categoryMenu_new
 
  Home
  EXTRAORDINARY AH Teaching from Spiritual Hierarchy
  AbundantHope
  NEW READERS! Read Here First
  Supporting AH
  Leadership of AbundantHope
  Announcements
  Regional AH Sites
  Other Sites with AH material
  Contact Us
  Becoming A Messiah
  OUR PUBLIC FORUM IS OPEN TOO ALL
  Mission Ideas
  System Busting
  Cleric Letter/English
  Translations of Cleric Letter
  AH Member Writings
  Candace
  Ron
  Rosie
  Jess
  Brian's Poetry
  James
  Giuseppe
  Esteban
  Telepathic Messages
  Candace
  Jess Anthony
  Vince
  Leonette
  John
  Adam
  Bela
  Joyce
  Hazel
  Kibo
  Peter
  Rosie
  Johan
  Lucia
  Lucia G
  Rubens
  Shellee-Kim
  Ben
  Dorothea
  Solon
  Others
  Targeted Messages
  Hano
  Light Flower
  Changing The Face Of Religion
  - Phoenix Journals - PDF in German
  Candace on Religion
  Other Spiritual Pieces
  Spiritual Nuggets by the Masters
  Phoenix Journals
  Phoenix Journals - PDF
  Telepathic Messages PDF books
  Selections from the Urantia Book
  Illustrations For The Urantia Book
  CMGSN Pieces
  THE WAVE
  Environment/Science
  David Crayford and the ITC
  Health and Nutrition
  Podcasts, Radio Shows, Video by AH
 
  Political Information
  True US History
  Human/Animal Rights
  The Miracle That Is Me
  Education
  Resources
  911 Material
  Books - eBooks
  government email/phone #'s
  Self Reliance
  Video
  Websites
  Alternative News Sources
  Art and Music
  Foreign Sites
  Health and Healing
  Human/Animal Rights
  Scientific
  Spiritual
  Vegan Recipes
  Translated Material
  Dutch
  Gekanaliseerde berichten Jess
  Gekanaliseerde berichten Candace
  Gekanaliseerde berichten Anderen
  Artikelen/berichten
  French
  Canal Jess
  Par Candace
  Other Channels
  Articles
  German
  Telepathische Nachrichten (Candace)
  Telepathische Nachrichten (Jess)
  Telepathische Nachrichten (div.)
  AH Mitgliederbeiträge (Candace)
  AH Mitgliederbeiträge (Jess)
  Spirituelle Schätze
  Italian
  Translations - Candace
  Translations - Jess
  Translations - Others
  Portuguese
  by Candace
  By Jess
  By Others
  Spanish
  Anfitriones Divinos
  Bitácoras Fénix
  Creadores-de-Alas (WingMakers/Lyricus)
  Escritos de Candace
  Escritos de Otros
  Monjoronsón
  Telemensajes de Candace
  Telemensajes de Jess Anthony
  Telemensajes de Otros
  Chinese
  By Candace
  By Jess
  By Others
  Korean Translations
  Hungarian Translations
  Swedish Translations

Search
[an error occurred while processing this directive]
Political Information Last Updated: Apr 21, 2019 - 5:52:50 AM


Google’s Sensorvault Can Tell Police Where You’ve Been
By Jennifer Lynch
Apr 21, 2019 - 12:50:43 AM

Email this article
 Printer friendly page Share/Bookmark

https://www.activistpost.com/2019/04/googles-sensorvault-can-tell-police-where-youve-been.html

Do you know where you were five years ago? Did you have an Android phone at the time? It turns out Google might know-and it might be telling law enforcement.

In a new article, the New York Times details a little-known technique increasingly used by law enforcement to figure out everyone who might have been within certain geographic areas during specific time periods in the past. The technique relies on detailed location data collected by Google from most Android devices as well as iPhones and iPads that have Google Maps and other apps installed. This data resides in a Google-maintained database called "Sensorvault," and because Google stores this data indefinitely, Sensorvault "includes detailed location records involving at least hundreds of millions of devices worldwide and dating back nearly a decade."

The data Google is turning over to law enforcement is so precise that one deputy police chief said it "shows the whole pattern of life." It's collected even when people aren't making calls or using apps, which means it can be even more detailed than data generated by cell towers.

The location data comes from GPS signals, cellphone towers, nearby Wi-Fi devices and Bluetooth beacons. According to Google, users opt in to collection of the location data stored in Sensorvault. However, Google makes it very hard to resist opting in, and many users may not understand that they have done so. Also, Android devices collect lots of other location data by default, and it's extremely difficult to opt out of that collection.

Using a single warrant-often called a "geo-fence" or "reverse location" warrant-police are able to access location data from dozens to hundreds of devices-devices that are linked to real people, many of whom (and perhaps in some cases all of whom) have no tie to criminal activity and have provided no reason for suspicion. The warrants cover geographic areas ranging from single buildings to multiple blocks, and time periods ranging from a few hours to a week.

So far, according to the Times and other outlets, this technique is being used by the FBI and police departments in Arizona, North Carolina, California, FloridaMinnesotaMaine, and Washington, although there may be other agencies using it across the country. But police aren't limiting the use of the technique to egregious or violent crimes-Minnesota Public Radio reported the technique has been used to try to identify suspects who stole a pickup truck and, separately, $650 worth of tires. Google is getting up to 180 requests a week for data and is, apparently, struggling to keep up with the demand.

Law enforcement appears to be seeking warrants to access this extremely detailed location data. However, it's questionable whether the affidavits supporting those warrants truly establish probable cause and also questionable whether judges fully understand what they're authorizing when issuing these warrants.

According to the Times, the warrants frequently rely on an officer's assertion that the fact that "Americans owned cellphones and that Google held location data on many of these phones" somehow supports probable cause for the warrant. The warrants also list GPS coordinates that supposedly "geo-fence" the geographic area for which they are requesting data, but many don't include a map showing the area itself. Without a visual representation, there's almost no way to tell how large or small the geographic area covered by the warrant is.

Law enforcement seems to be using a three-step process to learn the names of device holders (in some cases, a single warrant authorizes all three steps). In the first step, the officer specifies the area and time period of interest, and in response, Google gives the police information on all the devices that were there, identified by anonymous numbers-this step may reveal hundreds of devices.

After that, officers can narrow the scope of their request to fewer devices, and Google will release even more detailed data, including data on where devices traveled outside the original requested area and time period. This data, which still involves multiple devices, reveals detailed travel patterns. In the final step, detectives review that travel data to see if any devices appear relevant to the crime, and they ask for the users' names and other information for specific individual devices.

This technique is problematic for several reasons. First, unlike other methods of investigation used by the police, the police don't start with an actual suspect or even a target device-they work backward from a location and time to identify a suspect. This makes it a fishing expedition-the very kind of search that the Fourth Amendment was intended to prevent. Searches like these-where the only information the police have is that a crime has occurred-are much more likely to implicate innocent people who just happen to be in the wrong place at the wrong time. Every device owner in the area during the time at issue becomes a suspect-for no other reason than that they own a device that shares location information with Google.

Second, as the Supreme Court recognized in Carpenter v United States last summer, detailed travel data like this can provide "an intimate window into a person's life, revealing not only his particular movements, but through them his ‘familial, political, professional, religious, and sexual associations.'" This is exactly what the deputy police chief recognized when he said Google location data "shows the whole pattern of life."

Third, there's a high probability the true perpetrator isn't even included in the data disclosed by Google. For these kinds of warrants, officers are just operating off a hunch that the unknown suspect had a cellphone that generated location data collected by Google. This shouldn't be enough to support probable cause, because it's just as likely that the suspect wasn't carrying an Android phone or using Google apps at the time.

Techniques like this also reveal big problems with our current warrant system. Even though the standard for getting a warrant is higher than other legal procedures-and EFF pushes for a warrant requirement for digital data and devices-warrants, alone, are no longer enough to protect our privacy. Through a single warrant the police can access exponentially more and more detailed information about us than they ever could in the past. Here, the police are using a single warrant to get access to location information for hundreds of devices. In other contexts, through a single warrant, officers can access all the data on a cell phone or a hard drive; all email stored in a Google account (possibly going back years); and all information linked to a social media account (including photos, posts, private communications, and contacts).

We shouldn't allow the government to have such broad access to our digital lives. One way we could limit access is by passing legislation that mandates heightened standards, minimization procedures, and particularity requirements for digital searches. We already have this in laws that regulate wiretaps, where police, in addition to demonstrating probable cause, must state that they have first tried other investigative procedures (or state why other procedures wouldn't work) and also describe how the wiretap will be limited in scope and time.

The Fourth Amendment itself also supports limits on the scope of individual warrants. It states that warrants must "particularly describ[e] the place to be searched, and the persons or things to be seized." However, many courts merely rubber stamp warrant requests without questioning the broad scope of the request.

As the Times article notes, this technique implicates innocent people and has a real impact on people's lives. Even if you are later able to clear your name, if you spend any time at all in police custody, this could cost you your job, your car, and your ability to get back on your feet after the arrest. One man profiled in the Times article spent nearly a week in police custody and was having trouble recovering, even months after the arrest. He was arrested at work and subsequently lost his job. Due to the arrest, his car was impounded for investigation and later repossessed. These are the kinds of far-reaching consequences that can result from overly broad searches, so courts should subject geo-location warrants to far more scrutiny.


As Surveillance Litigation Director, Jennifer Lynch leads EFF's legal work challenging government abuse of search and seizure technologies through the courts by filing lawsuits and amicus briefs in state and federal courts, including the U.S. Supreme Court, on important issues at the intersection of technology and privacy. Jennifer founded EFF's Street Level Surveillance Project, which informs advocates, defense attorneys, and decisionmakers about new police tools, and in 2017, the First Amendment Coalition awarded her its Free Speech and Open Government Award for her work opening up public access to police surveillance records. Jennifer has written influential white papers on biometric data collection in immigrant communities and law enforcement use of face recognition. She speaks frequently at legal and technical conferences as well as to the general public on technologies like location tracking, biometrics, algorithmic decisionmaking, and AI, and has testified on facial recognition before committees in the Senate and House of Representatives. She is regularly consulted as an expert on these subjects and others by major and technical news media.




All writings by members of AbundantHope are copyrighted by
©2005-2019 AbundantHope - All rights reserved

Detailed explanation of AbundantHope's Copyrights are found here


Top of Page

Political Information
Latest Headlines
When ‘Homeland’ Becomes a Politically Fraught Word
End Game and Afghanistan Bombing: Blame the Author, Not the Messenger
Anti-Christian Persecution In Finland
Policing For Profit: How Civil Asset Forfeiture Has Perverted American Law Enforcement
World’s Longest Solar Road Turns Out to be a Disaster
Trump Admin Launches ‘unprecedented’ Pro-life Effort at UN to Fight Pro-abortion EU
Victoria's Dirty Little Secret Is The Epstein-Wexner Plot Against American Manhood
Was FBI-staged Russian ‘honeytrap’ the Only ‘deep state’ anti-Trump Plot ?
On the Events in Hong Kong: the Show Must Go On?
The Push to Kill Cash – Australia’s Proposed Ban Shows It’s Not Conspiracy Theory
Bombshell New Video Exposes Horrifying Crime of Vaccine Mandates…
Epstein Murder Money Trail Leads To Billionaire David Koch—Who Then Quickly Dies
NASA Takes Pictures of Glaciers in the Heat of Summer, then Claims, “They’re MELTING!”
NEON Notables – Fifth “Let the Unsealing Begin!” Edition – for August 23, 2019 – #QAnon #GreatAwakening #NEONREVOLT
Brexit Has Opened Old Wounds in Ireland — and anti-British Sentiment is Back
George Osborne as Head of the IMF? It's as Insulting as ‘Tony Blair, Peace Envoy’
CIA-Funded Secret Militiamen ‘An Obstacle to Peace in Afghanistan’
UN Commemorates Religious Persecution – OpEd
“Huge Win for Wildlife”: Peru Vows to End Deforestation Driven by Palm Oil
The Liberal Order Began by Embracing Russia, Now They Want Revenge