Moran, Blunt, Fischer unveil bill to bolster law enforcement’s location of missing persons

Tuesday, March 2, 2021 | By Ripon Advance News Service – The Ripon Advance |

Legislation introduced on Feb. 25 by U.S. Sens. Jerry Moran (R-KS), Roy Blunt (R-MO), and Deb Fischer (R-NE) would expedite law enforcement’s help in locating missing persons during emergency situations by requiring cell phone carriers to provide them with limited cell phone data.

“This legislation will make certain first responders have the tools they need to quickly locate people who have been abducted,” Sen. Moran said. “I urge my colleagues to support this sensible bill to help save lives.”

Sen. Moran sponsored the Kelsey Smith Act, S. 466, with cosponsors Sens. Blunt and Fischer. According to the bill summary, the legislation would require providers of a covered service to provide location information concerning the telecommunications device of a user of such service to an investigative or law enforcement officer or an employee of a public safety answering point in an emergency situation involving risk of death or serious physical harm or in order to respond to the user’s call for emergency services.

The bill is named for 18-year-old Kelsey Smith, who was abducted and murdered in 2007.

“The Smith family experienced a terrible tragedy that was made even more agonizing by the delay in finding their daughter, Kelsey,” said Sen. Blunt. “The Kelsey Smith Act will provide law enforcement an important tool in their efforts to find and save the lives of kidnapping victims.”

If approved, S. 466 would create a limited exception that protects individuals’ privacy rights and addresses carriers’ liability concerns. This “narrowly crafted approach” also would “bring federal law in line with the laws that are already on the books in Missouri and many other states,” Sen. Blunt said.

Law enforcement agencies were unable to locate Kelsey Smith for four days following her abduction due to red tape that prevented them from accessing her cell phone location data. After they obtained the data, Kelsey’s body was found within 45 minutes, according to the lawmakers.

“When someone’s life is at risk, it is critical that law enforcement has the tools to respond as quickly as possible,” Sen. Fischer said. “By rapidly providing law enforcement with victims’ call location information, the Kelsey Smith Act will save the lives of innocent people while ensuring there is accountability for such requests.”

A total of 27 states have enacted similar laws to the Kelsey Smith Act and federal legislation would create a uniform law nationwide, according to Sen. Blunt’s office.

Read the full story here.

So Long as You Carry a Cellphone, the Government Can Track You

Fri. Feb. 26, 2021 | By J.D. Tuccille – Reason.com |

Cell phones are convenient devices, handily connecting us with loved ones, paying bills, accessing information—and treacherously reporting on our every move. Worse, even after the Supreme Court weighed in, many government agencies still insist that they have the right to pull up that tracking data to see our whereabouts. It’s increasingly apparent that, if you have your phone in your pocket, you may as well have a GPS beacon strapped to your ankle. If you want anonymity from the government, leave the gadget at home.

That point was illustrated in the wake of the Capitol riot, when the authorities pulled cell phone records to see who was present.

“In the hours and days after the Capitol riot, the FBI relied in some cases on emergency orders that do not require court authorization in order to quickly secure actual communications from people who were identified at the crime scene,” The Intercept reported this week. “Investigators have also relied on data ‘dumps’ from cellphone towers in the area to provide a map of who was there, allowing them to trace call records — but not content — from the phones.”

The data collected by people’s phones and the apps they use, often compiled by marketing firms, is amazingly detailed. An individual “outraged by the events of Jan. 6” supplied data on participants in the day’s events to The New York Times, whose writers were thoroughly creeped out by the information…

Read the full story here.

Bill targets how police use info showing where you’ve been and what internet searches you make

Thurs. Feb. 25, 2021 | By Art Raymond – Deseret News |

SALT LAKE CITY — A new tool in wide use by law enforcement agencies across the country can draw a circle on any map and seek out, through chilling data search techniques, who was in or near that area at any specific time.

That’s all thanks to the signals your cellphone is constantly receiving and emitting, whether you’re using it or not.

So if you happened to be walking your dog through that search zone at the same time a crime was committed, you could end up as part of an investigation based on nothing more substantial than easily obtainable records showing everywhere you’ve been with that cellphone in your pocket.

Now, a bill that could have created landmark restrictions on these type of dragnet-style law enforcement searches, ones that can access databases showing not only where you’ve been but what searches you’ve conducted on your browser — even if you’re not a suspect — has been toned down by Utah lawmakers but could still lead to some new privacy protections for residents.

So-called reverse location and reverse keyword searches are possible thanks to data stored by Google and other digital platforms that include historical information about where a cellphone user has traveled, through built-in location tracking abilities in mobile devices, and every search term you’ve used on some browsers…

Read the full story here.

Treasury Oversight Says IRS Should Consider Getting Warrants Before Buying Location Data From Data Brokers

Wed. Feb. 24, 2021 | By Tim Cushing – TechDirt.com |

Last October, Senators Ron Wyden and Elizabeth Warren asked the IRS’s oversight to take a look at the agency’s use of third-party data brokers to obtain cell site location info harvested from phone apps. This new collection of location data appeared to bypass the Supreme Court’s Carpenter decision, which said cell site location info was protected by the Fourth Amendment.

This means warrants were needed to obtain this information from cell service providers. Multiple government agencies — including the CBP, DEA, and Defense Department — appear to believe approaching data brokers a couple of steps removed from the location data collection process aren’t affected by this warrant requirement. While both cell site location info from cell providers and bulk data from brokers can accomplish the same long-term tracking of individuals, the latter tends to be less detailed since it sometimes requires apps to be in use to produce location data, rather than just connected to a cell tower.

The IRS may have believed no warrants are needed to buy bulk data from brokers, but its oversight disagrees. The Treasury Department Inspector General says the 2018 Supreme Court ruling may cover this data as well.

A new Treasury Department watchdog report warns that law-enforcement agencies may not be on firm legal footing when they use cellphone GPS data drawn from mobile apps without obtaining a warrant first.In a review of the Internal Revenue Service’s use of a commercial platform that allowed the agency to track cellphones, the Treasury Department inspector general for tax administration said that a landmark 2018 Supreme Court case might preclude the warrantless tracking of criminal suspects through location data generated by weather, game and other apps. The report encouraged stricter controls on use of the data.

But it’s only a “may.” The report [PDF] says the IRS should consider seeking a warrant before obtaining this data in the future. However, the IRS hasn’t purchased data for a few years now because it doesn’t consider it useful. And its only utilization of data broker Venntel occurred before the Supreme Court’s Carpenter decision was handed down.

According to the purchase order, the subscription was for one year from September 9, 2017, through September 8, 2018, at the cost of $19,872. CI stated that the single-user license subscription was used exclusively by a single field office in the Cyber Crimes Unit, and Venntel was only utilized on a few specific occasions and did not produce effective results. According to CI, the last use of this database was in March 2018…

That would be two months before the Carpenter decision, which would make it a good faith effort if anyone were to challenge this evidence. But if anyone was going to, they’d likely already have done it. And the IRS’s limited use (at least of this vendor) reinforces the IRS’s claims that bulk location data from brokers doesn’t help it with investigations.

Even given the Supreme Court’s 2018 decision, IRS officials still seem to believe if the agency make use of this in the future, agents still wouldn’t need to seek a warrant.

Carpenter v. U.S. was decided in June 2018. The last known attempt to use the Venntel product was March 2018, before the Supreme Court decision. Nevertheless, it is our understanding that the Carpenter decision concerned historical Cell Site Location Information which is distinct from the opt-in app data available on the Venntel platform.

Ah, but that’s the same argument the government made to attempt to avoid a search warrant requirement: that the location data was voluntarily obtained from cellphone users. The Supreme Court disagreed, saying the data was collected continuously, even when owners weren’t actively using their cellphones. If US government agencies continue to seek this data without a warrant, they’re likely going to start generating caselaw contradicting their presumptions.

Treasury Oversight suggests warrants. The IRS suggests they aren’t necessary. For now, the only thing preventing internal conflict is the IRS’s determination that this particular form of cell location data is mostly useless.

Read the full story here.

Gmail [Google] reveals the massive amount of data it has on you

Wed. Feb. 24, 2021 | By Charlie Fripp – Komodo.com |

Apple recently changed its policy and now forces app developers to tell you what data the app will collect with “privacy labels” before downloading it. Developers must also reveal what this information is being used for.

And in most cases, it’s for third-party advertising. Tap or click here to see exactly what info your iPhone apps are collecting.

Even if you use Apple devices, like an iPhone, you may still use some Google products. Google finally has decided to disclose how much data is being collected on you if you use Gmail on your iPhone. The amount being collected is shocking!

Google’s treasure trove of information

Things get a bit murky when it comes to Google. Eagle-eyed iPhone users would have noticed that Google’s Gmail app didn’t update when iOS 14 added the privacy labels change. In fact, Gmail was only updated a month later — with some big privacy changes. While you still need to consent to Gmail and YouTube gathering your information, few iOS users will realize how much it is.

Why, you may ask? Well, that’s because advertising is how services like Gmail and YouTube make money. Google eventually added the new privacy labels for its iOS apps, but many people tap through to download an app without pausing.

Very few will stop to read the terms and conditions or the app’s privacy policy. Taking the time to go through Gmail’s privacy notifications, it might come as a shock what personal information Google has on you.

To download the app and use the free services, you must agree to the terms and conditions. Allowing third-party advertisers to know your location, User ID and usage data is just the beginning.

Apple App Store

For Google’s “Product Personalization,” the app gathers your contact list, emails or text messages, audio data and search history. It also monitors how you interact with other products and services.

Under the “App Functionality” tab, Gmail links the following data to you…

Read the full story here.