The Details Of What Information The Police Can Suck Out Of Your Phone
from the it's-a-lot-more-than-you-might-think dept
We've been troubled by a series of court rulings that have given police broad powers to search mobile phones without a warrant. California lawmakers tried to pass some legislation preventing such searches, but Governor Jerry Brown vetoed the bill to keep law enforcement happy.Of course, most people have no idea what the police can pull off of your phone when it's searched, but the ACLU has, thankfully, revealed some documents that ICE filed in a court case. It turns out they can get quite a lot. Using a single "data extraction session" they were able to pull:
- call activity
- phone book directory information
- stored voicemails and text messages
- photos and videos
- apps
- eight different passwords
- 659 geolocation points, including 227 cell towers and 403 WiFi networks with which the cell phone had previously connected.
Before the age of smartphones, it was impossible for police to gather this much private information about a person's communications, historical movements, and private life during an arrest. Our pockets and bags simply aren't big enough to carry paper records revealing that much data. We would have never carried around several years' worth of correspondence, for example—but today, five-year-old emails are just a few clicks away using the smartphone in your pocket. The fact that we now carry this much private, sensitive information around with us means that the government is able to get this information, too.The whole idea that law enforcement can search your mobile phone is based on the idea that they can search items in your possession. But that never took into account the digital record that is stored in your mobile phone that goes way, way beyond what someone in the past could effectively carry in a box or a bag or something.
The type of data stored on a smartphone can paint a near-complete picture of even the most private details of someone's personal life. Call history, voicemails, text messages and photographs can provide a catalogue of how—and with whom—a person spends his or her time, exposing everything from intimate photographs to 2 AM text messages. Web browsing history may include Google searches for Alcoholics Anonymous or local gay bars. Apps can expose what you’re reading and listening to. Location information might uncover a visit to an abortion clinic, a political protest, or a psychiatrist.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: details, mobile, privacy, tracking device
Reader Comments
Subscribe: RSS
View by: Time | Thread
Still one has to ask why the fuck does a phone need to retain 659 geolocation points, including 227 cell towers and 403 WiFi networks with which the cell phone had previously connected. SERIOUSLY? This is a problem in the software developing side.
[ link to this | view in chronology ]
Re:
Police State powers should not extend beyond a cursory inspection of the person's possessions. That means "item - one cellphone" and put it back down, not attempt to get data from it.
As for the question "why the XXXX does a phone need to retain..." it's really begging too many questions. The fact is that in retaining WiFi associations and cell-tower locations a phone is able to connect quicker. As for the 659 geolocation points, some of those were likely in the EXIF data on the stored pictures.
"This is a problem in the software developing side." No, this is not a problem at all, and tangential to the topic.
Seems to me if you "don't really care" about the topic, don't understand the technology, and just want to whine about "the software developing side[sic]" you should go back to what you were doing before your rant.
E
[ link to this | view in chronology ]
Re: Re:
I meant wipe, my bad. And you are right one would have to take preemptive action to wipe before any attempt to invade.
As for the question "why the XXXX does a phone need to retain..." it's really begging too many questions. The fact is that in retaining WiFi associations and cell-tower locations a phone is able to connect quicker. As for the 659 geolocation points, some of those were likely in the EXIF data on the stored pictures.
I didn't know about the cell-phone towers thing but you can turn off geotagging on pictures. I know you can wipe the saved wi-fi networks but I haven't seen a way to wipe all at once or limit how long they are stored. I think this could be solved by adding such options in an easy and available way?
Seems to me if you "don't really care" about the topic, don't understand the technology, and just want to whine about "the software developing side[sic]" you should go back to what you were doing before your rant.
I do care about the topic but the way I wrote it seems that way.What I wouldn't care is if my own cellphone was checked but I can see many reasons why one wouldn't want. I'll agree with you that I don't understand all about technology but am I that wrong to assume you can add ways to prevent such sheer amount of data from being stored for so long? Or even provide more visibility and power over such stored data? I did never know the phones keep cell towers stored. While the developers should not have to worry about it (nobody should be having their phone searched without a warrant) isn't it feasible?
I must apologize for the ambiguity of my comment though.
[ link to this | view in chronology ]
Re: Re: Re:
Your right let me see what other useful features I can turn off just in case that sometime in the next two years (lifespan of a phone) the chance occurrence I actually get pulled over for a traffic stop and that officer happens to be a douche and searches the content of my mobile phone... OR we could just say what this is, an illegal breach of security in their persons, e-papers, and effects (read: phone). The ONLY search that should be allowed by the Constitution without a warrant is... wait the Constitution didn't allow for any.
An Aside: I do believe officers should be able to search suspects for their own safety (IE, remove knives, guns, weapons to ensure their and public safety at a scene... but unless the next Galaxy S IV comes with a built in Taser phone should be off the table.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
This is what mobile phones are today, they store and process or help process a lot of information and to do that they need to be there with you, they also are starting to get a lot of sensors, like barometric sensors(that help with GPS), light sensors, even heat sensors.
Phones are a pre act to when we are able to decode the human code, those electrical impulses that run through ours bodies are the exact same type of info, is just they are not an attachment.
[ link to this | view in chronology ]
Re: Re: Re: Re:
Seems pretty clear to me we expect privacy in the contents of our phones. I hope this gets to the Supreme Court so they can put a stop to it (though I'm not confident they would).
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
Seems to me if you "don't really care" about the topic, don't understand the technology, and just want to whine about "the software developing side[sic]" you should go back to what you were doing before your rant.
E
Some people are born fools. Others have to go to school to learn how to be stupid. Which classy are you?
Not all software problems appear as software problems. Some software problems actually appear as social or legal problems. Having a phone track your ever move is a definite social and legal problem.
And as for your technical issues I guess that is what makes you so damn stupid as to believe that your technology should trump freedom, that man is a servant to the state because that how your damn technology works.
Your technology is broken!
[ link to this | view in chronology ]
Re: Re:
One, its always possible to brick your phone. In the case of most phones, it probably would take special hardware and software that most people don't have. But it's always *possible*. Also, I'm assuming just putting my iphone into restore mode is going to prevent them from accessing my data. Could be wrong tho.
Second, 400+ wifi points? 220+ cell towers? There aren't nearly that many cell phone towers near where I live. Probably like a dozen that my phone uses in the immediate area. I guess if he traveled a lot he could have use 200+ towers, but that doesn't change the fact that its highly unlikely that the phone has connected to 400 different wifi networks. That's a monster feat. Not impossible, just very unlikely. My phone has likely connected to around 20-30 different wifi networks. Where do you even find 400 different open networks, or know that many wifi passwords?
[ link to this | view in chronology ]
Re: Re: Re:
And 'restore/reset won't do anything to external memroy cache's and logs or the internal logs (as I explain below) either. Sorry
[ link to this | view in chronology ]
Re: Re: Re:
So where were you on the night of the xxxx... hmmm your WIFI logs state different.
[ link to this | view in chronology ]
Re: Re: Re: Re:
Odd that now that it is your phone doing it, rather that a car with strange gadgets on the roof, no one seems to care.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
And yes iOS devices save a lot more and for a lot lot longer
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
Woke up on the angry side of the bed today?
[ link to this | view in chronology ]
Re: Re: Re:
Regarding what someone else wrote about software to brick phones when someone attempts to break in. There is nothing like that. Of course, there is plenty of software that allows you to brick your phones normally, while in the process of tinkering, if you're not careful/knowledgeable about what you're doing. I've dealt with more than my fair share of "I fucked up my phone" type calls before (obviously made from another phone).
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re:privacy
would love some feed back on this please.
Thank you
Gracious
[ link to this | view in chronology ]
Re: Re:privacy
[ link to this | view in chronology ]
Re: Re:privacy
[ link to this | view in chronology ]
go bk 2 wat u were doin b4 ur rant
[ link to this | view in chronology ]
Information Cops can get out of your cell phone
[ link to this | view in chronology ]
Re: Sorry but thats not true.
[ link to this | view in chronology ]
Re: Re: Sorry but thats not true.
And yet you have Ehud above telling us that the phone keeps track of cell towers. I didn't even know about that and now I'm wondering if even a complete wipe would delete that data. You are right, there needs to be limitations to what law enforcement can do in this case.
[ link to this | view in chronology ]
Re: Re: Re: Sorry but thats not true.
As I state below in another comment, a reset will not delete that data and basically unless you actually root the phone and delete everything including the OS on the phones internal memory (and this can only really occur in Android devices) then no it will never be deleted.
And I wont tell you how much more info (including gps geo-locations for more than a few days) that cell/mobile enabled iOS devices store. Even if GPS etc is disabled (or could be)
If you need to keep data with you my best advice would be to use an actual USB stick v2.0 is only required (v3.0 USB is stupidity on USB sticks under 128Gig) and encrypt the data using something like TrueCrypt (Not the encryption tools you get from the manufacturers) that way your personal data, photos, etc can still be accessed if you require (you could also plug it into a phone using a patch cable) but its very secure unless your silly enough to give the password without a court order.
[ link to this | view in chronology ]
Re: Re: Sorry but thats not true.
[ link to this | view in chronology ]
Re: Re: Sorry but thats not true.
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
[ link to this | view in chronology ]
Re: Re: Re: Sorry but thats not true.
"secure in their persons" I don't feel 'secure' in my person if they are allowed to search anything I have on my person. as said above, I think they need to be able to take steps to make sure they are safe, removing weapons from a suspect while they talk with them, or arrest them, but that doesn't open up the right to search anything in sight
[ link to this | view in chronology ]
Re: Re: Re: Re: Sorry but thats not true.
[ link to this | view in chronology ]
Re: Re: Re: Re: Sorry but thats not true.
That's why I'll never own one.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
If they can get a warrant for it, they can get the texts from your carrier, they don't need the phone.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Response to: Ninja on Mar 1st, 2013 @ 4:03am
[ link to this | view in chronology ]
Re: Reply to Ninja, March 1
[ link to this | view in chronology ]
The only caveat is that it will take a couple of days until the old android market app is replaced with the current Google Play app.
[ link to this | view in chronology ]
Re:
Basically from someone who actually analyses and extracts evidential data constantly from all types of electronic devices Anything that you do (and even more so if using an iOS device - those are information goldmines) can and will most likely be forensically imaged to be analysed at length elsewhere.
The best security is actually android shape passwords (swipe a shape on touchscreen to get in) though even a password that is always on is the best defence under android devices. iOS devices - well professionally I love them, on a personal level, I try to steer everyone I know away from them
[ link to this | view in chronology ]
Re: Re:
This allows a few things that seemingly could be open to challenge in a court with the USA current methodology, namely chain of custody (authenticity) and reliability.
[ link to this | view in chronology ]
Re:
As someone who regularly tinkers with Android devices, I would suggest people interested in completely erasing info on their phone do the following:
Install either AeGis or Cerberus to their phones. Both allow you to remotely wipe your phone. (The former through SMS messages sent to it, the latter from a web interface or through SMS messages.)
Also, install a Custom Recovery (either ClockworkMod Recovery or TWRP). The reason for this is that it will allow you to boot into this custom recovery where you can manually wipe your phone. By which I mean, wipe it entirely. (So be careful using this, if you don't have a ROM zip file to flash afterwards you won't be able to do much with your phone besides turn it off and turn it on to boot into the recovery.)
The process for wiping manually is simple, boot into the custom recovery and select Wipe Data/Factory Reset. That's it, your entire phone will be wipe. Then, as is standard for "full wipe" standards (recommended when installing any new ROMs), select Wipe Cache. After which, you can go into Advanced and then select Wipe Dalvik Cache. (Usually this is done with just Wipe Cache, but it never hurts to go in and do this one in addition to Wipe Cache).
Once you've done all that, your phone will have literally nothing on it. (Keeping in mind that anything stored on the micro SD card or "SD card", and the reason I put that in quotes is because some phones have flash memory built in accessible as the "SD card" in lieu of having an actual micro SD card slot for use, WILL still remain on your phone.)
Now, in addition to that, you can simply get a Wipe All zip (of which there are many, and which needs to be tailored to your specific Android device) and just flash that in recovery. To do so you would just go into Install zip from SD card and then Select zip from SD card and locate the zip you wish to flash. (Per what I mentioned above about anything on the SD card's remaining intact, keep in mind there are flashable zips that WILL wipe everything including what's on your SD card. You just have to look for them and make sure it does or doesn't specifically wipe the SD card.)
Any of these would be a good idea for those wanting to keep data on their phones from falling into someone else's hands. If anyone needs specific information or links to the custom recoveries/flashable zips for a particular device or wants additional information regarding rooting/installing custom recoveries/etc just let me know. Try and be specific regarding your device model and current version of Android on it (also if you're rooted or not). I'm more than happy to help.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
Actually, it is realistic if you enjoy tinkering with your device the way a surprisingly large amount of people do. Check out www.xda-developers.com for proof of that.
Additionally, doing so and restoring your phone is in no way even remotely a hassle. The wiping process can be handled by a zip. Two clicks and you're done. Installing a custom ROM, ditto. Restoring your data (through the use of something like Titanium either once booted or with an "update.zip" in recovery is either a one-click batch restore process once booted, or two clicks to flash the zip file) is as easy and painless as can be.
As far as deleting your info once in cuffs, as long as your phone has a lock screen (either PIN or gesture based) you'll be perfectly fine. Assuming you'll use your phone call to call someone you know, who is more than likely someone you trust, you can ask them to remotely wipe your phone on your behalf. (The two programs I listed above allow for trusted parties to do so when provided with the proper code either before hand or after the fact. Both will accept text message directions to perform any of a number of features from wiping to locking to encrypting data. Only Cerberus though has the web interface, although I believe that might come to AeGis soon.)
I personally don't wipe/flash a ROM every few minutes or hours or day like some, but it's honestly a painless and incredibly easy process once you've done it enough to feel comfortable with it. First timers always take awhile and feel nervous, as they should since one mistake can wipe or even brick your phone if you're not careful or don't know what you're doing/flashing or wiping whatever comes your way, but things have reached a point where even doing a wipe/flash is one click. There are literally apps out there either available directly on your phone or for your computer that will do EVERYTHING for you with a few button presses or mouse clicks.
The best and most important thing in mobile security is making sure your phone has some kind of security enable to prevent easy entry. Like I said, a lock screen requiring either a pin number (preferably of more than four digits) or gesture based one are exactly what all people should have on their phones.
[ link to this | view in chronology ]
Re: Re: Re:
Our phone content is just as much private property and should require a search warrant from a judge to go through.
In the end this should not even be a debate in a "free" country, because anyone who says different is wrong plain and simple; unless they want to make police able to search houses at will, as well.
[ link to this | view in chronology ]
Re: Re: Re:
You can also initiate a complete wipe when USB is connected without unlocking the screen first, or on other triggers or combination of triggers you choose (such as moving the phone in a specific way). Tasker FTW!
[ link to this | view in chronology ]
Re: Re:hellllp
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Response to: Chilly8 on Mar 1st, 2013 @ 6:22am
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
So if you don't want to be tracked, don't have a phone!
It's not civilization, folks, when gov't and corporations invade privacy without limits: it's just same old tyranny with new high-tech police state. Slowly we're all being forced to go along with detailed computerized monitoring and collations.
The gov't can also now, with I think a $25 fee to Google, get "a hell of a lot more information than law enforcement could ever reasonably achieve in the past -- especially without a warrant." But you kids don't worry about Google because just everyday fact when you grew up -- er, at least physically matured.
BUT Mike, there's "no evidence of real harm" here! WHY are you the least bit cautionary? Beginning at last to see how affects you?
Take a loopy tour of Techdirt.com! You always end up at same place!
http://techdirt.com/
Where Mike's "no evidence of real harm" means he wants to let secretive mega-corporations continue to grow.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
WTF!?
Fuck Jerry Brown! and any other privacy crippling ass clown that thinks access to your personal effects - your phone - is their privilege and "right". Fuck you! Now and forevermore.
"Can I see your phone please?" What? You mean touch it? No. "Give me your phone." Fuck you.
Fuck.
[ link to this | view in chronology ]
I ask because looking at what is said these techniques require retention of the information or device to access/analyze. The search of the person doesn't allow for retention as far as I know - if they search you and see that you have a piece of paper with information on it, they don't get to take that and then photocopy it - they can see it, but not keep it as far as I understand.
Is this incident to arrest? That would be a different matter but then they couldn't retain anything or use it afterwards unless you were actually convicted is my understanding.
I hope someone can clarify this for me because it's a little foggy to me.
[ link to this | view in chronology ]
Re:
However, it is becoming more and more apparent that the police can come up with a reason to arrest anyone at pretty much any time.
[ link to this | view in chronology ]
Re: Re:
"In this particular case, ICE obtained a warrant to search the house, and seized the iPhone during that search. They then obtained a second, separate warrant based on probable cause before conducting a detailed search of the phone. "
Not quite a seizure during a routine traffic stop...
[ link to this | view in chronology ]
The police feel they have a right to access this because we have it on us. If we had a CHOICE on if we had this info on us, then I think the police ought to be justified in accessing it. But since it is involuntarily kept, laws should be enacted.
[ link to this | view in chronology ]
I wonder if there'd be a market for...
[ link to this | view in chronology ]
Re: I wonder if there'd be a market for...
Also: "please open that case sir we have a reasonable suspicion based on previous activity in the area that there have been drug transactions and we would like to ascertain that there are currently no illegal substances nor llegal devices within the locked container?".. ie: make it fully transparent to mitigate this response
[ link to this | view in chronology ]
Re: I wonder if there'd be a market for...
Cop asks for the phone, wipe it quickly before handing it over. It probably wouldn't stop an in depth search of the phone hardware, but I bet it would stop their little hacking tool.
[ link to this | view in chronology ]
How the heck could they not see this when they were deciding this issue.
It makes me sick! Mostly because they seem to think there are no bad policemen who will ever misuse this since they are, you know.... police. There are asshats in all professions and in all countries. Please stop pretending that it isn't so.
[ link to this | view in chronology ]
The border search issue is similar.
Legislation should be proposed that addresses both versions of this issue by excluding the data in devices from summary searches of a person or vehicle in every situation otherwise permitting such searches.
[ link to this | view in chronology ]
I think if we can find a way to outlaw the use of this intent of law doctrine it would go a long way to corralling runaway government interpretations of giving license to violate even the most basic of right to privacy. Your phone data especially ones text messages and other sensitive private information should be 100% completely covered by constitutional rights.
It pains me to even think that new law must be legislated to reclaim stolen freedoms and after all that public lobbying it was vetoed by the CA governor. I wonder if there would be enough support to override the veto in the Senate? Ya gotta be proud of the California House and Senate though they did their job well. (haven't read the bill so will give them credit)
And what about the police themselves? Why does the ACLU have to do detective work to discover what and how these violations occur? Why are normal officers acting like a secret police? Just observing the obvious brings up so many unanswered questions. Only well written law and carefully chosen elected officials will hobble rampant abuse.
Its embarrassing that the past 40 years of government has ignored the constitution both in poorly written law and shoddy enforcement practices. More shameful is the weak justice system unable to weed out unconstitutional laws.
It would be nice to to be able to program a phone so it would not keep the geolocation data and to prevent remote updates from happening. The wipe out of all data when entering a code would be nice too. This code would be given to the party doing the unwanted search and poof... all is gone.
I don't think I want a smartphone. Google is now banned from my machine.
[ link to this | view in chronology ]
I guarantee you they won't get a thing from mine.
[ link to this | view in chronology ]
Re: I guarantee you they won't get a thing from mine.
Hint: you're missing the point, old timer.
[ link to this | view in chronology ]
Re: Re: I guarantee you they won't get a thing from mine.
[ link to this | view in chronology ]
Privacy Phones
I'm not smart enough to know if it's even possible, but I'd buy one!
Imagine...making a phone call that's private.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Well...
But, on a more serious note, the two main issues (with cell phones) as I see them are:
A)
There are idiots in technology who feel that just because remembering a cell tower makes connecting faster, the cell tower should be remembered. They feel that, in every case, a technical understanding is necessary to reach an ethical conclusion, despite the fact that sometimes the two are entirely unrelated.
I'm a computer engineer. I write code. Real code. Not just squishy object-oriented nonsense that allows you to forget about voltages and relativity. However, I'm also aware that, if something I'm developing must choose between collecting personal information (time + location information I consider to be quite personal) or not, either the user should be informed this can be done in a readable manner (i.e. not in the Terms and Conditions), and allowed optionally (and revocably) to opt in, or the information should simply be silently not collected.
""This is a problem in the software developing side." No, this is not a problem at all, and tangential to the topic.
Seems to me if you ... don't understand the technology ... you should go back to what you were doing before your rant."
Seems to me, if you don't understand why that *is* a problem, you should stay away from the development of any and all technology.
...And the second problem...
B)
Users aren't told about this. They aren't given a choice. I've asked normal, non-technical people I know whether they're aware that, for example, many websites send usernames and passwords in a way that can easily be read by anyone else on the network. No one told them, and they didn't even know enough about it to realize that warranted checking.
Frankly, they shouldn't need to go out of their way to find out. When I go to a medical practitioner, I shouldn't need to know their job, and carefully review everything they do, to feel safe they aren't doing something unethical.
If they're going to prescribe me a medication, they should tell me the side effects. Of course, I'll look them up myself before taking the thing, but I shouldn't need to understand precisely how the drug works. Similarly, technologists should not expect everyone else to know our jobs; we should be responsible human beings.
If collecting information can speed things up, we should make sure we're only collecting the information of people who have expressed they would prefer speed over privacy, because if the pressure to be ethical doesn't come from within the industry itself, nothing will change.
When you know enough about a subject to understand when something is being done unethically, you are in a unique position, and it is your duty to object.
[ link to this | view in chronology ]
Re: Well...
Huh, didn't realize object oriented software isn't real code.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
want to whether on which time mobile was on or off can we get details?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Depending on what you mean by "exactly", yes. The phone company will at least know what cell the caller was using. If they're in range of other transceivers, their position can be determined more exactly.
[ link to this | view in chronology ]
iPhone 5s/5c recovery software
[ link to this | view in chronology ]
Privacy thru Slavery
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Put me back in my bag
They already took mine, due to my half assed suicide attempt this year. Sure, they gave it back but...
Why? Just....why? No damn sense at'all..
But like they say, "curiosity killed the cat"..well ...after 9 tries. Guess curiosity doesn't have very good aim or trapping skills.
I'm secure in my person. It's these other persons that get to me sometimes.
Shaking my head tsk tsk
Merry Christmas
God Bless Us Everyone
[ link to this | view in chronology ]
help
[ link to this | view in chronology ]
WHAT "PRIVACY"?
[ link to this | view in chronology ]
police invading MY phone?!?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
x
[ link to this | view in chronology ]
heloo
کارشناسی ارشد بدون کنکور-ثبت نام پیام نور-ثبت نام فراگیر پیام نور
[ link to this | view in chronology ]
[ link to this | view in chronology ]
hi
کفپوش- سنگ کورین-ورق و نمای کامپوزیت-نمای چوب
[ link to this | view in chronology ]
Search my phone is not important
[ link to this | view in chronology ]
Instagram
[ link to this | view in chronology ]
Cellular Carrier Data
[ link to this | view in chronology ]
اتوبار
Odd that now that it is your phone doing it, rather that a car with strange gadgets on the roof, no one seems to care.
[ link to this | view in chronology ]
Re: اتوبار
That is an opt in feature IIRC.
[ link to this | view in chronology ]
no message track
[ link to this | view in chronology ]
Re: Quote price
[ link to this | view in chronology ]
DirtyPoliticiansPeriod!
[ link to this | view in chronology ]