Drones, phones and other 2012 privacy threats
A drone flying at a height of 400 feet or more would likely be considered to be operating in a public space. So, the center argues, while police would need a warrant to peer over a private fence, they would not need one to use a drone to observe an individual in his or her backyard.
Warrantless cellphone location tracking: What Fourth Amendment?
Despite a major U.S. Supreme Court ruling in January on the constitutionality of GPS tracking by law enforcement agencies, the overall issue of location tracking of individuals remained as murky as ever in 2012.
Cellphones and other mobile devices offer criminal investigators a powerful tool for tracking suspects. Local police departments often use realtime cellphone data track individuals. In addition, historical cellphone data is often gathered -- without a warrant -- by police to track past activities of suspected criminals.
In a case now being heard by the U.S Fifth Circuit Court of Appeals, federal prosecutors maintain that there can be no reasonable expectation of privacy in historical cell phone location data that is collected and maintained by phone companies.
According to prosecutors, the Stored Communications Act (SCA) of 1986 allows them to use a relatively easy-to-obtain court order to force a carrier to turn over a person's historical cell-site location information.
The Sixth Circuit Court of Appeals in August agreed with that assessment, ruling that Fourth Amendment protections do not apply to cellphone location data.
Others courts, however, have ruled that cellphone data is protected.
Privacy advocates have expressed frustration at what they call a continuing lack of clarity over the issue.
Many contend that warrantless cellphone tracking goes against all reasonable expectations of privacy and, in many cases, violates Fourth Amendment prohibitions against unreasonable search.
The advocates say that location data from cellphones and other mobile devices allow law enforcement officials to gather extremely detailed and protected information about an individual.
In a landmark ruling in June, the U.S. Supreme Court agreed with privacy advocates that law enforcement officials need to first obtain a search warrant based on probable cause before conducting some types of location tracking.
However, the court's decision pertained only to the issue of warrantless GPS tracking. It did not address the crucial and much broader issue of whether similar tracking using cellphone data and other geo-tracking devices requires a warrant.
That lack of guidance leaves the door open for all sorts of warrantless cellphone tracking by the government and all sorts of interpretation of those actions by the courts, privacy advocates say.
Internet and mobile privacy: Or the continuing lack thereof
For several years, consumer rights groups and others have been calling on Congress to create regulations governing how Internet companies, online advertisers, mobile service providers and mobile application providers can collect and use consumer data.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!