Drones, phones and other 2012 privacy threats
A drone flying at a height of 400 feet or more would likely be considered to be operating in a public space. So, the center argues, while police would need a warrant to peer over a private fence, they would not need one to use a drone to observe an individual in his or her backyard.
Warrantless cellphone location tracking: What Fourth Amendment?
Despite a major U.S. Supreme Court ruling in January on the constitutionality of GPS tracking by law enforcement agencies, the overall issue of location tracking of individuals remained as murky as ever in 2012.
Cellphones and other mobile devices offer criminal investigators a powerful tool for tracking suspects. Local police departments often use realtime cellphone data track individuals. In addition, historical cellphone data is often gathered -- without a warrant -- by police to track past activities of suspected criminals.
In a case now being heard by the U.S Fifth Circuit Court of Appeals, federal prosecutors maintain that there can be no reasonable expectation of privacy in historical cell phone location data that is collected and maintained by phone companies.
According to prosecutors, the Stored Communications Act (SCA) of 1986 allows them to use a relatively easy-to-obtain court order to force a carrier to turn over a person's historical cell-site location information.
The Sixth Circuit Court of Appeals in August agreed with that assessment, ruling that Fourth Amendment protections do not apply to cellphone location data.
Others courts, however, have ruled that cellphone data is protected.
Privacy advocates have expressed frustration at what they call a continuing lack of clarity over the issue.
Many contend that warrantless cellphone tracking goes against all reasonable expectations of privacy and, in many cases, violates Fourth Amendment prohibitions against unreasonable search.
The advocates say that location data from cellphones and other mobile devices allow law enforcement officials to gather extremely detailed and protected information about an individual.
In a landmark ruling in June, the U.S. Supreme Court agreed with privacy advocates that law enforcement officials need to first obtain a search warrant based on probable cause before conducting some types of location tracking.
However, the court's decision pertained only to the issue of warrantless GPS tracking. It did not address the crucial and much broader issue of whether similar tracking using cellphone data and other geo-tracking devices requires a warrant.
That lack of guidance leaves the door open for all sorts of warrantless cellphone tracking by the government and all sorts of interpretation of those actions by the courts, privacy advocates say.
Internet and mobile privacy: Or the continuing lack thereof
For several years, consumer rights groups and others have been calling on Congress to create regulations governing how Internet companies, online advertisers, mobile service providers and mobile application providers can collect and use consumer data.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts