[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/realnews/ - REAL NEWS

Real News Without Shills or Trolls

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1447123417656.jpg (24.25 KB, 600x397, 600:397, google_spying.jpg)

 No.907

How Law Enforcement Can Use Google Timeline To Track Your Every Move

THE RECENT EXPANSION of Google’s Timeline feature can provide investigators unprecedented access to users’ location history data, allowing them in many cases to track a person’s every move over the course of years, according to a report recently circulated to law enforcement.

“The personal privacy implications are pretty clear but so are the law enforcement applications,” according to the document, titled “Google Timelines: Location Investigations Involving Android Devices,” which outlines the kind of information investigators can now subpoena.

The Timeline allows users to look back at their daily movements on a map; that same information is also potentially of interest to law enforcement. “It is now possible to submit a legal demand to Google for location history greater than six months old,” the report says. “This could revitalize cold cases and potentially help solve active investigations.”

The report was written by a law enforcement trainer, Aaron Edens, and provides detailed guidance on the wealth of historic location information available through Google Timeline and how to request it. A copy of of the document was obtained by The Intercept.

The expansion of Google’s Timeline feature, launched in July 2015, allows investigators to request detailed information about where someone has been — down to the longitude and latitude — over the course of years. Previously, law enforcement subpoenas to the company could only yield recent location information.

The 15-page document includes what information its author, an expert in mobile phone investigations, found being stored in his own Timeline: historic location data — extremely specific data — dating back to 2009, the first year he owned a phone with an Android operating system. Those six years of data, he writes, show the kind of information that law enforcement investigators can now subpoena from Google.

The document also notes that users can edit or delete specific locations in their history, or an entire day, stressing the importance of preservation letters for criminal investigators involving Android phones. “Unfortunately, Google has made it very easy to delete location history from a specific date,” he wrote.

There is no indication data is recoverable from Google once it has been deleted by the user, the report says.

Location data is only stored in users’ Google accounts if they enable the feature. Individual Android users can turn it off, but users often don’t.

The ability of law enforcement to obtain data stored with privacy companies is similar — whether it’s in Dropbox or iCloud. What’s different about Google Timeline, however, is that it potentially allows law enforcement to access a treasure trove of data about someone’s individual movement over the course of years.

The report also advises investigators to remember there is a significant amount of other information retained by Google.

https://archive.is/vZ6Yy

https://theintercept.com/2015/11/06/how-law-enforcement-can-use-google-timeline-to-track-your-every-move/

 No.1085

US Fascist Government STILL Spying On Americans, Likely Always Will

The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows.

The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without court approval.

The filing made public Monday was the result of an 11-year-old legal battle waged by Nicholas Merrill, founder of Calyx Internet Access, a hosted service provider, who refused to comply with a national security letter (NSL) he received in 2004.

Merrill told Reuters the release was significant “because the public deserves to know how the government is gathering information without warrants on Americans who are not even suspected of a crime.”

National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 false flag attacks.

It will be such a relief when services like MEGAnet finally become available: >>851

https://archive.is/sV7zg

https://ca.news.yahoo.com/u-government-reveals-breadth-requests-internet-records-093706228--finance.html


 No.1421

[NOTE: cryptome.org was the first site to warn about this - one year ago - but no one paid any attention. Agencies with mass spying tools now include the IRS, the DEA, the HHS, BATFE and the DHS.]

Late last night, the NY Times broke a very troubling story. Rather than finally putting an end to Executive Order 12333, it appears that President Obama is going to expand the power of it in dangerous ways. We've written about EO 12333 a bunch of times, but for those of you unfamiliar with it, it's an executive order signed by President Reagan that basically gave the NSA pretty free rein to collect signals intelligence outside of the US. Because it's not (technically) about domestic surveillance, what the NSA does under EO 12333 is not subject to Congressional oversight. That is, Congress is mostly as much in the dark as everyone else is on what the NSA is doing overseas. And, as former State Department official John Napier Tye revealed a couple of years ago, for all the talk of domestic surveillance programs revealed by Ed Snowden, the NSA's real power comes almost entirely from 12333.

And it has no limitations. Napier noted that the other programs – things like Section 215 (now morphed into whatever the USA FREEDOM Act allows) and Section 702 – were merely used to "fill in the gaps" not covered by 12333.

And it almost certainly involves both foreign and domestic intelligence. Basically, if any of your data goes outside of US boundaries, the NSA is free to capture it under 12333. Remember those stories of the NSA hacking into datacenters of companies like Google, Yahoo and Microsoft? Those datacenters were in Singapore. And the reason the target was Singapore rather than the US, was because of 12333.

Meanwhile, the NSA likes to insist that it respects the privacy of Americans thanks to its vast minimization program that is supposed to dump inappropriate data on Americans, or in stripping out private information when sharing data with other agencies.

This is crazy. For all the talk of the NSA having access to all of this information, and even a fair number of reports of NSA staff "abuse" of their access to data, in general, the NSA certainly has a reputation for being serious about not allowing any abuse of the data. Other agencies? Not so much. The FBI, CIA, DEA and ATF, for example, have long and colorful histories of abusing data to harass and intimidate people. Giving them much wider access to whatever the NSA slurps up overseas, and then trusting those agencies to handle "minimization" (as is the apparent plan) is downright frightening.

And despite this massive change, the public won't get to weigh in. Instead:

Intelligence officials began working in 2009 on how the technical system and rules would work, Mr. Litt said, eventually consulting the Defense and Justice Departments. This month, the administration briefed the Privacy and Civil Liberties Oversight Board, an independent five-member watchdog panel, seeking input. Before they go into effect, they must be approved by James R. Clapper, the intelligence director; Loretta E. Lynch, the attorney general; and Ashton B. Carter, the defense secretary.

Oh sure. They just need approval from the folks who will benefit most from all of this, and no real discussion with the public who will be impacted by it. What a surprise…

http://archive.is/2KsMm

https://www.techdirt.com/articles/20160225/22583933716/rather-than-ending-nsas-key-surveillance-tool-white-house-to-now-let-other-agencies-use-it.shtml




[Return][Go to top][Catalog][Post a Reply]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]