<https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta>
A brazen hack that exposed consumer data collected by Apple and the
Facebook-parent company Meta has raised fresh questions about how secure our
data is in the hands of tech companies and how easily law enforcement can get
hold of the information big tech collects.
It was revealed last week that hackers obtained the information of some Apple
and Meta users by forging an emergency legal request, one of several mechanisms
by which law enforcement agencies can request or demand that tech companies
hand over data such as location and subscriber information.
Facebook demands LAPD end social media surveillance and use of fake accounts
Lawmakers and privacy advocates argued the forgery was a warning sign that the
system is in need of reform. “No one wants tech companies to refuse legitimate
emergency requests,” but the current system has “clear weaknesses”, Senator Ron
Wyden said in a statement following the hack.
A review of the myriad ways tech companies share consumer data with law
enforcement agencies reveals that it’s often fairly straightforward for such
bodies to get their hands on consumer data. “[Your data is] pretty much all
available to the government in one form or another,” said Jennifer Lynch, the
surveillance litigation director at the digital rights group the Electronic
Frontier Foundation.
“One of the real challenges with technology these days is that it is next to
impossible to figure out exactly all the data that companies are collecting on
us and to exert any kind of control over what happens to that data,” added
Lynch.
An emergency legal request, like the one the hackers forged, for instance,
doesn’t require a subpoena or warrant, unlike many other legal requests. It’s
supposed to be reserved for exceptional situations: Apple considers legal
requests an “emergency” if “it relates to circumstance(s) involving imminent
and serious threat(s) to: 1) the life/safety of individual(s); 2) the security
of a State; 3) the security of critical infrastructure/installation”. But, as
the hackers have shown, it can be easily exploited.
Apple and Meta did not respond to a request for comment.
Here are some of the main ways law enforcement can get hold of your data.
Accessing your device
Perhaps the most obvious way law enforcement can get your data is by accessing
your physical device. Police can subpoena your device or get a search warrant
to go through your phones. If your phone is locked or you only use encrypted
messaging apps, police can use mobile device forensic tools to break the
encryption or bypass your lock screens if they are armed with a warrant.
In February 2021, a US appeals court ruled that Customs and Border Protection
(CBP) can freely search your devices without a warrant at the borders. The move
created “a massive loophole to target anyone traveling into or out of the US”,
said Albert Fox Cahn, the founder of the privacy advocacy firm Surveillance
Technology Oversight Project.
Law enforcement requests
If you scan privacy policies of your most used apps you’ll probably find a
clause or two that says something along the lines of “we don’t share your user
data ever unless it’s in response to a law enforcement request”. That means
police, Immigration and Customs Enforcement (Ice), the FBI and other law
enforcement agencies can get your user data directly from tech companies
through various forms of legal requests, without having to search your device.
Sometimes, they can get it just by asking for it.
Google, for example, received more than 39,000 requests for user information
between July and December 2020, according to the company’s most recent
transparency report. Google handed over user info in response to more than 80%
of those requests, affecting the accounts of more than 89,000 users.
In many cases these requests come with gag orders, meaning the company cannot
notify users that their information has been requested for six months or more.
Sometimes it will be years before a user finds out their information has been
handed over to law enforcement.
There are a handful of different types of law enforcement requests, some more
sweeping than others and some carrying more legal weight. Three types of legal
requests in particular have recently sparked concern among activists and
experts: geofence warrants, keyword search warrants and administrative
subpoenas.
A keyword search warrant allows law enforcement to access the information of
anyone who searched for certain terms or keywords within a certain time period.
A geofence warrant allows law enforcement agencies to seek the device
information of all the users who were at a certain place at a certain time.
Google, the only company that currently discloses the number of geofence
warrants it receives, said it fielded a little under 3,000 in the last quarter
of 2020.
Both types of warrants, privacy experts say, are over-broad and thus violate
the constitutional protection against unreasonable searches. While many
warrants typically seek the information of a single person or group of people
who are suspected of a crime, geofence and keyword search warrants work
backwards and cast a wide net hoping to narrow down a list of suspects.
It’s not unlike cell-tower dumps, for which law enforcement agencies ask
cellphone companies for the information of all people who were connected to a
cell tower in the vicinity of a crime scene at the time the crime was suspected
to have occurred.
A federal judge in Virginia recently ruled that local authorities violated the
constitution when using a geofence warrant to investigate a 2019 robbery,
setting a precedent that attorneys representing people caught up in these types
of searches could use to receive remedies for being falsely suspected or
accused of a crime.
Administrative subpoenas carry less legal weight than other requests: law
enforcement agencies don’t need a judge to sign off on them but they also
aren’t self-enforcing. The only way the agencies can force a company to hand
over the data demanded in the request is by taking them to court after they
refuse to comply. Still, companies will often comply with the request even
though it is not a court-ordered subpoena. Some experts have expressed concern
of the use of this type of request by Ice, which has requested user data from
tech companies like Google, fearing the agency is using them to expand its
surveillance on US citizens. An Ice official previously said the agency does
not often send administrative subpoenas to tech companies for non-criminal
purposes. In a press release, Ice said it “uses statutorily-authorized
immigration subpoenas to obtain information as part of investigations regarding
potential removable aliens”.
Google did not immediately respond to a request for comment.
Data brokers
There is an entire industry of companies and firms that buy and sell your data
for a profit. The shadowy network of data brokers operates fairly under the
radar but often provides easy access to user data such as your location and
purchase history to other entities, including law enforcement.
Data brokers can collect your personal data from a handful of different
sources, such as your social media profiles, public records and other
commercial sources or companies. Some data brokers integrate directly into apps
to hoover up information like location and purchase history. These brokers,
which can include some telecommunications companies and credit reporting
agencies, then sell that raw data, or inferences and analysis based on that
data,to other companies and government agencies.
It’s not always clear whether a data broker has collected or sold your
information. In fact, recently data broker X Mode, whose customers include
military contractors, was exposed for buying location data from the Muslim
prayer app Muslim Pro without the knowledge of users of the app.
Surveillance tech companies
Law enforcement agencies also contract with surveillance tech companies like
Clearview AI and Voyager, which scrape your information from the internet and
social media and feed it into their own algorithms.
Consumer tech companies you may interact with on a daily basis also provide
services to police. Amazon’s smart doorbell Ring, for instance, gives some
police special access to their Neighbors social network and makes it easy for
the police to monitor and request Ring footage from consumers.
Contracts between tech companies and law enforcement agencies have become more
frequent as the tech industry seeks out new avenues of growth, experts say.
Because many of the spaces tech is already in have clear dominant players, law
enforcement contracts have become an appealing growth strategy because of the
seemingly endless supply of funding for agencies like the Department of
Homeland Security and local police.
Data-sharing
There’s also quite a bit of inter-agency data sharing happening at the local,
state and federal levels of government. While it might seem unsurprising that
law enforcement agencies share information, you might be surprised to learn
that an entity like the DMV shares information with agencies like Ice.
That data-sharing is made easier by services from companies like Palantir,
which creates a centralized network of digital records which include “chronic
offenders” and other people deemed of interest that can be easily accessed by
the company’s law enforcement partners at all levels – from many local police
departments to the FBI.
_______________________________________________
nexa mailing list
nexa@server-nexa.polito.it
https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa