cross-posted from: https://lemmy.world/post/40009551

https://www.404media.co/man-charged-for-wiping-phone-before-cbp-could-search-it/

A man in Atlanta has been arrested and charged for allegedly deleting data from a Google Pixel phone before a member of a secretive Customs and Border Protection (CBP) unit was able to search it, according to court records and social media posts reviewed by 404 Media. The man, Samuel Tunick, is described as a local Atlanta activist in Instagram and other posts discussing the case. The exact circumstances around the search—such as why CBP wanted to search the phone in the first place—are not known. But it is uncommon to see someone charged specifically for wiping a phone, a feature that is easily accessible in some privacy and security-focused devices. 💡 Do you know anything else about this case? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at [email protected]. The indictment says on January 24, Tunick “did knowingly destroy, damage, waste, dispose of, and otherwise take any action to delete the digital contents of a Google Pixel cellular phone, for the purpose of preventing and impairing the Government’s lawful authority to take said property into its custody and control.” The indictment itself was filed in mid-November. Tunick was arrested earlier this month, according to a post on a crowd-funding site and court records. “Samuel Tunick, an Atlanta-based activist, Oberlin graduate, and beloved musician, was arrested by the DHS and FBI yesterday around 6pm EST. Tunick’s friends describe him as an approachable, empathetic person who is always finding ways to improve the lives of the people around him,” the site says. Various activists have since shared news of Tunick’s arrest on social media.

The indictment says the phone search was supposed to be performed by a supervisory officer from a CBP Tactical Terrorism Response Team. The American Civil Liberties Union (ACLU) wrote in 2023 these are “highly secretive units deployed at U.S. ports of entry, which target, detain, search, and interrogate innocent travelers.” “These units, which may target travelers on the basis of officer ‘instincts.’ raise the risk that CBP is engaging in unlawful profiling or interfering with the First Amendment-protected activity of travelers,” the ACLU added. The Intercept previously covered the case of a sculptor and installation artist who was detained at San Francisco International Airport and had his phone searched. The report said Gach did not know why, even years later. Court records show authorities have since released Tunick, and that he is restricted from leaving the Northern District of Georgia as the case continues. The prosecutor listed on the docket did not respond to a request for comment. The docket did not list a lawyer representing Tunick.

  • Greg Clarke@lemmy.ca
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    2
    ·
    2 days ago

    What would be really cool is if also started streaming both cameras and the microphone. And changed your background image to be pro Trump.

    • med@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 days ago

      what would be really cool is if it binned the storage keys for one user and not the other, silently. That way you could actually protect your data, without being martyred.

      They’d have to prove a lot in the first instance to warrant arresting you then and there, like that the knew you’d done it

      • HiddenLayer555@lemmy.ml
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        2 days ago

        They’d have to prove a lot in the first instance to warrant arresting you then and there

        No? It’s been pretty clear they can arrest literally anyone and you’re lucky if you even get to see a judge before you’re shipped off to the concentration camps. Even in the cases where judges have gone out of their ways to file injunctions against the ICE on someone’s behalf they won’t give a shit and have no problems blatantly violating court order and disappearing them anyway.

        • med@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 day ago

          I’m aware of what’s happening in the states. I’m talking from a resourcing perspective. You’d already have to know what you were after to confirm its absence from the phone, if the wipe can be done silently.

          If you could load in to your dummy profile, while deleting the keys to your main profile, which could then be freed up as storage space, all silently, with the right unlock password, that’d be pretty hard to prove in a way that warranted arresting everyone.

          This would limit this charge to only those that announced it as a political statement or who were already being targeted specifically.

      • FauxLiving@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        1 day ago

        what would be really cool is if it binned the storage keys for one user and not the other, silently. That way you could actually protect your data, without being martyred.

        If you leave the primary account ‘blank’ and use a secondary account for your personal use then you can do that.

        When you logout of a secondary profile, GrapheneOS zeroes the keys from memory so that even an attacker with full control of the phone could not retrieve the keys unless you entered your password to re-generate them.

    • HiddenLayer555@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      2 days ago

      Sounds like a good place for an API hook that executes whatever contingency script you want on entering of the fake password.