Here's an article from the Guardian.uk newspaper website.
A tech blogger discovered this file last year but didn't look into it in depth. Here's his description of how to access it:
This database is also not available for the average user. To access this database a user will need to have a forensic tool, jailbreak their device, or access the backups stored on their computer.
Another recent story dealing with cell phones and privacy has to do with the Michigan State Police using the CelleBrite UFED device to download the contents of cell phones. The ACLU has asked for some information as to how often they use this device and the Michigan State Police responded with a request for $500,000 in exchange!
ACLU learned that the police had acquired the cell phone scanning devices and in August 2008 filed an official request for records on the program, including logs of how the devices were used. The state police responded by saying they would provide the information only in return for a payment of $544,680. The ACLU found the charge outrageous...
A US Department of Justice test of the CelleBrite UFED used by Michigan police found the device could grab all of the photos and video off of an iPhone within one-and-a-half minutes. The device works with 3000 different phone models and can even defeat password protections.