How commercially-available phone location data is used by ICE (and other law enforcement agencies)
from cypherpunks@lemmy.ml to privacy@lemmy.ml on 08 Jan 19:51
https://lemmy.ml/post/41421285

screenshot of text: The material does not say how Penlink obtains the smartphone location data in the first place. But surveillance companies and data brokers broadly gather it in two different ways. The first is from small bundles of code included in ordinary apps called software development kits, or SDKs. SDK owners then pay the app developers, who might make things like weather or prayer apps, for their users’ location data. The second is through real-time bidding, or RTB. This is where companies in the online advertising industry place near instantaneous bids to get their advert in front of a certain demographic. A side effect is that companies can obtain data about peoples’ individual devices, including their GPS coordinates. Spy firms have sourced this sort of RTB information from hugely popular smartphone apps.

via this 404 media article: www.404media.co/inside-ices-tool-to-monitor-phone…

paywall bypass: web.archive.org/…/inside-ices-tool-to-monitor-pho…

screenshot of text: The material shows Webloc users can search its databases of mobile phone data in various ways. Users can perform a single perimeter analysis to search a specific area for mobile phones across a certain time period. They can draw the target area with a rectangle, circle, or polygon. They then select the maximum number of results the system should display, and the maximum number of devices to return.   Once a Webloc user has identified a device of interest, they can get more details about that particular phone, and, by extension, its owner, by seeing where else it has travelled both locally and across the country. Users can click a route feature which shows the path the device took. The material suggests that if users look at where the device was located at night, they might find the person’s possible home, and during the day, the person’s possible employer.  The software can also do a multi-permiter analysis, which monitors multiple locations at once to see which devices have been present at two or more specific places.

#privacy

threaded - newest

Goodlucksil@lemmy.dbzer0.com on 08 Jan 20:51 next collapse

I blame Bush. He created ICE. But I also blame Trump for allocating 9 billions to ICE

captainlezbian@lemmy.world on 08 Jan 21:08 next collapse

I also blame Bush but largely for his firm commitment to ignore the spirit of the bill of rights

Goretantath@lemmy.world on 08 Jan 21:39 collapse

Bush was Reagan 2.0, Trump is 3.0, all put in by the Heritage Foundation.

umbrella@lemmy.ml on 08 Jan 21:29 collapse

reminder the modem firmware we use on our phones is exploitable and most likely backdoored, and in some cases it has memory access to the rest of the device. israeli espionage companies can do it and sell their capabilities to law enforcement. (this somewhat applies to pcs with ME and PSP too, btw)

meaning they can target you regardless of what apps you use. maybe not as easily or automated i guess, but always keep it in mind with their tech.

chillpanzee@lemmy.ml on 09 Jan 07:58 collapse

True, but they don’t even need 0days or software exploits to breach the systems. The data is harvested legally and sold to whoever wants to pay for it. Insane amounts of data about everything you do is made commercially available by phone platforms, tech companies, apps, banks, email providers, retail establishments, cell phone carriers, governments, and of course their continual data breaches.

Anybody can target you too, it doesn’t have to be espionage outfits or state sponsored threat actors. It’s just for sale.

umbrella@lemmy.ml on 09 Jan 16:58 collapse

my key point is that they can rely on these exploits/backdoors if you are resistant in using the commercial data harvesting software.

apparently a good percentage of pixel users are on graphene and fdroid, for example.