Effects of the Factory Reset on Mobile Devices

Total Page:16

File Type:pdf, Size:1020Kb

Effects of the Factory Reset on Mobile Devices Calhoun: The NPS Institutional Archive DSpace Repository Faculty and Researchers Faculty and Researchers Collection 2014 Effects of the Factory Reset on Mobile Devices Schwamm, Riqui ADFSL Schwamm, Riqui, and Neil C. Rowe. "Effects of the factory reset on mobile devices." Journal of Digital Forensics, Security and Law 9.2 (2014): 205-220. http://hdl.handle.net/10945/49294 Downloaded from NPS Archive: Calhoun Effects of the Factory Reset on Mobile Devices JDFSL V9N2 This work is licensed under a Creative Commons Attribution 4.0 International License. EFFECTS OF THE FACTORY RESET ON MOBILE DEVICES Riqui Schwamm and Neil C. Rowe U.S. Naval Postgraduate School Computer Science Department Monterey, CA 93943 USA {rschwamm, ncrowe}@nps.edu ABSTRACT Mobile devices usually provide a “factory-reset” tool to erase user-specific data from the main secondary storage. 9 Apple iPhones, 10 Android devices, and 2 BlackBerry devices were tested in the first systematic evaluation of the effectiveness of factory resets. Tests used the Cellebrite UME-36 Pro with the UFED Physical Analyzer, the Bulk Extractor open-source tool, and our own programs for extracting metadata, classifying file paths, and comparing them between images. Two phones were subjected to more detailed analysis. Results showed that many kinds of data were removed by the resets, but much user-specific configuration data was left. Android devices did poorly at removing user documents and media, and occasional surprising user data was left on all devices including photo images, audio, documents, phone numbers, email addresses, geolocation data, configuration data, and keys. A conclusion is that reset devices can still provide some useful information to a forensic investigation. Keywords: mobile device, forensics, factory reset, file types, Cellebrite, privacy 1. INTRODUCTION Thomas, and McPhee, 2010). Systematic An increasing amount of criminal activity uses analysis of mobile devices differs somewhat mobile devices (McMillan, Glisson, and from that of desktop and laptop computers Bromby, 2013). Devices do provide ways to because of the difficulty of accessing the main erase user information from secondary storage secondary storage, which is usually a flash and criminals will likely use them. However, storage soldered to the device board. Cutting these methods are not entirely effective and out and removing the storage (Alghafli, Jones, information of forensic value can be left after and Martin, 2012) usually destroys the device these attempts to erase it. In addition, with functionality. Hence most mobile forensic frequent device upgrades by manufacturers, tools attempt to access the storage through discarded older devices are common. This the operating system. Several issues particular paper attempts to determine how much and to mobile devices arise such as finding where what kind of residual user data are left after a data are stored and dealing with data “factory reset” or “wipe” intended to remove aggregation. For instance, on most user data. This analysis will aid forensic smartphones the call records are stored in a examiners that encounter reset drives. single file. In addition, the operating system may not permit access to all files. Recently a number of researchers have developed methodologies for forensic The term “factory reset” is used by investigation of mobile devices (Marturana, et manufacturers to mean restoring an electronic al., 2011; Omeleze and Venter, 2013; Owen, device to the state when it left the factory, deleting all user data and third-party © 2014 ADFSL Page 205 JDFSL V9N2 Effects of the Factory Reset on Mobile Devices applications in the process (Rouse, 2013). It are even worse if the data left on devices are should be done when discarding a device or unpredictable as it appears to be from the transferring it to a new owner. The concept is anecdotal reports. clear when referring to music players and other simple devices, but its meaning is less 2. EXPERIMENTAL clear for complex mobile devices where some SETUP user data may be necessary to configure it Tools from Cellebrite adequately, and some user data are stored (www.cellebrite.com/mobile-forensics) were within operating-system files. used to extract data from the main storage of test devices. The Cellebrite UME-36 Pro No systematic testing appears to have Universal Memory Exchanger 1.2.2.3 been done of the factory reset on mobile hardware accessed the devices, and the devices, although technology websites report Cellebrite UFED Physical Analyzer 3.7.2.0 gripes (The Guardian, 2013). For example, software analyzed the images. Other products (Smith, 2012) tested secondhand phones claiming similar functionality include the purchased through Craigslist where a factory Forensic Toolkit (www.accessdata.com), rest had been performed on the devices. Data Oxygen Forensic Suite (www.oxygen- that they found included court records, social forensic.com), EnCase Neutrino security numbers, resumes, college (www.guideancesoftware.com), Recuva applications, child support documents, (www.piriform.com), and ViaExtract employee records, bank statements, credit- (viaforensics.com). The Oxygen Forensic suite card statements, tax returns, email, contact was tested on some of our phones and it lists, and photos. One investigation (Cardwell, appeared to work well. ViaExtract showed 2013) studied the effects of a factory reset on compatibility issues with some Android network data left on an Android phone. Data phones (the Samsung Galaxy SIII and the was transferred between Android phones and Motorola Atrix 4G). Recuva is primarily for multiple network access points (cellular, hard drive recovery; it could extract small wireless, and Bluetooth). Residual data in data sets but did not provide useful analysis. secondary storage on test phones after the reset included “userdata” partitions containing A full ufd-format dump of the file system Service Set Identifiers, wireless-router on each device was made by the Cellebrite Subscriber Identity Modules, DHCP ACKs Physical Analyzer. A program was written to from wireless routers, and base-station calculate DFXML metadata metadata that included the Mobile Network (www.nsrl.nist.gov/DFXML /fileobject.xsd) Code, Mobile Country Code, Local Area Code on the dumps, including calculation of hash and Cell Identification, wireless router Media values on files. Another program discussed in Access control addresses, and Bluetooth section 4.2 was written to compare the pre- addresses of devices paired with the phone. reset and post-reset DFXML metadata. A taxonomy from (Rowe, 2013) was used to These reports suggests that useful classify files by extension and directory. The forensics on reset devices is indeed possible. Bulk Extractor tool from digitalcorpora.org They also raise worrisome questions about the (Garfinkel, 2013) was used to extract strings. privacy of information stored on mobile We did not exclude operating-system files devices. Privacy of personal information is from analysis because our previous work currently subject of much attention (Payton (Rowe, 2013) found some user data in them. and Claypoole, 2014). If private data are left on devices after users have reset them, users Except for two unresponsive phones and may be able to sue manufacturers, and this also in section 3.4, resets were performed needs to be factored into business decisions through software using each device’s setup (Kauffman, Lee, and Sougstad, 2009). Matters menu under “Privacy” or “Backup & Reset”. Page 206 © 2014 ADFSL Effects of the Factory Reset on Mobile Devices JDFSL V9N2 The reset takes a few minutes after which the 3.1 Experimental Protocol device restarts. The phones were “factory-reset”; a protocol 2.1 Other Storage for Devices was followed to put applications and data onto the phones; images were taken of the This work focused on the main nonvolatile phone with the Cellebrite Physical Analyzer; storage. A separate removable memory card the phones were reset again; and images were on some phones (“SIM” or “subscriber identity taken again. The furnished data included module”) contains the user’s identity, account distinctive keywords to make it easier to information, and keys, and is necessary to recognize forensically. The phones were not make phone calls. It may also contain text connected to a cellular account, so messaging messages and contacts depending on the services could not be tested. The protocol phone. SIM cards were not available for most was: of our phones. SIM cards are unaffected by a 1. Reset the device. factory reset and contain information of 2. Visit four specified websites: nps.edu, definite forensic interest, so they should be fark.com, yahoo.com, and npr.org. analyzed if available. 3. Take six pictures with the built-in Besides SIM cards, many devices have camera and rename three distinctively. additional removable storage in the form of 4. Click on eight specified links to Web SD or MMC cards that is not subject to the pages and documents (4 html, 1 docx, factory reset. No such cards were available for 1 pdf, 1 pptx, and 1 wav file). the devices tested in section 4, but 76 cards 5. Download to the root directory of the comprising 54,279 files were acquired from phone a specified text document and smartphone images from an international zip file. corpus. Classifying its files by extension using 6. For the Android: (a) download and our taxonomy, 31.7% were camera pictures, install the Facebook app, login, and 15.0% were audio, 11.8% were video, 5.6% browse specified pages; (b) download were documents, and 5.6% had no extension. and install the Google Drive app, Hence these cards had rich materials for login/sync, and open three specified forensic investigation compared with 4.3% files; (c) download and install the camera images, 4.8% audio, and 0.1% video DropBox (www.dropbox.com) app, on the mobile-device main-storage corpus to login/sync, and open three specified be described. That suggests that the cards files; (d) download and install the should be checked first when available in a YouTube app, login, and watch three forensic investigation.
Recommended publications
  • A Workflow-Based Mobile Guidance Framework for Managing Personal Activities
    A WORKFLOW-BASED MOBILE GUIDANCE FRAMEWORK FOR MANAGING PERSONAL ACTIVITIES A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF INFORMATICS INSTITUTE OF MIDDLE EAST TECHNICAL UNIVERSITY GÖKHAN TÜYSÜZ IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION SYSTEMS SEPTEMBER 2013 Approval of the thesis: A WORKFLOW-BASED MOBILE GUIDANCE FRAMEWORK FOR MANAGING PERSONAL ACTIVITIES submitted by GÖKHAN TÜYSÜZ in partial fulllment of the requirements for the degree of Master of Science in Information Systems Department, Middle East Technical University by, Prof. Dr. Nazife Baykal Director, Informatics Institute Prof. Dr. Yasemin Yardmc Çetin Head of Department, Information Systems Assist. Prof. Dr. P. Erhan Eren Supervisor, Information Systems Department, METU Examining Committee Members: Assoc. Prof. Dr. Altan Koçyi§it Information Systems Department, METU Assist. Prof. Dr. P. Erhan Eren Information Systems Department, METU Assoc. Prof. Dr. Aysu Betin Can Information Systems Department, METU Dr. Nail Çadall KAREL A.. Assist. Prof. Dr. Alptekin Temizel Information Systems Department, METU Date: I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last Name: GÖKHAN TÜYSÜZ Signature : iii ABSTRACT A WORKFLOW-BASED MOBILE GUIDANCE FRAMEWORK FOR MANAGING PERSONAL ACTIVITIES Tüysüz, Gökhan M.S., Department of Information Systems Supervisor : Assist. Prof. Dr. P. Erhan Eren September 2013, 69 pages In daily life, people have to perform a large number of activities typically in a limited amount of time.
    [Show full text]
  • Let Them Choose Mccain Has Lost His Dignity, Identity
    THE TUL NE HULLABALOO --------------- VIEWS OCTOBER 17, 2008 • 15 ·POLITICS· ·SOCIETY· Let them choose OfV-necks, Pabst and protest Flaws in pro-life arguments Hipster apathy is reaction to inaneyouth movements So I'm walk- "sperm + egg= embryo?" Now we It's become ca, is only a problem for people too comfort, housed now in universi- ing past Boggs can't use contraceptives, because rather popular stupid to use the Internet - hours ties and gentrified neighborhoods, "What do you today, and I those would prevent the parts of to rage against of nun-themed scat porn are just looking quite indifferently to the see not once what could become an embryo what many a handful of keystrokes away. The world we inherit" think about the but twice the from coming together. people assume War on Drugs, perhaps the only It's not like youth movements equation wem- "So much the better; say true to be my gen- grievance left with the potential to don't exist. The "anonymous" cru- recent increase bryo =baby= pro-life types. So let's extend the eration's coun- galvanize youth, is so mishandled sade against Scientology is com- adult." While I equation even more: "sex= sperm Jeff ter cu It u re. by the government that it's current- posed of naive, socially awkward in sexual William suppose I ap- + egg = embryo." That's bad news Silberman Deemed "hip- ly easier and safer to procure a vial young people who spend their Lee-Wagner plaud the idea for Sarah "Abstinence Only" Pal- sters; the label of acid or an eightball of blow than time cruising the Something-Aw- assault on and of injecting a in.
    [Show full text]
  • Numbers & Symbols 4Chan, See Social Media @Berniesanders, See
    INDEX Numbers & Symbols 46, 47, 49, 52, 57, 58, 63–72, 76, 4chan, see Social media 98–101, 103, 111 @BernieSanders, see Twitter handle Campaign communication, 8, 9, 46, 49, @HillaryClinton, see Twitter handle 71 @RealDonaldTrump, see Twitter handle Candidate image, 3, 23, 46–59 @SenSanders, see Twitter handle Citizen engagement, 16–17 @Tedcruz, see Twitter handle Clean Power Plan, see Environmental policy Climate change, see Global warming A Clinton, Hillary, 10, 14, 19n8, 25, 26, Agenda setting, 64 56, 57, 77, 104, 105, 111, 112 Alt-right, 79, 82 Congress, 23, 24, 65, 77, 101 Arab Spring,22 Conservatives, see Political party Attack/negative campaigning, 3, 4, 9, Contemporary conservatism and 11, 13, 15–17, 18n3, 23–27, 29, liberalism, see Political ideology 30, 32, 33, 35, 42, 53, 67, 82, 98, Cruz, Ted, see Primary candidates 102, 108, 111–113 Cultural conservatism, see Political ideology B Bernie Sanders, see Primary candidates D Dakota Access, see Environmental policy C Dean, Howard, 1 Campaign, 2, 3, 8, 12–14, 16, 17, 18n3, Democrats, 8 19n9, 22–27, 29, 30, 32, 33, 42, See also Political party Note: Page number followed by ‘n’ refers to notes. © The Author(s) 2018 119 C.J. Galdieri et al. (eds.), The Role of Twitter in the 2016 US Election, https://doi.org/10.1007/978-3-319-68981-4 120 INDEX E K Earned media, 3, 46, 49–51, 53, 55–59 Keystone XL pipelines, see Economic conservatives, see Political Environmental policy ideology Elections, 2, 3, 5, 8, 14, 22, 24, 25, 29, 30, 33, 35, 42, 46, 47, 49, 51, 53–59, 64, L 65, 72, 78, 80–82,
    [Show full text]
  • 2.0 Cover February 5
    ON THE COVER hat was a followup to 2002, when Billy Hylton suggested Fark Turns 10 Tin Ace’s March 14 coverstory, “Lexington owes Drew Curtis an apology.” The cover read, “Who’s Drew?” (In Lexington, not that many people seemed to know the Now does everybody know Drew? answer.) In profiling the already infamous Just because a number of people believe something doesn’t Fark.com, Hylton wrote at the time, “People make it a legitimate alternative viewpoint. in Russia, England, South Africa, Japan, and —Drew Curtis, from the “Equal Time for Nutjobs” chapter, in New Zealand are fans of his, yet he is It’s Not News, It’s Fark Photo by Karen Smither ark, which turns 10 on February 12, is up for a lifetime Fachievement Bloggie this year (winners announced March 16 at South by Southwest). It’s up against the likes of Gawker and The Daily Kos. But Fark is not a blog. For the uninitiated, Fark.com is a news aggregator, an edited community-driven news site. The site receives thousands of news submissions from its readership daily, and founder and Lexington native Drew Curtis goes over them to decide what to post. Criteria? He writes, “usually, this is based on how funny the submitted tagline is more that anything else. The tagline is essentially the article headline rewritten into a one-line joke by the submitter.” As for Fark’s political inclinations, Curtis claims Fark to Drew Curtis in Ace’s 2002 “Who’s Drew?” story be “twenty-six percent liberal, twenty-four percent conserva- tive, and fifty percent neutral or hating everybody.” When he does guest lectures speaking at entrepreneurial Friday! We’re getting together to celebrate at The Chase in classes for the University of Kentucky, he tells students “fail- Lex KY on Feb 13th.
    [Show full text]
  • TARTU UNIVERSITY NARVA COLLEGE DIVISION of FOREIGN
    TARTU UNIVERSITY NARVA COLLEGE DIVISION of FOREIGN LANGUAGES Vladimir Lilenko WORD-FORMATION AND SEMANTIC MECHANISMS IN ENGLISH INTERNET SLANG AND MEMES CREATION AND ITS IMPACT ON THE RUSSIAN LANGUAGE Bachelor’s thesis Supervisor: Lect. O.Orehhova NARVA 2013 PREFACE English Internet slang and memes have become not only a part of the English language, but they have been imposing a great influence on Russian and the verbal culture of young generation as well. Memes have almost replaced usual Internet chatting and emotional expression of most Russian speaking young people. English slang has grown so deeply inside Russian that it is accepted as that of the Russian origin. The present research paper attempts to show how the English Internet slang and memes are formed and what a great impact they have on the Russian language. The thesis conducts an analysis of the English Internet slang, compares English Internet slang with that of the Russian language as well as analyses the impact of English memes and Internet slang on the Russian language. The paper consists of the Introduction, three core chapters and the Conclusion. The introductory part provides an overview of the English Internet slang and memes creation history. Chapter I includes an overview of word-formation processes and semantic mechanisms in English. Chapter II includes the analysis of 30 most popular English Internet slang words and 10 Internet memes. The aim of the analysis is to find out what word-formation processes and semantic mechanisms are mostly used in modern English Internet slang and memes. The aim of Chapter III is to study out the impact of English Internet slang and memes on the Russian language.
    [Show full text]
  • Carol Moseley Braun Address
    Carol Moseley Braun Addresses Alma Mater, Mayoral Run Questions http://www.myfoxchicago.com/dpp/news/elections/carol-mosely-braun-p... Sign In Search Site Web Live Video Watch FOX Chicago News Fresh Recipes Live Doppler Job Shop Contests Voter Guide Message Boards RSS HOME NEWS WEATHER TRAFFIC SPORTS MONEY GOOD DAY HEALTH ENTERTAINMENT BLOGS ABOUT US Autos Jobs Home : News : Elections : Latest News Obama's Top Economic Adviser to Depart Art Institute Sues Engineer Early Congress Adjournment Expected Michelle Obama To Hit Campaign Trail City Treasurer Neely Seeking Re-Election More News » vote now Bookmark & Share Carol Mosely Braun addresses students at her alma mater, Paul Robeson High School. EmailThis Drew Peterson Coverage Peterson Gun Case to be Decided in Oct. Race for Mayor: More Stories Peterson Writes Letter About His Kids Danny Davis Starts Gathering… Peterson's Son: I Did Nothing Improper U.S. Rep. Danny Davis is the latest to Peterson Appeal Denied; Will Stay Jailed consider running for … Cops Search Galesburg for Stacy Peterson More Stories » Ghosts from Rod Blagojevich Trial Haunt… Rod Blagojevich's name won't be on the ballot when Chicago votes for a new mayor early … Advertisement Ald. Sandi Jackson: Rep. Jesse Jackson,… At a jobs rally on Chicago's East Side Tuesday, Ald. Sandi Jackson (7th) said she and her… Carol Moseley Braun Announces Mayoral… Former Senator Carol Moseley Braun announced Monday she is forming an exploratory … Danny Davis Supporters May Start… West Side Congressman Danny K. Davis told FOX Chicago News that… Rahm Emanuel, Jesse Jackson Jr. Meet… Rep. Jesse Jackson Jr.
    [Show full text]
  • MIT App Inventor Ve Android Studio Kullanılarak Tasarlanmış Mobil
    2020 2(2), 161-181 ISSN: 1307-4474 MIT App Inventor ve Android Studio Kullanılarak Tasarlanmış Mobil Uygulamanın Performans Karşılaştırması Mehmet Fatih Pekyürek* 1, Zeynep Sağlam 2, Ahmet Berk Üstün 3 Öz Anahtar Sözcükler Mobil cihaz kullanımının artmasıyla beraber mobil uygulamalara ihtiyaç artmış, bunun Android Studio sonucunda da mobil geliştirme ortamları çoğalmıştır. Birçok mobil geliştirme ortamı içinden MIT App Inventor seçim yapmak istenilirse farklı mobil geliştirme ortamlarında geliştirilen mobil uygulamaların Performans Ölçütleri performans yönünden karşılaştırılması yol gösterici olacaktır. Bu çalışmada, Android sistem Eğitsel Mobil için metin tabanlı tümleşik mobil uygulama geliştirme ortamı olan Android Studio ve görsel blok tabanlı mobil uygulama geliştirme ortamı olan MIT App Inventor kullanılarak orta ölçekli Uygulama eğitsel bir mobil uygulama geliştirilmiş ve geliştirilen mobil uygulama, performans yönünden Makale Hakkında karşılaştırılmıştır. Performans karşılaştırılmasında, CPU ve RAM ölçütleri kullanılmış ve gerçek cihazlar üzerinde ölçümler gerçekleştirilmiştir. CPU ölçümleri, Android Studio ve MIT Gönderim Tarihi App Inventor ile geliştirilen mobil uygulamada farklılık göstermezken; RAM ölçümleri, 21 Haziran 2020 Android Studio ve MIT App Inventor ile geliştirilen uygulamada farklılık göstermiştir. Elde Kabul Tarihi edilen veriler ışığında; küçük ve orta ölçekli mobil uygulamalar geliştirilirken, Android Studio 2 Aralık 2020 veya MIT App Inventor tercih edilmesinde büyük farklılıklar ortaya çıkmasa da özellikle grafik Yayın Tarihi temelli büyük ölçekli uygulamalar geliştirilirken Android Studio tercih edilmesi 20 Aralık 2020 önerilmektedir. Makale Türü Araştırma Makalesi Comparison of Performance of Mobile Application Developed in MIT App Inventor and Android Studio Abstract Keywords The need for mobile applications has arisen because of the increase in the use of mobile devices, Android Studio therefore, the number of mobile application development environments has increased.
    [Show full text]
  • Infographic by Ben Fry; Data by Technorati There Are Upwards of 27 Million Blogs in the World. to Discover How They Relate to On
    There are upwards of 27 million blogs in the world. To discover how they relate to one another, we’ve taken the most-linked-to 50 and mapped their connections. Each arrow represents a hypertext link that was made sometime in the past 90 days. Think of those links as votes in an endless global popularity poll. Many blogs vote for each other: “blogrolling.” Some top-50 sites don’t have any links from the others shown here, usually because they are big in Japan, China, or Europe—regions still new to the phenomenon. key tech politics gossip other gb2312 23. Fark gouy2k 13. Dooce huangmj 22. Kottke 24. Gawker 40. Xiaxue 2. Engadget 4. Daily Kos 6. Gizmodo 12. SamZHU para Blogs 41. Joystiq 44. nosz50j 3. PostSecret 29. Wonkette 39. Eschaton 1. Boing Boing 7. InstaPundit 17. Lifehacker 25. chattie555 com/msn-sa 14. Beppe Grillo 18. locker2man 27. spaces.msn. 34. A List Apart 37. Power Line 16. Herramientas 43. AMERICAblog 20. Think Progress 35. manabekawori 49. The Superficial 9. Crooks and Liars11. Michelle Malkin 28. lwhanz198153030. shiraishi31. The seesaa Space Craft 50. Andrew Sullivan 19. Open Palm! silicn 33. spaces.msn.com/ 45. Joel46. on spaces.msn.com/Software 5. The Huffington Post 8. Thought Mechanics 15. theme.blogfa.com 21. Official Google Blog 38. Weebl’s Stuff News 47. princesscecicastle 32. Talking Points Memo 48. Google Blogoscoped 42. Little Green Footballs 26. spaces.msn. c o m/ 36. spaces.msn.com/atiger 10. spaces.msn.com/klcintw 1. Boing Boing A herald from the 6.
    [Show full text]
  • Communications PAO and News Organizations
    Kupec, Kerri (CPA) From: Kupec, Kerri (OPA) Sent: Monday, January 7, 2019 9:19 AM To: [email protected] Subject: Can we move meeting to tomorrow? I (b)(6) Sent from my iPhone Document ID: 0.7.910.41593 20200323-0000162 Hornbuckle, Wyn (OPA) From: Hornbuckle, Wyn (OPA) Sent: Thursday, January 3, 2019 6:29 PM To: Kupec, Kerri (OPA); Gibson, Jake Subject: RE: Hi Jake, question Hi Jake - I'll look into it but doubt I will be able to update these figures to meet deadline tonight. Here's some recent important cases, unlikely there have been that many since July: Thursday, December 20, 2018: https:l/www.iustice.gov/opa/pr/justice-department-seeks-denaturalize­ illinois-man-who-allegedly-concealed-service-military TheJustice Department filed a denaturalization lawsuit against Necljo :Milosevic, a native oftheformer Yugoslavia, who, according to theDepartment's complaint, was a member ofone ofthe military units responsible for theSrebrenicamassacre-thelargest mass atrocity in Europe since theHolocaust. The complaint alleges that1'.filosevic concealed his military senriceinorderto enter theUnited States as a refugee, and continued to conceal itthroughouthis naturalization proceedings. The civil complaint was filed in federal court in the NorthernDistrictofIllinois. Removal of}akiw Pa/ii Nazi Labor Camp Guard {EONY): On August 20, the long-soughtremoval offormer Nazi labor camp guard Jakiw Palij was carried outwhen he was transported by ICE t o Germany. One ofHRSP's two predecessor units, the Office of Special Investigations (OSI), won a court order of denatural1zat1on against the longtime New York City resident in 003 and secured an immigration court order of removal in 2004, with both decisions based on Palij's participation in WWII Nazi-sponsored acts of persecution.
    [Show full text]
  • Applications: F
    Applications: F This chapter contains the following sections: • F-Prot, on page 5 • F-secure, on page 6 • Fab.com, on page 7 • Facebook, on page 8 • Facebook Applications Other, on page 9 • Facebook Apps, on page 10 • Facebook Chat, on page 11 • Facebook Comment, on page 12 • Facebook event, on page 13 • Facebook Games, on page 14 • Facebook Like, on page 15 • Facebook message, on page 16 • Facebook Notes, on page 17 • Facebook Photos, on page 18 • Facebook post, on page 19 • Facebook Read Email, on page 20 • Facebook search, on page 21 • Facebook Send Email, on page 22 • Facebook Sports, on page 23 • Facebook Status Update, on page 24 • Facebook Utilities, on page 25 • Facebook video, on page 26 • Facebook video chat, on page 27 • Facebook VoIP, on page 28 • Facetime, on page 29 • Family Tree, on page 30 • Fancy, on page 31 • Fark, on page 32 • Farmville, on page 33 • FASP, on page 34 • FastCGI, on page 35 • FastTrack, on page 36 Applications: F 1 Applications: F • Fatmen, on page 37 • FC2, on page 38 • FCP, on page 39 • FDSSDP, on page 40 • Federated Media, on page 41 • FedEx, on page 42 • Feed43, on page 43 • FeedBurner, on page 44 • Feedfetcher, on page 45 • Feedly, on page 46 • Feedly Fetcher, on page 47 • Fetion, on page 48 • FFFFOUND!, on page 49 • Fidelity, on page 50 • Fiesta, on page 51 • Fifth Third Bank, on page 52 • FileDropper, on page 53 • Fileguri, on page 54 • FileHost.ro, on page 55 • Filemail, on page 56 • FileMaker, on page 57 • Filer.cx, on page 58 • FileServe, on page 59 • FilmOn, on page 60 • Finger, on page 61 •
    [Show full text]
  • Internet Subcultures and Oppositional Politics Richard Kahn and Douglas Kellner
    Internet Subcultures and Oppositional Politics Richard Kahn and Douglas Kellner Subcultures traditionally represent alternative cultures and practices to the dominant culture of the established society. While they often construct themselves within and against the governing culture from which they are born, their comparatively smaller population size, their associations with emergent youth culture and the manifold novelties of the day, and their occasionally politically resistant and activist temperaments all serve to ensure that subcultures are constructed so as to be more than mere reproductions of the grander cultural forms, themes, and practices. If the dominant culture provides the semantic codes by which groups attempt to transmit and reproduce themselves, then subcultures represent a challenge to this symbolic order in their attempt to institute new grammars and meanings through which they interpret the world, and new practices through which they transform it. In this sense, Dick Hebdige has spoken of subcultures as a form of "noise" capable of jamming dominant media transmissions. Of course, as Hebdige also notes, the eventual reality of oppositional culture-jamming is not that it replaces dominant media representations with its own. Rather, alternative subcultures strive to capture media attention, and in so doing become involved in the Janus-faced process of attempting to transform dominant codes even as they become appropriated, commodified, and re- defined by the hegemonic culture which they contest (Hebdige 1979: 90-92). Our present moment, however, is highly turbulent and complex, and can be characterized as a "postmodern adventure" in which traditional forms of culture and politics are being resurrected, imploded into and combined with entirely new cultural and political modes in a global media culture that is becoming increasingly dominated by the corporate forces of science, technology, and capital (see Best and Kellner 2001).
    [Show full text]
  • Filed a Surreply Brief
    WORLD INTELLECTUAL PROPERTY ORGANIZATION ARBITRATION AND MEDIATION CENTER Mercury Radio Arts, Inc & Glenn Beck Complainants v. Disputed Domain Name: Glennbeckrapedandmurderedayo unggirlin1990.com Isaac Eiland-Hall Respondent SURREPLY I. Introduction – Neither the Complaint nor the Supplemental Filing provides any basis for finding in Complainants’ favor. On October 13, 2009, Complainant filed a Supplemental Filing. Though the Supplemental Filing added to the volume of materials for the Panel to review, it fails to provide any basis for finding in the Complainants’ favor, much like the Complaint before it. Section 4(a) of the Policy requires complainants to show trademark rights and that the domain name in question is confusingly similar to the mark; bad faith registration and use (as those terms are defined under the Policy); and a lack of a legitimate interest on the part of the Respondent. Like the Complaint, the Supplemental Filing fails to show any of the above. As described more fully below, the Complainant’s arguments fail for the following four reasons: 1. Complainant has failed to meet his burden of showing common law rights. Nothing in the two separate briefs submitted by Complainant establishes that he has any common law trademark rights to the alleged mark. 2. There Is No Confusing Similarity. Nothing in Complainant’s briefs amounts to evidence or argument, beyond bare conclusory statements, that audiences are likely to confuse Respondent’s registered domain with Complainant’s alleged mark. 3. Respondent Has A Legitimate Interest. Respondent has a legitimate interest in criticizing, mocking, and even ridiculing Glenn Beck, grounded in the First Amendment to the U.S.
    [Show full text]