Mobile Device Geo-location and Privacy Spencer These slides are available at Securiplay.com.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

THE FOURTH AMENDMENT Constitutional Law.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
 Respondent(Knotts) and two codefendants(Darryl Petschen, Tristan Armstrong) were charged with conspiracy to manufacture controlled substances.  The.
United States of America V. Craig Forest and Herman Garner Argued December 5, 2003 and filed January 27, 2004.
Copyright © 2014, Franczek Radelet P.C. All Rights Reserved. Disclaimer: Attorney Advertising. This presentation is a publication of Franczek Radelet P.C.
Business Law Essential Standard 1.00 Objective 1.01
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
123 Go To Section: 4 Presentation Pro © 2001 by Prentice Hall, Inc. Quiz: Judicial Branch In A Flash The Federal Court System.
Vivek Barbhaiya and John Coriasco
Miranda Rights 5th Amendment
Chapter 3 The Public/Private Interface and Legal Authority.
Essential Standard 1.00 Understand concepts of the legal system, trial procedures, and ethics. Unit A Business Law.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
MnGeo Statewide Geospatial Advisory Council Hot Topics November 28, 2012 Location Privacy.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
+ Protecting Individual Liberties Section 1 Chapter 14.
Public Communications Law Lecture 1 Slide 1 The First Amendment This course is fundamentally a study of the First Amendment freedoms and how they apply.
4 th & 5 th Amendment Rights BR: Are your privacy rights at risk today?
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 18 - The Fourth Amendment and National Security.
Use Policies Deputy Attorney General Robert Morgester
Analyzing a Court Decision An overview of Student Searches presented by Bart Fennemore.
United States v. Jones Presented by: Rebecca Son.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
The Judicial Branch. Copyright 2009 Pearson Education, Inc., Publishing as Longman Understanding the Federal Judiciary The Framers viewed the federal.
Criminal Investigations CJ 210 Week 3 Seminar. Week 2, Questions??? Does anyone have any questions concerning week 2? Does anyone have any questions concerning.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
Aim: How are federal judges appointed?. Appointment of Federal Judges The US Constitution authorizes the President to appoint anyone that the Senate will.
Unit 4 Lesson 8: Miranda v. Arizona
Investigative Constitutional Law Charles L. Feer, JD, MPA, Bakersfield College Department of Criminal Justice Investigative Constitutional Law.
4 th Amendment Timothy Bian, Myris Kramsch, Mazen Elhosseiny, Daniel Alday, John Scott, Kartik Raju.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
The Supreme Court and Lower Courts Chapter 3 Section3.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Teresa Brown Open Records Supervisor Plano Police Department
Courts System Search Warrants.
Miranda v. Arizona.
Rules of Evidence.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The 4th Amendment Notes 5-3.
Enforcement of Fourth Amendment Protections Is a man’s home his castle
Business Law Essential Standard 1.00 Objective 1.01
Protecting Your Rights
How Do the 4th and 5th Amendment Protect against unreasonable law enforcement procedures? Lesson 31.
The 4th Amendment Notes 5-3.
October 16, 2018 Modern Issues in the U.S. Agenda:
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
The University of Adelaide, School of Computer Science
Business Law Essential Standard 1.00 Objective 1.01
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Search & Seizure The act of taking possession of this property.
Business Law Essential Standard 1.00 Objective 1.01
Business Law Essential Standard 1.00 Objective 1.01
Baltimore Police Department & CitiWatch
Warm Up – April 2 Answer the following question on a post it:
Presentation transcript:

Mobile Device Geo-location and Privacy Spencer These slides are available at Securiplay.com

ABSTRACT Lack of controls on the use of geolocation services have resulted in proposed legislation, and interesting court cases. What are the ramifications of government, businesses and advertisers knowing the whereabouts, and having access to the contents of the metadata produced by you or your employees?

DISCLAIMER I am not an attorney. I am not providing a legal opinion, or offering legal advice. I am providing information regarding my research on this topic, which may include law or case law. My views are my own, any opinions expressed in this presentation are mine, and do not necessarily reflect the opinions of my employer. Please consult your attorney before adopting any of the practices discussed in this presentation. If you choose to implement any of the ideas expressed in this presentation, please mention the inspiration that this presentation provided.

GEO-LOCATION RISK

Tools and technologies that use geo-loc Mobile Device Management Camera photo coordinates (Exif) GPS driving directions. Social Geo-location – Yelp – Placely – Foursquare – Facebook – Twitter > Stream API

Use cases for mobile device geo-loc Use twitter feeds to monitor for live events in specific locations: – Tweet-to-map – Itsatwap – Twee.py – Python library. – Jasmine Intelligence search within a geo-fence surrounding a critical location. – During an open house what are people tweeting? – Are there a larger than normal number of tweets occurring around your facility > demonstration>#flashmob

What are the risks associated with geo-location? Legal Risks – GPS Trackers, Stingers, Cell phones Public Information – – Location of Sensitive Facilities – Side-Channel attacks – employee tracking by govt, thieves, PI’s journalists, etc. – City Data Warehouses – Ownership of sensitive locations, security and fire POC’s, location of municipal infrastructure facilities. Competitive Intelligence – Tracking of your employees by competitors GPS Jamming – Timing attacks – Industrial Control Systems

What are the risks associated with geo-location? Personal Privacy Risk – Find my cheating spouse – Find my iPhone Children – COPPA HIPAA / HITECH / OMNIBUS – Is knowing what kind of Dr. your employee is visiting a violation, if your company issued mobile device or MDM solution tracks location? Driving Habits / (The 7 habits of highly uninsurable people) – Progressive Snapshot – Log Miles, Hard Brakes, Time of Day – Waze – Social Media GPS app – Logs where you were, length of travel, and other things.

Are your whereabouts protected information? Statutory Law – Texas Bill – HB No – warrant requirement for access to stored communications and customer data. Proposed Statutory Law – Federal GPS Act – Geo-location Privacy and Surveillance act (HR 1312, SB 639 – referred to judiciary and intelligence committee. Online Communications and Geolocation Privacy Protection act (HR 983, referred to house intel and judiciary committee) Location Privacy Protection act (S – 112 th congress) – Not yet reintroduced in 113 th. – States proposing laws – Maryland, NJ, Regulation – GPS Jamming Case law – US vs. Antoine Jones – US vs. Melvin Skinner – State vs. Earls

U.S. V. ANTOINE JONES On January 23, 2012, the U.S. Supreme Court announced its unanimous decision in United States v. Antoine Jones (No ), a case addressing the constitutional privacy rights of American citizens in the face of modern tracking systems based on GPS and other technologies. The Court ruled that law enforcement must obtain a warrant prior to attaching a GPS device to a suspect's vehicle in order to monitor its movements. In this case, the FBI and District of Columbia police affixed a hidden GPS device to the vehicle of suspected drug dealer Antoine Jones in a public parking lot. The device recorded and transmitted the vehicle's movements for 28 days.

U.S. V. SKINNER , U.S. CIRCUIT COURT OF APPEALS FOR THE SIXTH CIRCUIT A man convicted of marijuana trafficking had no reasonable expectation of privacy with the mobile phone he was using when apprehended, a U.S. appeals court ruled. Federal agents tracked Melvin Skinner to Abilene, Texas, using the global positioning signals emitted by his mobile phone, found him in possession of more than 1,100 pounds (498 kilograms of marijuana and arrested him in July 2006, the court said in its 2-1 ruling today.Texas Skinner appealed his convictions for trafficking and other federal crimes as well as a lower court ruling that the GPS tracking was lawful and that evidence found in the ensuing search was admissible. “If a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal,” U.S Circuit Judge John M. Rogers wrote. “The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools.”

STATE OF NJ VS. THOMAS EARLS Users of cellular telephones had a legitimate expectation of privacy in information revealing the location of the telephone, and, thus, under state constitution, police officers were required either to obtain a search warrant or be able to show existence of an exception to warrant requirement, requirement, such as exigent circumstances, in order to obtain location information from defendant’s cellular telephone service provider; even if telephone users were required to disclose information to providers in order to obtain service, such disclosures were not made in order enable telephone to serve as a tracking device, and users were reasonably entitled to expect confidentiality in large amount and revealing nature of information available through telephone records. N.J.S.A. Const. Art. 1, par. 7. STATE of New Jersey, Plaintiff–Respondent, v. Thomas W. EARLS, Defendant–Appellant. Argued Oct. 22, | Reargued Jan. 29, | Decided July 18, 2013.