Why police want your smartphone data
It's time to push back against the harvesting of smartphone data by police, border agents and government organizations. Here's why.
A tension has existed for centuries between the desire for efficient law enforcement on the one hand and the desire for personal privacy on the other.
That’s why the framers of the constitution added the 4th Amendment to the Constitution, which guarantees the right for Americans’ “persons, houses, papers, and effects” to be free from “unreasonable searches and seizures.” The Amendment does allow searches, but only after “probable cause” has been established. When they search for something, they have to specify what they’re looking for.
In other words: The Constitution bans police fishing expeditions that just go looking for a crime, any crime.
Unfortunately, they didn’t mention smartphones.
We all want criminals to be caught. But we don’t want to live in a sci-fi dystopia where computers sift through all human data day and night fishing for crimes and, for example, using the data from one person to expose the crimes of another — say, a family member or friend.
The reality is that the balance between law enforcement’s instinct to gather all the data that’s out there and the public’s desire to keep personal data private is upset with each new generation of technology. Every time there’s a new capability, police try to use that capability to tilt the game in their favor.
The biggest disruptor is the smartphone — the ultimate tracking, data gathering, personal information-exposing technology ever invented. Because of that, police really, really want it.
The Justice Department’s efforts to catch former US president Donald “Teflon Don” Trump — who is infamous for getting others to commit crimes on his behalf without himself being implicated — have turned to what they hope are rich nuggets of gold in the smartphones of nine Trump associates.
The feds this week seized the phones of Rudy Giuliani, Jeffrey Clark, John Eastman, Victoria Toensing, Michael McDonald, Scott Perry, Boris Epshteyn, Mike Roman and last and definitely least, Mike Lindell, the My Pillow guy. They’re hunting for evidence in Trump’s larger scheme to steal the 2020 election.
Meanwhile, Australian “technology detection dogs” are in the news. Australian Federal Police held a “Technology Detection Dog Symposium” recently to further the cause of developing a nationwide pack of dogs that can use their keen sense of smell to find smartphones and other data-storing personal devices like so many truffles.
The problem this solves for police is that when searching a home for evidence, they might miss hidden hard drives and flash drives and thumb drives containing compromising material. The idea is that if there’s any data-storing device in the house, car or place of business they’re searching, they want to find it and use it in their investigations. That’s how valuable electronic data is.
All this news points to police going to extreme lengths to make sure they get the smartphone data pertinent to alleged crimes. But what about the smartphone data of people not even accused?
Before the pandemic, I warned you about changing rules around airport security agents and their legal right to download your personal and business data.
We learned today that as many as 10,000 electronic devices (mostly smartphones) now have their contents copied at border crossings (mostly airports) each year (and growing). This data is fed into a giant database that’s part of the Department of Homeland Security’s Automated Targeting System and kept there for up to 15 years. The data in that database is currently accessible by some 2,700 border patrol officers without a warrant, and most of the victims aren’t charged or even suspected of a crime.
(Here’s my advice for how to protect your data from such invasive searches.)
This kind of data collection — affected at scale and dropped into a long-term database that can be accessed later — is by far the most insidious and threatening scenario, and I’ll tell you why.
Mike’s List of Brilliantly Bad Ideas
1. Has keyboard enthusiasm gone too far?
Keebmonkey is now selling a product called the Wireless Keyboard Display Box. It’s a translucent case for displaying your keyboard like it’s the fricken Hope Diamond at the Smithsonian. Reflective interior surfaces let you see the keyboard from multiple angles. And a motion-detector triggers a light, so that when anyone walks up to the case, the keyboard is illuminated.
2. Has LEGO enthusiasm gone too far?
The Pixel is a LEGO-compatible keyboard from MelGeek. It’s a regular keyboard, but with LEGO-compatible studs for adding LEGO bricks, Minifigs and other LEGO parts. Better still each key is actually a cap on top of a LEGO-compatible key, so you can remove the cap and add LEGO bricks as keys you type on.
3. VR goggles for your mouth. Why, Japan? Why?
A company called Shiftall (read it carefully — it’s not “Shitfall) is hawking a product called the Mutalk. It looks like VR goggles for your mouth. The purpose of the product is to be able to trash-talk other avatars in virtual reality without upsetting the librarian or waking up your mother from the basement. It lets you talk into a microphone without being heard by others nearby, and also to shield your voice from ambient sound. I don’t know what the “metaverse” will look like, but this is what YOU will look like in the metaverse.
Mike’s List of Shameless Self Promotions
It's time to quit quitting on the quiet quitters
CISA certification: what you need to know
Why Apple is building two different smartglasses platforms
Get ready for the rise of imposter employees