The Fourth Amendment in the Digital Age

The Fourth Amendment in the Digital Age

Today, we are at a jurisprudential inflection point as courts grapple with when and how the Fourth Amendment should apply to the data generated by technologies like cell phones, smart cars, and wearable devices.In Carpenter, the Court considered how the Fourth Amendment applies to location data generated when cell phones connect to nearby cell towers.

So Long as You Carry a Cellphone, the Government Can Track You

So Long as You Carry a Cellphone, the Government Can Track You

"[I]t is our understanding that the Carpenter decision concerned historical Cell Site Location Information which is distinct from the opt-in app data available on the Venntel platform," the Internal Revenue Service (IRS) recently told the Treasury Inspector General for Tax Administration (TIGTA) in response to a query about the use of commercial databases such as Venntel.

Kidnap capital Mexico eyes biometric phone registry, sparking privacy fears

Kidnap capital Mexico eyes biometric phone registry, sparking privacy fears

MEXICO CITY (Reuters) - A plan by Mexican lawmakers to put millions of cell phone users’ data in a biometric registry, billed as a tool to fight kidnapping and extortion, has sparked a backlash from telecoms companies and rights groups who warn it could lead to stolen data and higher costs.

Can The FBI Hack Into Private Signal Messages On A Locked iPhone? Evidence Indicates Yes

Can The FBI Hack Into Private Signal Messages On A Locked iPhone? Evidence Indicates Yes

The FBI appears to have a tool that can access Signal messages, even if a device is locked.Screenshot from Department of Justice file For police to access private Signal messages from an iPhone, there are some other caveats besides a device needing to be in AFU mode.

Court documents show FBI may have tool to access private Signal messages on locked iPhones

Court documents show FBI may have tool to access private Signal messages on locked iPhones

closevideoCourt documents from a recent gun-trafficking case in New York suggest the FBI may have developed a way to access texts on Signal, the encrypted messaging app that has risen in popularity in recent months for its secure communication.

Data Breach Exposes 1.6 Million Jobless Claims Filed in the Washington State

Data Breach Exposes 1.6 Million Jobless Claims Filed in the Washington State

The Office of the Washington State Auditor (SAO) on Monday said it's investigating a security incident that resulted in the compromise of personal information of more than 1.6 million people who filed for unemployment claims in the state in 2020.

Exfiltrating Remaining Private Information from Donated Devices

Exfiltrating Remaining Private Information from Donated Devices

Here is a breakdown of all the devices I purchased: Device Type Number of Devices Bought Desktop or laptop computer 41 Removable media (such as flash drives and memory cards) 27 Hard disk 11 Cell phone 6 After buying the devices, I took them to my command center (a cool name for my basement) and began the data extraction process.

No, Cellebrite cannot 'break Signal encryption.'

No, Cellebrite cannot 'break Signal encryption.'

Last week, Cellebrite posted a pretty embarrassing (for them) technical article to their blog documenting the “advanced techniques” they use to parse Signal on an Android device they physically have with the screen unlocked.

Cellebrite’s New Solution for Decrypting the Signal App

Cellebrite’s New Solution for Decrypting the Signal App

We looked again into the shared preferences file and found a value under “pref_attachment_encrypted_secret” that has “data” and “iv” fields under it.The “data” field contains an encrypted json file, that once decrypted, contains the decryption keys of the sent attachments.

Police in all 50 states are using secret tools to break into locked phones — and they're using them for cases as low-level as shoplifting, records show

Police in all 50 states are using secret tools to break into locked phones — and they're using them for cases as low-level as shoplifting, records show

Law enforcement agencies are able to crack into locked, encrypted smartphones far more frequently than was previously known, according to new documents surfaced by through over 100 public records requests by the digital liberties nonprofit Upturn.

New homeowner 'freaked out' when stranger took control of her security system

New homeowner 'freaked out' when stranger took control of her security system

As she stood alone in her front hall, she watched in disbelief as the man unarmed the system, unlocked doors and windows and told her he could track when she left the house — all with a few clicks on the security company's app.

Feds can’t ask Google for every phone in a 100-meter radius, court says

Feds can’t ask Google for every phone in a 100-meter radius, court says

Federal courts in the Chicago area have three times rejected government applications for warrants to force Google to produce a list of smartphones near two particular commercial establishments during one of three 45-minute intervals.

NJ Supreme Court: Defendants must divulge cellphone passcodes

NJ Supreme Court: Defendants must divulge cellphone passcodes

The New Jersey Supreme Court ruled Monday that a criminal defendant can be compelled to reveal his cellphone passcode to investigators, rejecting the argument that such a move violates the right against self-incrimination guaranteed by the Fifth Amendment of the U.S. Constitution.

What Are Stingrays and Dirtboxes?

What Are Stingrays and Dirtboxes?

But a security researcher named Roger Piqueras Jover found that the authentication on 4G doesn’t occur until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it’s not communicating with an authentic cell tower and switches to one that is authenticated.

The Feds Are Now Using 'Stingrays' in Planes to Spy on Our Phone Calls

The Feds Are Now Using 'Stingrays' in Planes to Spy on Our Phone Calls

That's according to a new report from the Wall Street Journal indicating that the government has been using Cessna planes outfitted with special phone surveillance equipment to track suspects.

Infection Surveillance in the Name of Public Health

Infection Surveillance in the Name of Public Health

But could the government require a similar application in the United States or would it be a violation of the Fourth Amendment’s guarantee against “unreasonable searches?” Generally, the Fourth Amendment may be invoked when a search infringes on a reasonable expectation of privacy, or the government’s activity amounts to a trespass, per the Supreme Court’s holding in Katz v.

Israel suspends cellphone-tracking for coronavirus quarantine enforcement

Israel suspends cellphone-tracking for coronavirus quarantine enforcement

JERUSALEM (Reuters) - An Israeli parliamentary oversight committee on Wednesday suspended police use of cellphone data to enforce coronavirus quarantines, with one lawmaker citing privacy concerns.

Lyon: Cellphone tracking might help stamp out COVID-19. But at what cost?

Lyon: Cellphone tracking might help stamp out COVID-19. But at what cost?

Ottawa’s medical officer of health, Vera Etches, noted that officials want to know if people are heeding safe-distance advice and suggested location data from phones could help; she later said there was no plan in place to use it.

The govt can now track cellphone locations back to 5 March: how Covid-19 tracing will work

The govt can now track cellphone locations back to 5 March: how Covid-19 tracing will work

As of Thursday the South African government can trace the movements of any South African cellphone user back as far as 5 March, in order to fight Covid-19.That movement data will go into a special database to identify anyone who may have had physical contact with a person known to be carrying the SARS-Cov-2 virus, for possible testing and quarantine.

Government is tracking Americans' cell phones to see how they move and spread coronavirus

Government is tracking Americans' cell phones to see how they move and spread coronavirus

The data comes from the mobile advertising industry, people familiar with the matter explained to the Wall Street Journal.The goal of the portal would be to help officials learn how COVID-19 is spreading across the United States.

How Canada Should Ensure Cellphone Tracking to Counter the Spread of Coronavirus Does Not Become the New Normal

How Canada Should Ensure Cellphone Tracking to Counter the Spread of Coronavirus Does Not Become the New Normal

For example, Israel has implemented a system that involves the collection and use of cellphone location data to identify at-risk individuals, who may receive text messages warning that they need to self-quarantine.

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

According to Axios, the Federal Communications Commission (FCC) is proposing fines against cell service providers, like AT&T and T-Mobile, for illegally selling data on the real-time location of their customers without the customers’ knowledge.

3D TV Tells You Everything About This Decade’s Tech

3D TV Tells You Everything About This Decade’s Tech

What I remember most from those press conferences in 2010 was the assuredness that millions of people somehow actively wanted to have to put glasses on their faces in order to watch television.

Affect recognition technology in crosshairs of Illinois lawmaker

Affect recognition technology in crosshairs of Illinois lawmaker

Illinois may take up legislation next year on the use of emotion or affect recognition technologies in video-based hiring.The first AI law requirement under GDPR is the right to know that an automated decision maker, or algorithm, is making a decision that is impacting you, Purcell said.

ACLU sues Homeland Security over ‘stingray’ cell phone surveillance

ACLU sues Homeland Security over ‘stingray’ cell phone surveillance

One of the largest civil liberties groups in the U.S. is suing two Homeland Security agencies for failing to turn over documents it requested as part of a public records request about a controversial cell phone surveillance technology.

The iPhone 11 Pro’s Location Data Puzzler — Krebs on Security

The iPhone 11 Pro’s Location Data Puzzler — Krebs on Security

On Nov. 13, KrebsOnSecurity contacted Apple to report this as a possible privacy bug in the new iPhone Pro and/or in iOS 13.x, sharing a video showing how the device still seeks the user’s location when each app and system service is set to “never” request location information (but with the main Location Data service still turned on).

Foursquare CEO calls on Congress to regulate the location data industry

Foursquare CEO calls on Congress to regulate the location data industry

Second, the Foursquare chief said any new law should provide greater transparency around what app makers do with location data, and give consumers the ability to opt-out.

NYC Law Enforcement Has Been Cracking Locked iPhones for Almost 2 Years

NYC Law Enforcement Has Been Cracking Locked iPhones for Almost 2 Years

Israeli forensics firm Cellebrite announced its new in-house phone cracking tool earlier this year, but a new report suggests law enforcement has had access to it since early 2018.

Sardines, Protests, Trees, and Bitcoin — What Do They Have In Common?

Sardines, Protests, Trees, and Bitcoin — What Do They Have In Common?

Image SourceDrawing on lessons from the Umbrella movement, the 2019 Anti-Extradition protests have a decentralised framework which allows groups in different locations to coordinate campaigns.Swimming in large numbers does not protect all of them, but it does allow the majority of the group to survive.

Another Federal Court Allows Warrantless Cellphone Searches at U.S. Border

Another Federal Court Allows Warrantless Cellphone Searches at U.S. Border

Unlike probable cause, which is the standard required for obtaining a search warrant, reasonable suspicion is a more lenient rule that lets law enforcement officials conduct searches without getting a warrant first.