Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
IPhone Designed to Secretly Track Location of Users
#1
IPhone Designed to Secretly Track Location of Users

Security researchers have revealed that Apple's popular iPhone has been designed to secretly track a user's location and store the information on the device, without the user's knowledge. Some phones may contain enough tracking information to trace a person's movement for an entire year. Pete Warden is one of the researchers who discovered the secret program. He said, "Apple has made it possible for almost anybodya jealous spouse, a private detectivewith access to your phone or computer to get detailed information about where you've been."
....and what websites/phone numbers/emails etc. you have been in contact with.Spy
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#2
Report: Germany privacy watchdog asks Apple about location tracking on iPhone, iPad

By Associated Press, Saturday, April 23, 7:40 AM

BERLIN A German privacy watchdog is demanding answers from Apple Inc. over whether its iPhones and iPads are secretly collecting data on users' locations.

Thomas Kranig, head of the data protection authority for the state of Bavaria, where Apple has its German headquarters, said in an interview published in Saturday's Sueddeutsche Zeitung that the company has until May 10 to respond.

Apple has come under pressure since researchers raised questions about how tracking data gathered by iPhones and iPads is being handled.

Germany has some of the world's strictest privacy laws and has tangled with Google, Facebook and other U.S.-based technology companies over personal data and how it's used.

Calls to Kranig and to Apple were not immediately returned. :wavey:
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#3

How wide does this go? Now Google devices 'found to transmit user locations back to the company'

By Daily Mail Reporter
Last updated at 9:01 PM on 22nd April 2011
  • Google's Android HTC phone transmitted data back to Google several times an hour
  • Apple slammed for user locations being stored iniPhone and iPad
  • Google and Apple are using location data to build databases of Wi-Fi hotspots
  • Data from Apple devices syncs with computer, meaning anyone with access can see

  • Representative Edward Markey questions whether the practice may be illegal
The row over the privacy of mobile phone users escalated today as it was revealed that Google devices regularly transmit user locations back to the company.
The new revelations come after Apple was this week slammed by several Congress members for the way user locations are being stored in unencrypted databases on the iPhone and iPad, sometimes stretching back several months.

In Google's case an Android HTC phone tracked its location every few seconds and transmitted the data back to Google several times an hour, according to new research by security analyst Samy Kamkar for the Wall Street Journal.

Reply
#4
These Bastards,someday,are going to data base everytime you take a crap!

Just Sayin'

:hippy:
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
Buckminster Fuller
Reply
#5
Christer Forslund Wrote:
How wide does this go? Now Google devices 'found to transmit user locations back to the company'

Christer - see Denninger here. With Android, it appears that the location tracking app had to be consciously switched on, and thus consciously consented to, by the user. In theory, at least.

However, more broadly, google tracks pretty much everything one does and uses it to "build a profile". Quantico style.

A couple of years ago, I was researching the phenomenon of stigmata, and browsed a lot of fairly extreme Catholic books and sources online. I suspect the AI software used by the Profilers is now convinced that I'm a loyal disciple of Padre Pio... :pope:
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#6
Keith Millea Wrote:These Bastards,someday,are going to data base everytime you take a crap!

Just Sayin'

:hippy:

Certainly possible already in Japan...where public toilets are computerized and sense if the person [unisex toilets] is a male or female and raises or lowers the seat accordingly for the 'most usual' activity. It also gives a readout of the amount of urine [and pH and sugar content and some other variables] or feces variables....so it could easily be combined with the persons mobile and bingo.... Can't wait until they install them everywhere. Confusedmallprint:
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#7
Peter Lemkin Wrote:
Keith Millea Wrote:These Bastards,someday,are going to data base everytime you take a crap!

Just Sayin'

:hippy:

Certainly possible already in Japan...where public toilets are computerized and sense if the person [unisex toilets] is a male or female and raises or lowers the seat accordingly for the 'most usual' activity. It also gives a readout of the amount of urine [and pH and sugar content and some other variables] or feces variables....so it could easily be combined with the persons mobile and bingo.... Can't wait until they install them everywhere. Confusedmallprint:

Halfway there...............Confusedhock:
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
Buckminster Fuller
Reply
#8
No Place to Hide: Internet Tracking Probe Unveiled as New Smartphone Spy Scandal Unwinds
As the United States morphs into a failed state, one unwilling and soon perhaps, unable, to provide for the common good even as it hands over trillions of dollars to a gang of financial brigands engorged like parasitic ticks on the wealth of others, keeping the lid on is more than just an imperial obsession: it's big business.

Earlier this month, New Scientist reported that "a new way of working out where you are by looking at your internet connection could pin down your current location to within a few hundred metres."

Although similar techniques are already in use, they are not very accurate in terms of closing the surveillance trap. "Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical location," reporter Jacob Aron informs us. "The current best system can be out by as much as 35 kilometres."

However, Yong Wang, "a computer scientist at the University of Electronic Science and Technology of China in Chengdu, and colleagues at Northwestern University in Evanston, Illinois, have used businesses and universities as landmarks to achieve much higher accuracy."

According to New Scientist, "Wang's team used Google Maps to find both the web and physical addresses of such organisations, providing them with around 76,000 landmarks. By comparison, most other geolocation methods only use a few hundred landmarks specifically set up for the purpose."

With geolocation tracking devices embedded in smartphones (and, as we'll see below, this data is stored without their users' consent), all of which is happily turned over to authorities by telecoms (for the right price, of course!), as privacy researcher Christopher Soghoian revealed in 2009, it becomes abundantly clear that sooner than most people think they'll be no escaping Big Brother's electronic dragnet.

"The new method," Aron writes, "zooms in through three stages to locate a target computer." First, the team of public-private financed research snoops measured "the time it takes to send a data packet to the target and converts it into a distance--a common geolocation technique that narrows the target's possible location to a radius of around 200 kilometres."

Wang and his cohorts then "send data packets to the known Google Maps landmark servers in this large area to find which routers they pass through." New Scientist reports that when "a landmark machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this time difference narrows the search down further."

"We shrink the size of the area where the target potentially is," Wang cheerfully explained.

"Finally," Aron writes, "they repeat the landmark search at this more fine-grained level: comparing delay times once more, they establish which landmark server is closest to the target."

"On average," we're told, "their method gets to within 690 metres of the target and can be as close as 100 metres--good enough to identify the target computer's location to within a few streets."

While New Scientist focused their attention on how an IP address tracking tool might be a boon to advert pimps, who else might find the method "useful in certain situations"?

Tightening the Surveillance Noose

Back in December, The Wall Street Journal reported that "few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name--even a unique ID number that can never be changed or turned off."

As part of the Journal's excellent "What They Know" series, reporters Scott Thurm and Yukari Iwatani Kane revealed that an examination of more than 100 smartphone apps for Apple's iPhone and Google's Android platforms "showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent," 47 apps "transmitted the phone's location in some way," and "five sent age, gender and other personal details to outsiders."

Like the New Scientist report above, the Journal focused their investigative lens on "intrusive effort[s] by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them."

Without a doubt, such data is already being collected by various police intelligence agencies at the local, state and federal levels.

In all likelihood, smartphone geolocation data has now been added to the dossier creation mix, another component of the secret state's massive national security index called "Main Core" by investigative journalists Christopher Ketchum and Tim Shorrock.

As Ketchum reported in his 2008 piece, three unnamed former intelligence officials told him that "8 million Americans are now listed in Main Core as potentially suspect" and, in the event of a national emergency, "could be subject to everything from heightened surveillance and tracking to direct questioning and even detention."

We've now learned that Apple's iPhone and iPad and Google's Android smartphone platforms "constantly track users' physical location and store the data in unencrypted files that can be read by anyone with physical access to the device," The Register disclosed.

And with technological advances far-outstripping legal remedies to protect Americans' privacy as Soghoian wrote last week, and with Congress and the Obama administration further lowering the boom, the notion that our personal communications are off-limits to advertisers and government officials is as quaint as the concept that financial institutions should be transparent when it comes to investing our hard-earned dollars.

According to researchers Pete Warden and Alasdair Allen, who first reported their findings on the iPhone Tracker blog, the geolocation file is stored on both the iOS device and "any computers that store backups of its data," and "can be used to reconstruct a detailed snapshot of the user's comings and goings, down to the second."

The researchers aver that despite Apple's refusal to even acknowledged the existence of these files, or frankly what the firm does with the data once its been downloaded to their servers, users of iPhones and iPads are put at risk that their movements are available to any and all comers with the requisite skills to access their information.

"The most immediate problem is that this data is stored in an easily-readable form on your machine," Warden and Allen wrote.

"Any other program you run or user with access to your machine can look through it. By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements."

Needless to say, such information would be a boon to police agencies seeking to "terminate with extreme prejudice" the ability of protest organizers to communicate with demonstrators, as happened during the G20 protests in Pittsburgh, as Antifascist Calling reported in 2009.

Elliot Madison was arrested after he relayed a police order to disperse message via Twitter to demonstrators during the protests. A week later, his New York City home was raided by the FBI's Joint Terrorism Task Force (!) which carted off his computers and cell phone as "evidence." Madison and co-defendant Michael Wallschlaeger were criminally charged with using computers, cell phones and a police scanner to track the movements of "Pittsburgh's finest." Federal prosecutors charged the activists with "hindering apprehension or prosecution, criminal use of a communication facility, and possession of instruments of crime."

While such repressive acts may have raised eyebrows two years ago, they have now become part of the seamless panopticon spreading across the "shining city on a hill" like an invisible swarm of privacy-killing locusts.

Last week, in the wake of the smartphone tracking scandal, CNET News reported that "law enforcement agencies have known since at least last year that an iPhone or iPad surreptitiously records its owner's approximate location, and have used that geolocation data to aid criminal investigations."

Security journalist Declan McCullagh revealed that although "Apple has never publicized the undocumented feature buried deep within the software that operates iPhones and iPads," the secretive Mountain View firm acknowledged to Congress last year that "cell tower and Wi-Fi access point information" is "intermittently" collected and "transmitted to Apple" every 12 hours.

CNET reported that "phones running Google's Android OS also store location information," according to Swedish programer Magnus Eriksson. Another researcher told McCullagh that "'virtually all Android devices' send some of those coordinates back to Google."

"Among computer forensics specialists," CNET avers, "those location logs--which record nearby cell tower coordinates and time stamps and cannot easily be disabled by someone who wants to use location services--are not merely an open secret. They've become a valuable sales pitch when targeting customers in police, military, and intelligence agencies."

In other words, enterprising grifters from niche security firms servicing the secret state--or anyone willing to pay for their unique services, say a dodgy employer, a jealous spouse or a sociopathic freak for that matter--can take advantage of a smartphone's embedded location files.

CNET reported that the "U.K-based company Forensic Telecommunications Services advertises its iXAM product as able to 'extract GPS location fixes' from an iPhone 3GS including 'latitude, longitude, altitude and time'."

"Its literature boasts," McCullagh writes, that "'these are confirmed fixes--they prove that the device was definitely in that location at that time'."

"Another mobile forensics company, Cellebrite," CNET avers, even "brags that its products can pluck out geographical locations derived from both 'Wi-Fi and cell tower' signals, and a third lists Android devices as able to yield 'historical location data' too."

Just last week, The Tech Herald disclosed that the Michigan State Police have been using a handheld device and "secretly extracting information from cell phones during traffic stops," and have refused to release information on this program to the ACLU.

The Tech Herald reports that for "nearly three years, the ACLU has attempted to get the Michigan State Police (MSP) to answer questions over their use of Cellebrite's UFED Physical Pro scanner."

"The handheld device allows police to extract data from phones and SIM memory," journalist Steve Ragan writes, and that "in addition to the normal information, such as contact lists, email, and text messages, the UFED is also able to recover hidden and deleted data."

Manufactured by security outfit Cellebrite, the company boasts that their "mobile forensics products enable extraction and analysis of invaluable evidentiary data including deleted and hidden data for military, law enforcement, governments, and intelligence agencies across the world," according to a blurb on their web site.

The ACLU charges that the device is routinely used during traffic stops and that state troopers were able to access the mobile devices without their users being aware their data was being grabbed.

In their letter to the MSP, the ACLU cautioned that "The Fourth Amendment protects citizens from unreasonable searches. With certain exceptions that do not apply here," the civil liberties watchdogs averred, "a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity."

"A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched."

Sounds reasonable, right? The MSP responded by demanding the ACLU fork over $544,680 before they'd even consider releasing these public documents!

But as Cryptohippie reported in their excellent study, The Electronic Police State, "two crucial facts about the information gathered under an electronic police state are these: 1. It is criminal evidence, ready for use in a trial. 2. It is gathered universally ('preventively') and only later organized for use in prosecutions."

"In an Electronic Police State," researchers averred, "every surveillance camera recording, every email sent, every Internet site surfed, every post made, every check written, every credit card swipe, every cell phone ping... are all criminal evidence, and all are held in searchable databases. The individual can be prosecuted whenever the government wishes."

Called a "Universal Forensic Extraction Device," Cellebrite claims their "UFED family of products is able to extract and analyze data from more than 3000 phones, including smartphones and GPS devices."

According to the firm, such tools will prove invaluable to secret state snoops. "Diving deeper into a mobile phone's memory than ever before provides them with the ability to gather data and establish connections between networks and people that is quicker and easier to arrive at."

The secret-spilling web site Cryptome has generously provided us with with Cellebrite's Smartphone PDA Spy Guide. Amongst other things, we're told that the firm's "UFED Forensics system empowers law enforcement, anti-terror and security organizations to capture critical forensic evidence from mobile phones, Smartphones and PDAs."

"UFED," we're informed, "extracts vital data such as phonebook, camera pictures, videos, audio, text messages (SMS), call logs, ESN IMEI, ICCID and IMSI information from over 1,600 handset models, including Symbian, Microsoft Mobile, Blackberry and Palm OS devices."

Think you've erased those messy call logs or text messages to your girl- or boyfriend? Better think again! With Cellebrite on the job, "the UFED can extract data from a phone, or directly from the SIM card. When extracting from phone, the UFED connects to the phone via cable, Bluetooth or infrared, and the data is read logically from the phone. It also performs a physical extraction from SIM cards, allowing extraction of additional data such as deleted SMS, ICCID, IMSI, location information and more."

We're told that the company's UFED "helps intelligence agencies widen their view and form a complete picture with access to content that can be repurposed, analyzed, and linked to information existing in databases," Main Core, or a similar national security index, perhaps?

"For us, people look like little particles..."

While digital technologies advance by leaps and bounds, the Empire's political-economic requirements are determining how new devices will be used, who has access to the data points and, once our personal details are extracted--by corporations or shadowy intel outfits (public and private) who do their bidding--what happens to it once it's been stored in giant data farms.

The Wall Street Journal reported that Massachusetts Institute of Technology researchers are conducting a study that "has tracked 60 families living in campus quarters via sensors and software on their smartphones--recording their movements, relationships, moods, health, calling habits and spending."

"In this wealth of intimate detail," reporter Robert Lee Hotz writes, MIT researcher Alex Pentland "is finding patterns of human behavior that could reveal how millions of people interact at home, work and play."

According to preliminary findings, "the data can predict with uncanny accuracy where people are likely to be at any given time in the future," and the data "can reveal subtle symptoms of mental illness, foretell movements in the Dow Jones Industrial Average, and chart the spread of political ideas as they move through a community much like a contagious virus, research shows."

"Advances in statistics, psychology and the science of social networks are giving researchers the tools to find patterns of human dynamics too subtle to detect by other means," the Journal reports.

At Northeastern University in Boston for example, "network physicists discovered just how predictable people could be by studying the travel routines of 100,000 European mobile-phone users."

"After analyzing more than 16 million records of call date, time and position," Hotz reports, "the researchers determined that, taken together, people's movements appeared to follow a mathematical pattern," and that given enough information about past movements, scientists averred "they could forecast someone's future whereabouts with 93.6% accuracy."

Chillingly, Northeastern physicist Albert-Laszlo Barabasi, who conducted the study, told the Journal: "For us, people look like little particles that move in space and that occasionally communicate with each other. We have turned society into a laboratory where behavior can be objectively followed."

Ruthless "objectivity" such as this have real world consequences, not that it matters to those whose butter their bread by bludgeoning our privacy and cratering our political rights.

"As a reward when the [MIT] experiment was done," the Journal laconically observed, "the students were allowed to keep the smartphones used to monitor them."
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#9
I thought I was safe... - not owning a smartphone or any other of the latest gadgets...

Are Police Able to Search Your Cell Phone?

Tue Apr 26 16:01


Michigan State Police Search Cell Phones On A Massive Scale
Cell phones contain more private information about you and your activities than just about anything else. They keep track of where you are at all times, everyone you call or text, email, social networking, photos, videos, personal files and much more. Would you want strangers to have access to all of this data?
Michigan State Police have reportedly been downloading data from cell phones of motorists that get pulled over for minor infractions like speeding, as if 8 million warrantless requests to Sprint weren't enough. They use a special piece of hardware to download all of the data on the phone, including information the user has deleted.
What makes matters worse, the MSP are refusing to turn over information about the data they extract, procedures to get the data or why they get data unless a fee of $500,000 is paid. Does anyone know the average ransom paid to Somali pirates?


Violation Of Anyone's Rights Is A Threat To Everyone's Rights
Even if you are a completely honest person and think you have nothing to hide, think again. There are over 10,000 recorded laws in the US. Most honest people probably violate the law on a regular basis whether they know it or not.
If the police have access to such huge amounts of data about you, it can reveal violations of obscure, bureaucratic laws that you have never heard of. Or, that data could provide circumstantial evidence wrongly implicating you in crimes you had nothing to do with. That is assuming that no police officer will make improper use of the data. If you have read a single article on CopBlock, you know that abuse is very possible.
Here is what you can do to protect yourself from overzealous police who try to search your phone without cause.
Police Can Search Some Things

The law allows police to do a quick pat down to check for weapons when they stop you. There is not much more that they can do to search you unless your give them permission or they arrest you.
Hopefully you can avoid arrest, but Michigan State Police officers might be very diligent in trying to get you to consent to a search of your phone.
How To Prevent A Search Of Your Cell Phone

The key is to politely refuse their request. One of the best ways to avoid giving consent is to clearly and politely say " I do not consent to any searches."
If they are asking, they probably don't have enough cause to search your phone without your consent. Refusing to give consent alone cannot give police sufficient grounds to search without your consent. If they continue to search your phone, that search will likely be unconstitutional and any evidence obtained as a result of that search will be considered fruit of the poisonous tree and be thrown out.
"I Don't Consent To Any Searches"

You should learn this phrase well and use it any time an officer asks to search you, your car, your backpack, your house, your wallet, or asks for your cell phone. Just because they ask for a cell phone does not mean that you have to provide it.
Knowing your rights is the best way to protect your private data from overzealous police. But the law and the government can't always protect you. Here are some ways to have better cell phone security, especially if you plan on encountering law enforcement.
Protect Yourself
Don't carry a cell phone. This may be useful if you are going to a protest or rally where you expect a heavy police presence, and it may be a good excuse for some people who want to un-tether themselves from the matrix. It probably won't be practical for every day use or chance encounters with police.
Use a prepaid cell phone. If you buy them with cash and replace them regularly, they will not have a large amount of data on them. The less data available the better.
Regularly wipe your cell phone. Getting rid of old data on a regular basis will also reduce the data available. Every make of phone has a different way to do this so check with your phone company to see how.
Encrypt as much of your phone as possible. This can be very tricky because encrypted emails, secure text messaging, storing encrypted files, and anonymous web surfing are more difficult on your phone than your laptop. You may need a separate application to encrypt each type of data and not all phones are created equal in the security department. Fortunately, the Fifth Amendment protects people from revealing their encryption keys.
Use call forwarding services. This is not foolproof, but using a free or paid call forwarding service can reduce the amount of data stored directly on your phone, adding an extra step the Michigan State Police will have to take to get your data.
File an official complaint with the police department. Complaints about any officer that unjustly takes or searches your phone after you have refused consent may be the kind of record that will help someone successfully sue that officer or the police department in the future for improper conduct.
Conclusion

Michigan State Police are downloading the data on people's phones on a massive scale. This kind of data mining can be prevented by people who stand up for their rights. Don't consent to letting a police officer search your phone. Help them to better spend their time protecting people and property from real crime. Learn more ways to protect your private data to protect yourself from overzealous police and lots of other threats.

Are Police Able to Search Your Cell Phone? is a post from Cop Block - "Something must be done about vengeance, a badge, and a gun"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Taxman can use database of ID cards to track our spending habits and bank accounts David Butler 2 4,522 17-05-2009, 11:08 PM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)