I will be releasing it in full, yes, to you XDA.
Programming costs time, replacing the phone costs money. I have more time than money.
Best regards!
Click to expand...
Click to collapse
One maybe possible solution maybe... (free app) (need root)
Hardware Disabler
The though is, in order to stop that you are going to have to disable the actual USB port. You are going to have to play around and find out what driver corresponds to that USB port ... good luck, let me know if it helped.
(Yes I made that app)

Help I need to protect my wifi, cell and laptop

In March, my sister in law and I found out that we were being “followed”, and that “someone” had it in for her and that her car was marked and there were/are pictures and videos of the both of us. Not too long after we were warned about that, she found a flash drive that was blinking in the computer at her home and took it and went to work and plugged it in and it was recordings of conversations we had in her car. To narrow it all down quickly, her husband was tracking her car, hacked into our cellphones and my home laptop computer, I also had found a recording device under the daybed in my bedroom. I had realized that things looked different in my home when I would come home and once my neighbor across the street told me my dog was out and that he chased him down and put him back, -there is NO WAY he could have gotten out unless someone opened the gate. A spare key was in our garage for our son in which his brother would come in while we were at work (our thoughts is to retrieve the device download it and put it back), but nevertheless we were invaded, seemingly for over a year. So I am trying to find out how to find if I am still being hacked (cell and laptop), how to block help myself from being hacked again, how to protect my wifi (i got my own separate one from our house one), and how to make use of the programs I have purchased as a result of being stalked in such a manner.
I now am in constant paranoia over my electronics and I need help. I have several questions to cover a variety of areas dealing with this situation and I truly and desperately need help. I have downloaded tutorials and have familiarized myself with some things, but I would like to speak to an expert.
If you can help please message me.
Michelle
Mimi44 said:
In March, my sister in law and I found out that we were being “followed”, and that “someone” had it in for her and that her car was marked and there were/are pictures and videos of the both of us. Not too long after we were warned about that, she found a flash drive that was blinking in the computer at her home and took it and went to work and plugged it in and it was recordings of conversations we had in her car. To narrow it all down quickly, her husband was tracking her car, hacked into our cellphones and my home laptop computer, I also had found a recording device under the daybed in my bedroom. I had realized that things looked different in my home when I would come home and once my neighbor across the street told me my dog was out and that he chased him down and put him back, -there is NO WAY he could have gotten out unless someone opened the gate. A spare key was in our garage for our son in which his brother would come in while we were at work (our thoughts is to retrieve the device download it and put it back), but nevertheless we were invaded, seemingly for over a year. So I am trying to find out how to find if I am still being hacked (cell and laptop), how to block help myself from being hacked again, how to protect my wifi (i got my own separate one from our house one), and how to make use of the programs I have purchased as a result of being stalked in such a manner.
I now am in constant paranoia over my electronics and I need help. I have several questions to cover a variety of areas dealing with this situation and I truly and desperately need help. I have downloaded tutorials and have familiarized myself with some things, but I would like to speak to an expert.
If you can help please message me.
Michelle
Click to expand...
Click to collapse
If it is someone that is close to you, such as your sister in law's husband, it's gonna be hard because they have direct access to your hardware. The only thing I see fixing this situation is to involve law enforcement or some kind of measures to physically keep them away from your hardware. It's virtually impossible to protect the hens from the fox when the fox is inside the henhouse with the hens. It only works when the hens are on the inside and the fox is on the outside, if you understand what I'm saying.
Your biggest security threat in what you describe is a physical real world one, not an electronic or software one.
If he knows what he is doing and has physical access to your hardware, software and electronic safety measures won't help you because he could just bypass it.
If your issue was someone from the outside that doesn't have physical access to your hardware THEN software and electronic measures would give you a decent safety net. But in your situation I seriously doubt those measures will help you any.
Focus on the real problem.....HIM.
I DO NOT PROVIDE HELP IN PM, KEEP IT IN THE THREADS WHERE EVERYONE CAN SHARE

VERY IMPORTANT: Need HELP Removing INVOLED Spy Prog (Long but interesting challenge)

Recently I found that someone close to me had been using a purchased spy prog. Thanks to Google alerting me that unauthorized login and sync occurred.
I quickly recognized the phone found the program and cancelled their membership since I originally made the account/email address for them and they told me what password to use. But somehow that phone has continued to sync from their phone.
To this point I've been being safe; I've been messaging or texting lies along w/ truth. Yet somehow all that information makes it back my a simple slip up of words by the other 2 ppl in house. They accidentally repeat in general something I mentioned in text/fb message/phone call/information/etc.
I've literally deleted everything I could find that was left after factory reset. (EVERY FILE!!) I had root and end up with a virus I couldn't remove & didn't want to factory reset. The virus took over screen and no matter what I couldnt get it off. In the end, only way phone company could get it off was access with use of a computer & prog to factory reset. While talking it updated from 6.0 to 7.0. So I'm going to have reroot.
QUESTION FINALLY: How to can I emove the hack or exploit ( or whatever it is) that is reporting or cloneing everything word & information? Yes, I've tried every possible virus/spy pro/spyware/malware/hack/exploit detector remover I read about. PLEASE advise.
The person( I suspect) is currently charged with domestic violence w/ prejudice, I cannot drop the charges they won't allow me. Due to it being domestic violence against someone disabled (me).
**SIDENOTE/QUESTION FOR LAWYERS. The Person was somehow released without bail and i was ordered to leave the house with literally NOWHERE wheelchair accessible to go?? The reason, I suspect snitch (for lack of better word), the Magistrate had already set the bail then a judge on SATURDAY OF A HOLIDAY WEEKEND changed it. Also its hand written, dunno whose initials are on it cant read them. I've NEVER nor has my victims advocate heard of that. I pay slightly less than 3rd of whole house payment accord to other person on the mortgage. I do not qualify for disability only pathetic SSI. The person is more than likely trying to find something negative on me. They have threatened to have me evicted untold times! Im an entirely different person after nearly dying 2 times and was close a 3 rd. That along with being on a ventilator 3 times...if that doesnt change someone you have a serious problem on and finally being in a wheelchair. All caused by a neurological disease. Might I mention I found an old sound recorder that goes with a spy cam according to one specialist and one genius old friend (haven't found hidden cam.YET!) in my room. I do *man* things in the room I pay for. Thought it was illegal to record with sound. Hell or without a person knowing considering by law I'm a tenant**
The person is beyond clueless about technology but their brother worked for govt many yrs ago installing, none other than CAMERAS. He now prides himself as being a computer expert & dev.(he's not bad). He knows LINUX exceptionally well.
Quick Question...should I go ahead with rooting or wait?
PLEASE HELP AND IF POSSIBLE FIND THE FOOTPRINT HE MIGHT HAVE LEFT BEHIND. PRIVATE MESSAGE ME IF NEED MORE DETAILS ON PHONE INFORMATION OR IF A LAWYER (I live in TN)
Galaxy S7 with exynos chipset.
Did have root until att updated after
removing weird virus. Will Root soon.

How could this person be locating my devices?

I'm sure I'll get some haters, who think I am simply nuts but this is a REAL problem that I've got to solve.
For the last 6 years I've had a mysterious stalker and hacker, who renders most of my and my family's devices nonfunctional and breaks into my accounts and generally makes my life much harder. It has recently come to light that it isn't a hacker SINGULAR but at least 3 guys, hellbent on destroying me: my daughter's father, her uncle, who is a military hacker and their friend, who managed to ingratiate himself with me, until my daughter's father confessed, when I confronted him with evidence against him and his brother, saying he didn't mean for it to get this out of hand. Well, thanks for the heads up but it's a little late, because it IS this out of hand and the wheels of justice grind slowly.
Meanwhile, I am still hacked, even worse now, because his brother got out of the military and moved back to town and has a lot more time and access now. Calls and texts are being intercepted so frequently, that I now use Google Voice/Hangouts to communicate, knowing that nothing I say is ever private but at least people get my messages and I get their calls that way.
I'm looking for a job and I need a device that he won't be able to spy on, so I went to Best Buy and purchased a phone card and moderately priced android phone and took it home to resume my job hunt. I planned never to call any of my usual contacts with the phone but just use it for work stuff. Within hours, it was acting buggy and when I restarted it, it did not go to the regular black screen that says "your device is encrypted for security" but showed my regular background and said "please enter your password when starting android". On my note 8 and 9, that would often happen and when I went to security options, secure startup would be disabled. I checked and secure startup was still supposedly enabled. In ADB "adb shell getprop ro.crypto.state" returned "unencrypted".
I returned the phone and purchased a Google Pixel, hoping their physical security device MIGHT be more effective than Knox at protecting me from this guy. I purchased a brand new sim card and spent another 50 bucks on a phone card, from a different company.
Since my daughter's father has moved within a half-mile of me (despite having no contact with her and very little with me) 4 times now, I speculated that he was, perhaps, using a directional yagi antenna to scan my area for new device beacons and then (skip forward a few steps) find out what apps are installed on those devices, to determine if they are mine. With that in mind, I never even turned the Pixel on at my house.
That night, I took the phone to a random emergency room with secure wifi, to which I know the password and proceeded to set it up. I made a new google account, as usual and installed a bunch of random apps, such as black dating apps (since I am white, I figured that, if my theory was right, it might throw them off my scent) and games I would never play and apps for banks of which I am not a member. By the first time I restarted the phone, still at the emergency room, it had the exact same problem. It purported to be encrypted but (adb later verified) it was not. Apparently, the cheap phone faired slightly better than the pixel, in this department, because the first one was reencrypted upon reset, while the Pixel was not. I never activated or inserted a sim card in the pixel and while I had my regular phone and tablet along with me, they were powered off, in the car.
I was pretty sure, after the first phone was compromised, that I was onto something with my beacon frame theory but it would not explain what happened at the emergency room, unless there is a tracking device in my car, which IS likely, because I continually find my car torn up in all sorts of ways. They even broke off the panel on the driver's door with lock and window switches and the lid of my center console and I continually find the carpet pulled away from the trim. Then again, they also put something caustic in the wiper fluid tank, which destroyed both tank and windshield, so it could also have all been done simply out of malice.
Having no better ideas, I ran a bug detector over my car and found that there IS a radio signal being emitted from somewhere around the gearshift or cd player. I took apart the area around the gearshift and found nothing. In that department, the only remaining possibility is that they've actually put something inside of the cd player itself, the screen of which quit working a while back. I have the ribbon cable to fix it, so maybe I'll get lucky when I crack it open in a bit. The signal DOES appear strongest at the CD player but it could be anything, even catalytic converters can emit radio signals.
Assuming my bug theory is wrong, does anyone have any other idea of how these guys could have discovered and hacked those phones? I've got to find a way to evade these people or I'll never have anything like a normal life, until they're finally in jail.
Wow!
I have not heard of such hacks, even when it comes to national security.
What is the motive of these three people ?
I have no clue but with there skill in not sure an iphone would fare much better

Categories

Resources