DigitalTransformationTrends https://www.webpronews.com/advertising/digitaltransformationtrends/ Breaking News in Tech, Search, Social, & Business Thu, 17 Oct 2024 17:45:18 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://i0.wp.com/www.webpronews.com/wp-content/uploads/2020/03/cropped-wpn_siteidentity-7.png?fit=32%2C32&ssl=1 DigitalTransformationTrends https://www.webpronews.com/advertising/digitaltransformationtrends/ 32 32 138578674 QR Codes: Unlocking Hidden Potential in Everyday Life https://www.webpronews.com/qr-codes-2/ Thu, 17 Oct 2024 17:45:11 +0000 https://www.webpronews.com/?p=609421 QR codes are no longer just a futuristic novelty. They have quietly woven themselves into our everyday experiences, offering quick, efficient solutions to problems we didn’t even know we had.

Whether you’re scanning a QR code to check out a menu, make a payment, or access exclusive content, these simple squares are creating seamless digital bridges all around us. Their growing versatility, especially for businesses and individuals alike, is driving increased demand for easy-to-use tools, such as a qr generator, which simplifies the process of creating these codes.

QR codes offer remarkable flexibility, enabling anyone to tailor them for a wide range of uses. Whether directing users to a website, sharing vital documents, or providing a special discount, QR codes can accomplish these tasks swiftly and effectively.

Practical Ways to Use QR Codes in Everyday Life

QR codes are transforming how we interact with technology by offering fast, contactless solutions to everyday tasks. Their uses are nearly limitless, but here are some of the most practical applications for free QR codes:

  • payments – use a qr generator free to create a code that links to a payment gateway, allowing quick and contactless transactions;
  • marketing – fusinesses can create free QR codes to promote special offers or direct consumers to their website, maximizing their reach with just one scan;
  • education – teachers and institutions can generate QR codes for students to access additional resources, digital handouts, or assignments;
  • healthcare – QR codes can be used to provide patients with instant access to their medical records or instructions for prescriptions;
  • events – instead of printing physical tickets, organizers can use QR codes for entry, schedules, or maps, enhancing the event experience.

With these simple applications, QR codes are not only saving time but also providing a secure and convenient way to manage personal and business needs.

Why QR Codes Are Becoming Indispensable

The secret behind the growing success of QR codes lies in their adaptability. From contactless payments to marketing promotions, they can serve a wide range of purposes. But what truly makes them a vital part of today’s technology landscape is their user-friendly nature and cost-effectiveness. Anyone can easily create a QR code for free using an online QR code generator, enabling both businesses and individuals to harness the power of this tool without a large financial commitment.

Platforms like me-qr.com have made the process of generating QR codes even simpler. With their free online tool, you can create custom QR codes in just a few minutes. Whether you’re a small business owner looking to enhance customer engagement or an individual wanting to streamline everyday tasks, me-qr.com offers the perfect solution.

Conclusion

QR codes are far from being a fleeting trend—they’ve rapidly evolved into a crucial tool for navigating the digital landscape, enhancing efficiency, convenience, and security in our daily lives. Whether you’re generating a QR code for personal or business use, adopting this technology can open up a world of new opportunities right at your fingertips.

]]>
609421
The Advancement of Adult Learning Innovation https://www.webpronews.com/the-advancement-of-adult-learning-innovation/ Mon, 14 Oct 2024 11:30:12 +0000 https://www.webpronews.com/?p=609361 For many, going to a college or another post-secondary institution is the next step. However, in Kentucky, as many as 1.4 million adults have no postsecondary credential. Over 928,000 adults, or around 66%, have never enrolled in college. The other 33% have some college credits, but never attained any credential or degree. But why are postsecondary credentials so important?

The Rise of Adult Learning

By 2031, over 60% of jobs in Kentucky will require postsecondary education. This is compared to only 55% of Kentucky adults who currently hold a postsecondary credential. Aside from mere job selection, the lack of postsecondary graduates heavily influences the number of households who receive a livable wage. More than 30% of Kentucky households have incomes less than $35,000. Compare that to households with one college graduate receiving a staggering $40,000 more in earnings compared to non-graduate households.

Despite these benefits, college graduates in both public Kentucky universities and the Kentucky Community and Technical College System (KCTCS) have seen a regression in undergraduate students. Overall, there is around a staggering 40% decline through the entire post-secondary system across the decade from 2014 to 2024. The KCTCS specifically saw the sharpest decrease in learners from slightly above 76,000 to just below 50,000, or a 34% decrease in just 10 years. The drop in enrollment isn’t exclusive to the adult learning students, but for the post-secondary education systems in general. Public universities and the KCTCS have seen enrollment rates plummet by tens of thousands of students year after year. But what is driving this rapid decrease in post-secondary enrollment despite the potentially lucrative benefits?

For many, prior commitments prevent college enrollment. Around 48% of adult learners have children, and the limited childcare availability is a major obstacle. Between 2019 and 2021, nearly 16,000 childcare centers closed nationwide. Simultaneously, the average cost of childcare rose to $6,411 per year, or $534 monthly. Aside from childcare, adult workers must cover not only the cost of college, but family expenses and other bills. 58% of full-time undergraduates need to work, and 79% of part-time undergraduates are working adult learners.

However, there are other obstacles to adults in post-secondary education. Many require assistance with coursework in addition to the normal classes due to the years spent out of the classroom. Gateway courses have low success rates in both the public university and KCTCS systems. Adult learners in the KCTCS score less than 25% on English and Math, and learners in the public university system scored 15% on average in both English and Math.

Conclusion

When the financial and academic hindrances combine, they can make adults as much as 4 times less likely to complete postsecondary education. So how can we boost adult learner success in their post-secondary journey? Providing financial assistance and academic support is the best way to help adult learners. Scholarships like the Pell Grant enable learners to finance the costs of college, but also any excess aid covers childcare and other family expenses. This excess aid also provides them with more time to spend studying rather than working. 

Pathways to Prosperity for Kentucky Adults
Source: Kentucky Student Success Collaborative ]]>
609361
Emerging Trends in the Gig Economy to Look Out For https://www.webpronews.com/emerging-trends-gig-economy/ Tue, 08 Oct 2024 16:05:35 +0000 https://www.webpronews.com/?p=609328 The gig economy has transformed the way people work, offering flexibility and opportunities that traditional employment often cannot provide. As this sector continues to evolve, various emerging trends are shaping the landscape for gig workers and companies alike. Here are some key trends to watch in the gig economy, from changing employment structures to innovative benefits tailored for gig workers.

Increasing Flexibility and Autonomy

One of the key draws of gig work is the flexibility it provides. Workers can set their own schedules, choose their tasks, and often work from anywhere. This autonomy is becoming more pronounced, with platforms providing tools that allow workers to customize their work experiences. For instance, ride-sharing and delivery services are experimenting with varying levels of commitment, enabling gig workers to choose from short, flexible shifts to longer, guaranteed earnings.

Rise of Niche Gig Platforms

As the gig economy matures, niche platforms are emerging to cater to specific industries and job types. For example, specialized platforms for freelancers in creative fields, such as graphic design and writing, are gaining traction. Similarly, services for skilled tradespeople, like plumbing and electrical work, are also seeing growth. These niche platforms often offer tailored services, support, and communities that traditional gig platforms may lack. 

Enhanced Benefits and Protections

Gig workers have historically faced challenges related to benefits and job security. However, there’s a growing movement advocating for better protections and benefits for gig workers. Some platforms are beginning to offer health insurance options, retirement saving plans, and paid time off. For example, initiatives like insurance for DoorDash drivers are emerging, providing critical coverage that allows gig workers to navigate their roles with greater peace of mind.

Moreover, companies like Walmart are recognizing the need for affordable insurance options, leading to the introduction of products such as Walmart auto insurance. This trend indicates that larger corporations are starting to cater to the needs of gig workers, acknowledging their vital role in the economy.

Integration of Technology and AI

Technology continues to revolutionize the gig economy. Artificial intelligence (AI) and machine learning are being integrated into platforms to optimize matching processes between workers and gigs, enhancing the user experience. For instance, AI can analyze patterns in demand and worker availability, improving efficiency for both parties. Additionally, automation tools are enabling gig workers to manage their tasks more effectively, from scheduling to invoicing.

Focus on Skills Development

As gig work becomes more competitive, there is an increased emphasis on skills development. Many platforms are now offering training programs and resources to help gig workers enhance their skills. This trend not only benefits the workers by making them more marketable but also helps platforms by raising the overall quality of service. Upskilling initiatives may include online courses, mentorship programs, and certifications tailored to specific fields, ensuring that gig workers are well-equipped to meet evolving demands.

Increased Attention to Mental Health

With the rise of gig work, concerns surrounding mental health have come to the forefront. Gig workers often experience isolation, stress, and financial insecurity, which can take a toll on their mental well-being. To address these issues, platforms are beginning to provide resources and support systems focused on mental health. This might include access to counseling services, stress management workshops, and community-building activities that foster connections among gig workers.

Sustainability and Ethical Considerations

As consumers become more environmentally conscious, gig platforms are starting to prioritize sustainability. Companies are exploring ways to reduce their carbon footprints, such as promoting eco-friendly transportation options for delivery services. Additionally, many gig workers are adopting sustainable practices, from using electric vehicles to sourcing eco-friendly materials for their freelance projects. This trend reflects a growing awareness of the impact of gig work on the environment and the importance of ethical business practices.

Global Expansion of Gig Platforms

The gig economy extends beyond the United States; it is a global phenomenon. Platforms are increasingly expanding their services to international markets, leading to a more diverse workforce and broader opportunities for gig workers. This globalization can bring unique challenges, such as navigating different regulations and cultural expectations, but it also opens doors to a wider range of gigs and collaborations across borders.

Evolving Legal Frameworks

As the gig economy grows, so does the need for clear legal frameworks to protect both workers and companies. Legislative changes are underway in several states, focusing on the classification of gig workers and their access to benefits. This evolving landscape will likely continue to impact how gig platforms operate and how they structure their relationships with workers.

Stay Informed

The gig economy is undergoing significant transformation, driven by technological advancements, changing workforce dynamics, and an increasing focus on worker well-being. As we look to the future, these emerging trends highlight the potential for a more sustainable, equitable, and efficient gig economy. Whether you are a gig worker, a platform operator, or simply an interested observer, staying informed about these trends will be essential to navigating this evolving landscape. As companies adapt to meet the needs of gig workers, innovations in benefits and protections are just the beginning of a more supportive and flexible work environment.

]]>
609328
Oracle’s Larry Ellison Wants 1984-Style Surveillance https://www.webpronews.com/oracles-larry-ellison-wants-1984-style-surveillance/ Mon, 16 Sep 2024 17:31:51 +0000 https://www.webpronews.com/?p=608255 Oracle founder Larry Ellison is making waves with comments in which he makes the case for AI-based mass surveillance, in the interest of keeping people on their best behavior.

Oracle is one of the leading cloud providers, and has benefited greatly from the AI boom. The companies services are in high demand, thanks largely to the fully-integrated solutions and security the company provides.

Oracle’s Surveillance History

Unfortunately, Oracle is also known for issues with mass surveillance, with Ellison being a major proponent of the practice. In fact, the company faced a class action lawsuit in 2022, in which the plaintiffs accused the company of setting out to surveil people, regardless of whether they were Oracle customers or not.

According to Ellison, the purpose of Oracle ID Graph is to predict and influence the future behavior of billions of people. He explained Oracle could achieve this goal by looking at social activity and locations in real time, including “micro location[s].” For example, Ellison has represented that companies will be able to know how much time someone spends in a specific aisle of a specific store and what is in the aisle of the store. “By collecting this data and marrying it to things like micro location information, Internet users’ search histories, websites visits and product comparisons along with their demographic data, and past purchase data, Oracle will be able to predict purchase intent better than anyone.”

Ellison’s Latest Comments

Ellison has done little to quell those fears, and may well fuel another lawsuit, with his most recent comments at a company financial meeting. In the meeting, Ellison describes (transcript lightly edited for grammar) a future where cameras are constantly filming individuals, regardless of what they are doing, with some videos only accessible via a court order.

Ellison uses the example of police body cameras, saying that even when police request they be turned off for privacy reasons—such as using the restroom or having a private lunch—the cameras never stop recording. Instead, video labeled ‘private’ is simply locked and inaccessible without a court order.

“The police will be on their best behavior because we’re constantly recording and watching everything that’s going on,” Ellison said. “Citizens will be on their best behavior, because we’re constantly recording everything that is going on. And it’s unimpeachable. The cars have cameras on them. We’re using AI to monitor the video.

“It’s not people that are looking at those cameras; it’s AI that’s looking at the cameras.”

Ellison says the system will help prevent crime by giving society “super vision” to see shootings and other crimes immediately. He also says that “every police officer is going to be supervised at all times, and if there’s a problem, AI will report the problem and report it to the appropriate person.”

Ellison also says a new generation of AI-powered autonomous drones will make high-speed car chases a thing of the past. Instead, a drone will simply follow a suspect until they stop and can be arrested.

Anyone who thinks they can go out in the woods to get away from technology is in for a disappointment, if Ellison has his way, describing a situation in which autonomous drones will monitor people’s campfires to make sure they’re not unattended.

Tech Executives Keep Using Dystopian Fiction as a Blueprint

Ellison is simply the latest tech executive who seems to believe that dystopian fiction should provide a blueprint for how the future should look.

Books and movies like 1984, Minority Report, Blade Runner, Divergent, and many more serve as cautionary tales of what technology can cause, not what it should cause. Unfortunately, Ellison and many others have failed to get the memo and are instead rushing headlong to make many people’s worst fears an everyday reality.

]]>
608255
Digital Transformation Is Not Just About Adopting New Technologies https://www.webpronews.com/digital-transformation-is-not-just-about-adopting-new-technologies/ Sat, 14 Sep 2024 19:06:18 +0000 https://www.webpronews.com/?p=608094 In today’s evolving business environment, digital transformation is often viewed through a narrow lens—primarily as the adoption of cutting-edge technologies. However, Mitsuhiko Okubo, General Manager of the Digital Transformation Promotion & Driving Value Creation Department at Freight Mobility Solutions Business Division, offers a deeper perspective: digital transformation is not merely about integrating new technologies; it is a complex endeavor requiring strategic navigation and continuous adaptation.

Navigating the Terrain of Digital Transformation

Reflecting on Eric Ries’ seminal work, The Lean Startup, Okubo likens digital transformation to an exploration adventure. “Imagine you’re an explorer with a new map leading to a treasure that could significantly elevate your business,” Okubo explains. “But just holding the map isn’t enough. The real challenge lies in how you interpret it and decide on the path forward.”

Okubo’s analogy underscores the essence of digital transformation: possessing advanced technological tools is only part of the equation. The crux of digital transformation is integrating these tools into a cohesive strategy that aligns with your business objectives. “Having the most advanced compass doesn’t matter if you don’t know how to use it,” he adds. “Similarly, without a clear strategy, technological tools are just sophisticated gadgets gathering dust.”

The Lean Startup Approach: Small Steps and Iterative Learning

One of the most profound insights from The Lean Startup is the concept of iterative development. “Think of digital transformation as a journey through a dense jungle,” Okubo suggests. “You wouldn’t charge ahead blindly; instead, you’d make incremental progress, testing each path before advancing.” This approach emphasizes the importance of starting small, learning from each step, and adapting based on real-time feedback.


In practical terms, this means that businesses should avoid large-scale overhauls and instead focus on incremental changes. “Small, consistent wins provide valuable insights and allow you to adjust your strategy accordingly,” Okubo advises. “If a particular path doesn’t lead where you expected, you can pivot quickly without losing momentum.”

Feedback and Alignment: The Key to Effective Digital Transformation

The process of digital transformation is not a solitary one. Effective transformation requires constant feedback and alignment between leadership and frontline employees. “Just as an explorer relies on feedback from the field to refine their path, business leaders must listen to insights from their teams,” Okubo notes. “Digital transformation is most successful when there is alignment between the C-suite and those executing the strategy.”

This feedback loop is crucial for refining strategies and ensuring that they are practical and impactful. “Digital transformation initiatives must be responsive to the realities on the ground,” Okubo emphasizes. “Without this alignment, it’s like navigating a jungle without a clear plan, leading to confusion and missed opportunities.”

Integrating Digital Transformation with Business Strategy

True digital transformation transcends technology—it involves a fundamental shift in how businesses approach their operations and strategies. “Digital transformation isn’t just about implementing new technology; it’s about transforming the way we think about and execute business strategies,” Okubo states. “The real success of digital transformation occurs when it is seamlessly integrated with your overall business strategy, guiding you toward your goals.”

For example, Okubo cites a recent project where integrating new digital tools with a revised business strategy led to significant improvements. “By aligning our digital initiatives with our strategic objectives, we were able to enhance operational efficiency and drive substantial growth,” he recounts. “This alignment was key to unlocking the full potential of our digital transformation efforts.”

Embracing the Adventure of Digital Transformation

Drawing inspiration from The Lean Startup, Okubo encourages businesses to view digital transformation as an adventurous process. “Approach your digital transformation initiatives with curiosity and a sense of adventure,” he advises. “With a well-drawn map, a reliable compass, and a willingness to adapt, the treasures you uncover can be transformative.”

In summary, digital transformation is not merely a technical upgrade but a dynamic and strategic endeavor. As Okubo highlights, the essence of successful digital transformation lies in understanding and integrating technology within a broader strategic framework. “Digital transformation is the process, and your business strategy is what keeps you on course,” he concludes. “With the right mindset and approach, the path to success is not just achievable—it’s an exciting opportunity waiting to unfold.”

]]>
608094
The Transformation of Digital Transformation: Hint, It’s Not What It Used to Be https://www.webpronews.com/the-transformation-of-digital-transformation-hint-its-not-what-it-used-to-be/ Sun, 25 Aug 2024 07:52:48 +0000 https://www.webpronews.com/?p=606819 In the early 2000s, digital transformation was heralded as the future of business, a necessary evolution for companies eager to modernize, compete, and thrive in an increasingly digital world. Fast forward two decades, and the narrative has shifted dramatically. What was once seen as the ultimate business strategy is now being re-evaluated in light of new technological advancements, particularly the rise of generative AI. This shift marks a significant turning point in how businesses approach digital transformation, revealing that the concept, as we once knew it, is no longer sufficient. Today, it’s not just about digitizing operations—it’s about rethinking the very essence of business models to adapt and lead in a rapidly changing environment.

The Rise and Fall of Traditional Digital Transformation

The concept of digital transformation gained widespread traction after 2011 when Capgemini, in collaboration with MIT, defined it as “the use of technology to radically improve performance or reach of businesses.” This definition catalyzed a wave of digital initiatives across industries, as companies scrambled to adopt new technologies like cloud computing, big data, and social media to stay relevant. However, as Jim Harris, a digital transformation thought leader, points out, “Generative AI exposed the incomplete nature of digital transformation investments, emphasizing the pressing need to transform for an entirely new future of business.”

In its early years, digital transformation was often misunderstood. Companies equated it with digitization—simply implementing digital tools without fundamentally changing their business processes or models. This approach led to what many now consider the underwhelming outcomes of digital transformation. As Harris observed, “Digital transformation wasn’t really about transformation. Instead, a vast majority of companies were investing in digitization. Cloud and digital technologies were used to modernize business as usual rather than focus on transformative outcomes.”

This misalignment is evident in the numbers. According to KPMG’s 2023 Technology Survey, a majority of U.S. executives reported that they had not seen a significant increase in performance or profitability from their digital transformation investments. Further research from Boston Consulting Group (BCG) found that 70% of digital transformations fall short of their objectives, often with profound consequences. However, companies that genuinely embraced digital transformation—investing in competitiveness, productivity improvements, and better customer experiences—outperformed their peers, achieving 1.8 times higher earnings growth.

The Generative AI Revolution: A New Chapter in Business Transformation

The introduction of generative AI has sparked a new wave of business transformation, challenging the effectiveness of past digital transformation efforts. Unlike its predecessors, generative AI offers capabilities that extend beyond mere automation of existing processes—it enables entirely new ways of doing business. This distinction is crucial, as it marks the shift from technology-led transformation to executive-led business reformation.

Accenture’s 2024 report highlighted this shift, noting nearly 40,000 mentions of AI on earnings calls by the end of 2023, as C-Suite leaders prepared for a “massive technology shift.” The report underscores the fact that AI is no longer just a tool for efficiency; it’s a strategic asset that can fundamentally alter business models. As Harris aptly puts it, “Given its enormous potential, it should be no surprise that almost every CEO plans to invest heavily in generative AI.”

Yet, despite the enthusiasm, there is already a notable gap between expectations and reality. BCG research indicates that 66% of leaders are “ambivalent or outright dissatisfied” with their AI and generative AI progress. The main barriers include a lack of talent and skills, unclear AI roadmaps, and the absence of a dedicated AI strategy. This disconnect highlights the growing pains of a new era of transformation—one that demands more than just investment in technology, but a rethinking of business strategies and models.

From Automation to Augmentation: The Dual Nature of AI

One of the most significant distinctions between traditional digital transformation and the current AI-driven wave is the shift from automation to augmentation. Automation has long been a focus of digital transformation—using technology to streamline operations, reduce costs, and increase efficiency. While this approach has delivered benefits, it has also limited the scope of transformation to incremental improvements rather than radical innovation.

Generative AI changes this dynamic by introducing the concept of augmentation—enhancing human capabilities to achieve outcomes that were previously unattainable. Harris explains the difference: “Automation takes the work we did yesterday and repeats it at scale, saving costs while increasing efficiencies. Augmentation unlocks new opportunities to do the work we couldn’t do yesterday and achieve new value and outcomes tomorrow.”

This duality is where the true potential of AI lies. Companies that can successfully integrate both automation and augmentation into their operations will not only improve efficiency but also drive exponential growth and innovation. According to PwC’s 27th Annual CEO Survey, 70% of global CEOs see generative AI as significantly changing the way companies create, deliver, and capture value. Moreover, 64% believe that AI will increase the amount of work employees can accomplish, and 59% see it boosting productivity in their work.

Business Model Innovation: The Next Frontier

As companies grapple with the implications of AI, it’s becoming clear that the next phase of transformation will require more than just technological adoption. It will demand a fundamental rethinking of business models—how companies generate revenue, engage with customers, and deliver value. This shift from digital transformation to business model innovation represents the true endgame of the current technological revolution.

As Harris points out, the failure of many digital transformations can be traced back to a lack of clear goals, vision, and strategic alignment with the core business. “Investments hadn’t tied as much to business strategy and goals as they were to iterative improvements, digitization, shiny objects, unrealistic expectations, under-resourced budgets, training, expertise, and resources, and a lack of commitment to change management.” To succeed in the AI era, businesses must start with a clear vision of what they want to achieve and align their AI investments with strategic business objectives.

This shift is already underway. Cisco’s research identified significant gaps in companies’ readiness to embrace AI across six foundational business pillars: strategy, infrastructure, data, governance, talent, and culture. These pillars are critical for building a robust AI-driven business model that can adapt and thrive in an increasingly competitive landscape.

Leadership in the Age of AI: Driving Cultural and Organizational Change

One of the key lessons from the digital transformation era is the importance of leadership in driving change. Too often, digital initiatives were relegated to IT departments, with little involvement from top executives. This lack of leadership support contributed to the underwhelming results of many digital transformation efforts.

In contrast, the current wave of AI-driven transformation is being led by CEOs and CFOs, who recognize the strategic importance of AI in shaping the future of their businesses. As Harris notes, “Leaders are pivotal in driving change. They communicate vision, set the standards for success, and also set the bar for operationalizing future behaviors and norms. CEOs are responsible for creating the culture that the company embodies in its execution and evolution.”

This cultural shift is crucial. For AI to deliver on its potential, companies must foster a digital-first mindset that encourages agility, experimentation, and innovation. This means not just upskilling employees but also reshaping organizational culture to support transformation. Companies that succeed in this will be those that can inspire and empower their employees to embrace new tools and ways of working, driving continuous innovation and growth.

The Future of Business Transformation

As we look ahead, it’s clear that the transformation of digital transformation is just beginning. Generative AI and other emerging technologies are poised to reshape industries and redefine how businesses operate. But for companies to fully realize the benefits of these technologies, they must move beyond the limitations of past digital transformation efforts and embrace a more holistic approach to business model innovation.

This means rethinking not just how they use technology, but how they structure their organizations, engage with customers, and create value. As Harris concludes, “Let’s rethink digital transformation as business model transformation. Doing so will disrupt not only ourselves but entire industries. Not doing so will leave us open to disruption. It’s a gift we either give ourselves or our competitors.”

In the end, the companies that will thrive in this new era are those that can successfully navigate the complexities of AI and use it not just to automate, but to innovate. By placing AI at the core of their business strategies and fostering a culture of continuous learning and adaptation, they can turn the challenges of today into the opportunities of tomorrow.

]]>
606819
Federal Appeals Court: Fourth Amendment ‘Categorically’ Prohibits Geofence Warrants https://www.webpronews.com/federal-appeal-court-fourth-amendment-categorically-prohibits-geofence-warrants/ Fri, 16 Aug 2024 17:03:24 +0000 https://www.webpronews.com/?p=606518 The United States Court of Appeals for the Fifth Circuit has overturned a previous ruling, concluding geofence warrants are “categorically prohibited by the Fourth Amendment.”

A three-judge panel—Judges Carolyn Dineen King, James C. Ho, and Kurt D. Engelhardt—overturned a ruling by the Fourth Circuit to conclude that geofence warrants are unconstitutional.

We hold that the use of geofence warrants—at least as described herein—is unconstitutional under the Fourth Amendment. In doing so, we part ways with our esteemed colleagues on the Fourth Circuit.

What Is A Geofence Warrant?

Geofence warrants are a relatively new type of warrant in which law enforcement tries to identify random individuals within a geographic area based on Google Location History data.

For example, when a crime is committed, law enforcement may approach Google and ask for anonymized identifiers for all phones within a certain radius of the crime at the time it was committed. With that data in hand, investigators can drill down, comparing it with other evidence and eventually identify the owners of specific devices, yielding potential suspects.

As the judges point out, Google is the primary recipient of goefence warrants since it received the first one in 2016. Much of this is because of the ubiquity of Google’s software and services, both on its own devices as well as Apple’s.

So far, Google has been the primary recipient of geofence warrants, in large part due to its extensive Location History database, known as the “Sensorvault.”

Google collects data from accounts of users who opt in to Google’s Location History service. Location History is disabled by default.

Google’s Android cell phones, which “comprise about 74% of the total number of smartphones worldwide,” “automatically have an Android operating system, as well as various Google apps that could potentially store a user’s location.”

Apple, which makes approximately 23% of the world’s smartphones, does not keep location data associated with its phones, but its phones still “often have various apps that . . . provide Google with a specific device’s location.”

The judges go on to describe the extremely detailed data provided by Google’s Location History.

Moreover, not only is the volume of data comprehensive, so is the quality. “Location History appears to be the most sweeping, granular, and comprehensive tool—to a significant degree—when it comes to collecting and storing location data.”

The data is “considerably more precise than other kinds of location data, including cellsite location information because [Location History] is determined based on multiple inputs, including GPS signals, signals from nearby Wi-Fi networks, Bluetooth beacons, and cell towers.”

Why Geofence Warrants Are Problematic

Geofence warrants can and do lead to innocent people being suspected of crimes. A person may be in the wrong place at the wrong time, and suddenly find themselves at the heart of an investigation. Similarly, a person may have lost their phone, forgotten it, or had it stolen, all of which could result in someone’s phone being within a geofence area, even if the owner is not.

Even more concerning is the vast amount of private data that is vacuumed up in a geofence warrant, with the location data of users who have nothing to do with the crime being collected and analyzed, all with no probable cause.

As federal judge Nina Morrison said in a recent ruling about the Fourth Amendment’s application at the US border, a person’s location data hold extremely private insights into a person’s personal life, associations, and beliefs:

In Carpenter v. United States, 585 U.S. 296, 311–12 (2018), the Court concluded that cell-site location data, even though it is collected by (and thus not kept private from) third party cell phone companies, requires Fourth Amendment protection for precisely this reason….It reasoned that cell-site location data “provides an all-encompassing record of the holder’s whereabouts. As with GPS information, the time-stamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his ‘familial, political, professional, religious, and sexual associations.’”

Interestingly, in the specific case before the Fifth Circuit—the robbery of a contracted US Postal carrier—the judges decided not to suppress the information that law enforcement collected via a geofence warrant. Because geofence warrants were so new at the time they were used in this specific case, the judges ruled the Postal Inspectors “acted in good faith” in using the warrant.

Nonetheless, the judges looked at the broader scope of the geofence warrant issue and analyzed whether such warrants violate the Fourth Amendment’s guarantee against “unreasonable searches and seizures.” The judges then pointed to the precedent set by the Supreme Courts decision in Carpenter v. United States, “arguably the most relevant Supreme Court precedent addressing law enforcement’s investigatory use of cellular consumer data.

Chief Justice Roberts’s majority opinion in Carpenter speaks at length about the privacy interests inherent in location data, and it expresses grave concern with the government being able to comprehensively track a person’s movement with relative ease due to the ubiquity of cell phone possession. The Court acknowledged “some basic guideposts” in resolving questions related to the Fourth Amendment’s protections of privacy interests, including securing “the privacies of life against arbitrary power,” and placing “obstacles in the way of a too permeating police surveillance.” Carpenter, 585 U.S. at 305 (internal quotations omitted). The Court also recognized the necessity of applying the Fourth Amendment to systems of advanced technology, expressing concern that CSLI is approaching “GPS-level precision,” with wireless carriers having the capability to “pinpoint a phone’s location within 50 meters.” Id. at 313; see also Riley v. California, 573 U.S. 373, 396 (2014) (acknowledging the privacy concerns implicated by cell phone location data that “can reconstruct someone’s specific movements down to the minute, not only around town but also within a particular building”).

Many of the concerns expressed by Chief Justice Roberts in his Carpenter opinion are highly salient in the context of geofence warrants. Perhaps the most alarming aspect of geofences is the potential for “permeating police surveillance.” As Chief Justice Roberts explained, modern cell phones enable the government to achieve “near perfect surveillance”; carrying one of these devices is essentially a prerequisite to participation in modern society, and users “compulsively carry cell phones with them all the time.” Id. at 311–12, 315. Geofences also exemplify the Court’s concern with pinpoint location data—this technology provides more precise location data than either CSLI or GPS. Geofence Warrants and the Fourth Amendment, supra at 2510. Furthermore, obtaining data through geofences, like obtaining data through CSLI, is “remarkably cheap, easy, and efficient compared to traditional investigative tools.” Carpenter, 585 U.S. at 311. With “just the click of a button,” the government can search the pinpoint locations of over half a billion people with Location History enabled.

The Court’s Conclusion

After carefully considering all of the above factors, as well as how hard it is to keep Google from collecting Location History, the judges revealed their ruling.

Having concluded that the acquisition of Location History data via a geofence is a search, it follows that the government must generally obtain a warrant supported by probable cause and particularity before requesting such information. Carpenter, 585 U.S. at 316. Accordingly, we turn to the issue of whether geofence warrants satisfy this mandate, addressing Appellants’ argument that these novel warrants resemble unconstitutional general warrants prohibited by the Fourth Amendment.

The judges then drive the point home in their comparison of geofence warrants and illegal general warrants.

Geofence warrants present the exact sort of “general, exploratory rummaging” that the Fourth Amendment was designed to prevent.

The judges also addressed the governments assertion that geofence warrants should be exempt since they pertain “to a particular crime at a particular place and time.”

This argument misses the mark. While the results of a geofence warrant may be narrowly tailored, the search itself is not. A general warrant cannot be saved simply by arguing that, after the search has been performed, the information received was narrowly tailored to the crime being investigated. These geofence warrants fail at Step 1—they allow law enforcement to rummage through troves of location data from hundreds of millions of Google users without any description of the particular suspect or suspects to be found.

In sum, geofence warrants are “[e]mblematic of general warrants” and are “highly suspect per se.”

We hold that geofence warrants are modern-day general warrants and are unconstitutional under the Fourth Amendment. However, considering law enforcement’s reasonable conduct in this case in light of the novelty of this type of warrant, we uphold the district court’s determination that suppression was unwarranted under the good-faith exception.

The Decision Will Hamper Law Enforcement

In a concurring opinion, Judge Ho acknowledged that the decision would make law enforcement’s jobs more difficult. Nonetheless, Judge Ho pointed out that this was the entire point of the Constitution.

His concurring opinion is a fascinating look into the balancing act that exists between protecting the public, while also protecting the rights of the individual. His opinion bears being included in its entirety.

Geofence warrants are powerful tools for investigating and deterring crime. The defendants here engaged in a violent robbery—and likely would have gotten away with it, but for this new technology. So I fully recognize that our panel decision today will inevitably hamper legitimate law enforcement interests.

But hamstringing the government is the whole point of our Constitution. Our Founders recognized that the government will not always be comprised of publicly-spirited officers—and that even good faith actors can be overcome by the zealous pursuit of legitimate public interests. “If men were angels, no government would be necessary.” The Federalist No. 51, at 349 (J. Cooke ed. 1961). “If angels were to govern men, neither external nor internal controls on government would be necessary.” Id. But “experience has taught mankind the necessity of auxiliary precautions.” Id. It’s because of “human nature” that it’s “necessary to control the abuses of government.” Id.

Our decision today is not costless. But our rights are priceless. Reasonable minds can differ, of course, over the proper balance to strike between public interests and individual rights. Time and again, modern technology has proven to be a blessing as well as a curse. Our panel decision today endeavors to apply our Founding charter to the realities of modern technology, consistent with governing precedent. I concur in that decision.

]]>
606518
GameStop Kills Off Long-Running Game Informer Magazine https://www.webpronews.com/gamestop-kills-off-long-running-game-informer-magazine/ Sun, 04 Aug 2024 13:00:00 +0000 https://www.webpronews.com/?p=606157 The US gaming industry has lost its longest-running magazine as GameStop kills off the venerable Game Informer magazine that has been a staple since 1991.

First spotted by Kotaku, Game Informer’s official X account announced the news.

The Final Level: Farewell from Game Informer

After 33 thrilling years of bringing the the latest news, reviews, and insights from the ever-evolving world of gaming, it is with a heavy heart that we announce the closure of Game Informer.

From the early days of pixelated adventures to today’s immersive virtual realms, we’ve been honored to share this incredible journey with you, our loyal readers. While our presses may stop, the passion for gaming that we’ve cultivated together will continue to live on.

Thank you for being part of our epic quest, and may your own gaming adventures never end.

Game Informer (@gameinformer) | August 2, 2024

Game Informer’s closure is the end of an era, as it was the last print magazine in the US gaming industry. According to Kotaku, the entire staff was laid off as part of the closure.

]]>
606157
How To Protect Your Private Data At The US Border https://www.webpronews.com/how-to-protect-your-private-data-at-the-us-border/ Wed, 31 Jul 2024 02:33:45 +0000 https://www.webpronews.com/?p=606074 In view of the recent court decision regarding the Fourth Amendment and the US border, many wonder what practical steps they can take to protect their data.

Background

Judge Nina Morrison, of the Eastern District of New York, ruled that Customs and Border Patrol needs probable cause and a valid warrant to seize and search travelers’ cell phones.

The ruling—at least in the Eastern District of New York—is a major blow to federal agents, who have long maintained that the Fourth Amendment does not apply at the border. As a result, it has become increasingly common for individuals to be forced to hand over their device and passcode, giving agents the ability to peruse their private information. In many cases, agents have made full copies of the contents of a person’s phone before returning it.

Judge Morrison’s ruling joins a number of similar decisions, helping set a legal precedent that may one day provide nationwide protection for travelers and their private data.

Why It Matters

Unfortunately, a number of the cases that have tackled the issue of data privacy at the border have involved individuals engaging in despicable behavior. For example, the plaintiff in the case before Judge Morrison was accused of possessing child sexual abuse material.

Criminal behavior is far from the only reason for protecting one’s data at the border, however. In fact, there are many legitimate reasons why perfectly law-abiding citizens should be concerned. Below are just a few examples.

Journalists

As Judge Morrison noted in her ruling, journalists have increasingly been targeted by CBP agents intent on searching their devices. This has especially been true among journalists who write about privacy and other politically sensitive topics. As Judge Morrison described, this action appears to be a coordinated effort to surveil journalists.

After formal complaints were filed regarding a series of such incidents in 2019, it was revealed that they may not have been the isolated acts of individual border agents who suspected that a particular traveler’s device contained contraband but instead part of a targeted effort to surveil journalists in particular: a non-public CBP database that contained the names of journalists covering migration issues and which pushed “alerts” to flag those journalists for secondary screening when they returned from international travel.

Judge Morrison goes on to say that this kind of surveillance, whether coordinated or not, severely undermines the ability of journalists to do their job.

And even without the specter of a larger, insidious effort targeting journalists at the border, there remains a considerable and undue risk that — without the safeguards of a judicial warrant — journalists’ sources in and outside the United States will be fearful of relaying information about matters of public concern to them.

Medical and Science Professionals

Medicals professionals are bound by law to protect their patients’ privacy. What happens, however, when agents seize a doctor’s devices, devices which may contain sensitive information?

Similarly, what about a scientist en route to a conference with sensitive research in their possession?

Entrepreneurs and Executives

Entrepreneurs and corporate executives often have access to sensitive information and corporate, and it’s not uncommon for them to bring projects with them so they can continuing working while traveling.

Unfortunately, under CBP’s interpretation of the law, such individuals could see their life’s work literally ripped from their hands and copied by other individuals. While that doesn’t mean the US government is going to steal their intellectual property, government agencies are no more immune to outside hackers or internal corruption than any other organization.

In short, once an individual loses control of their information, all bets are off on what may happen to it.

Religious Leaders

Religious leaders are another demographic that often are privy to private information, with a moral and ethical responsibility to protect the privacy of individuals who have confided in them. If a religious leader’s devices are confiscated, unlocked, and copied, is there any guarantee that sensitive information contained on those devices will remain private?

Other Considerations

As the above examples show, there are any number of situations—far more than what has been covered here—in which violating travelers’ privacy can have profoundly negative implications. And none of the above examples address the emotional toll of having one’s private data accessed by complete strangers, something Judge Morrison made special note of.

A person’s search history can reveal the questions that keep him up at night, including questions he might be too ashamed to ask his spouse or doctor. Data on a person’s cell phone may reflect information about her that is so private, she would not disclose it to her therapist or closest friend. It is not just that cell phones often contain intimate information available in microscopic detail — the number of steps the phone’s user took that day and where she took them, the results of recent blood work in the application where her doctor uploads all her medical records, or the calendar reminder for a meeting with her local Alcoholics Anonymous chapter or prayer group. It i s that the details, taken together, can provide a kaleidoscopic view of the user’s whole life.

In view of what’s at stake, what can travelers do?

Practical Steps to Protect Your Data

The first thing travelers must do is realize they must be proactive in protecting their data, especially in jurisdictions that are not covered by favorable decisions, like Judge Morrison’s. Unfortunately, this may at times result in a fair amount of inconvenience, but not nearly as much as losing control of one’s private data and having to deal with the fallout.

Below are a few steps travelers should consider taking.

Limit the Number of Devices

One of the biggest precautions travelers can take is limiting the number of devices they bring when traveling. A single smartphone is much easier to protect than a smartphone, tablet, and computer. The more devices that are in play, the more attack vectors agents have to compromise an individual’s privacy.

Disable Biometrics In Favor of Passwords/Passcodes

While fingerprints and facial recognition are convenient ways to unlock a device, they also represent a legal gray area.

A number of courts have ruled that law enforcement cannot force a person to hand over their password or passcode. Some of those courts, however, have ruled that biometric security measures do not have the same legal protection, meaning there is more of a legal basis for agents to force a user to provide a fingerprint or facial recognition unlock.

As a result, it’s better to simply disable biometrics and rely on good old-fashioned passcodes when traveling.

Log Out of Cloud Accounts

Most modern devices should be viewed as a doorway to an individual’s life, rather than the destination itself. In other words, with the rise of cloud computing, most users don’t just keep everything on a single device. Instead, that device is often connected to any number of cloud services that contain infinitely more data than resides on the device alone.

In fact, this concern was specifically mentioned by the Ninth Circuit Court in one of its rulings (via the Electronic Frontier Foundation).

With the ubiquity of cloud computing, the government’s reach into private data becomes even more problematic. In the “cloud,” a user’s data, including the same kind of highly sensitive data one would have in “papers” at home, is held on remote servers rather than on the device itself. The digital device is a conduit to retrieving information from the cloud, akin to the key to a safe deposit box. Notably, although the virtual “safe deposit box” does not itself cross the border, it may appear as a seamless part of the digital device when presented at the border.

Because of this, it’s important to log out of any cloud services before traveling, that way agents cannot gain access to the data stored on those accounts, even if they gain access to the device’s contents.

Importantly, this also means making sure that passwords to online accounts are properly cleared before traveling. Otherwise, agents could still gain access.

Use Full Disk Encryption

Every major operating system—Linux, macOS, Windows, Android, and iOS—provide the option for full disk encryption (FDE), with some enabling it by default. This is different than encrypting specific folders, such as a user’s home directory, and is far stronger.

Power Off Devices Rather Than Suspend

Travelers should make sure that devices are powered off when crossing a border, rather than merely suspending them. This is especially true of computers, but applies to mobile devices as well.

While computers, phones, and tablets have login screens designed to protect data when a device is suspended, or the screen is locked, these measures are not foolproof. There are a number of ways that lock screens can sometimes be bypassed.

As a result, for the best protection, it’s a good idea to completely power devices off.

Use Secure Boot On Windows and Linux Computers

Travelers should make sure Secure Boot is enabled on computers. Secure Boot is designed to protect the boot process and ensure that no outside software is introduced in an effort to gain access.

In many cases, Secure Boot is enabled by default, but one should check their UEFI settings to be sure.

Use Panic Mode, Lockdown Mode, or Duress Code

Most mobile devices have some form of feature designed to shut down the most vulnerable forms of attack. This is useful for those situations when a traveler must keep their phone while traveling.

For example, iOS has Panic Mode that disables facial recognition and fingerprint scanning, requiring the user enter a passcode. When the feature is activated, via Settings > Emergency SOS, a user can tap the power button five times to activate it.

Android has a similar feature called Lockdown. A user can simply hold the power button down and choose Lockdown from the on-screen popup.

GrapheneOS—a security hardened version of Android used by Edward Snowden, yours truly, and many other journalists—takes things a step further with a duress code. In other words, a user can set a duress code in GrapheneOS that can be given to someone instead of the phone’s real passcode. When the duress code is entered, the phone immediately and securely wipes all data from itself.

While the above steps are practical measures travelers can take, there are legal factors to consider, as highlighted by the Electronic Frontier Foundation (EFF).

As the EFF highlights, even in areas not covered by the recent favorable court rulings, the border is not completely a legal Wild West.

However, the U.S. border is not a Constitution-free zone. The powers of border agents are tempered by our Fourth Amendment right to digital privacy, our First Amendment rights to speak and associate privately and to gather the news, our Fifth Amendment right to freedom from self-incrimination, and our Fourteenth Amendment right to freedom from discrimination.

The EFF goes on to point out that travelers must be aware of the distinction between routine searches and non-routine ones. For example, it is completely normal and routine for agents to search one’s bags or belongs, either via a metal detector or manually.

In contrast, the EFF maintains that searching, let alone copying, the contents of one’s digital devices constitutes a non-routine search, a position that at least some court decisions have supported.

In view of these issues, what should a person do?

Do Not Be Quick to Waive Constitutional Rights

The EFF makes the case that travelers—especially US citizens—should not be quick to waive their constitutional protections.

The constitutional protections described above can be waived. For example, the Fourth Amendment allows law enforcement officials to search people or their property if those people voluntarily consent to the search.

That said, whether consent is truly “voluntary” depends on the totality of the circumstances, such as the nature of the questioning and the youth of the person being questioned.66 There is a strong argument that a traveler’s compliance when border agents demand the unlocking of a device, the device password, or social media information, should never be treated as voluntary consent. Border screening is an inherently coercive environment, where agents exercise extraordinary powers, and travelers are often confused, tired after international travel, and/or rushing to make a connecting flight.

However, courts may rule otherwise. It is possible that if you unlock your device, and agents then search your device, a court will rule that you consented to the search. It will depend upon the totality of the unique circumstances surrounding your particular border crossing.

…the best way to avoid an inadvertent “consent” to search is to decline to unlock your device, provide the device password, or provide any social media information.

The EFF’s report is well worth a read, and goes into detail on the various factors that come into play when the individual is a foreign visitor or a permanent resident.

Conclusion

Until legislation or a Supreme Court ruling provides clear guidelines and protections that apply nationwide, the border will continue to be a gray area that affords more protections in some regions than in others.

To be forewarned is to be forearmed, and nowhere is that more true than when it comes to protecting one’s private data.

Following the steps in this article, as well as the excellent EFF report, can help travelers be as well-equipped as possible to protect their data at the border.

EFF Full Report.

]]>
606074
Federal Judge Rules Fourth Amendment Applies At The Border https://www.webpronews.com/federal-judge-rules-fourth-amendment-applies-at-the-border/ Mon, 29 Jul 2024 13:13:03 +0000 https://www.webpronews.com/?p=606027 Federal Judge Nina Morrison, of the Eastern District of New York, has ruled the Fourth Amendment applies at the border, ending warrantless searches of phones and devices.

The US government and Customs and Border Patrol (CBP) has long maintained that the Fourth Amendment doesn’t apply at the border. As a result, agents will detain individuals without probable cause or a warrant, demanding they hand over their electronic devices and passwords, often copying the entire contents of the devices before returning them.

In a case brought by Kurbonali Sultanov, Judge Morrison called out the government’s position that cell phones should be searchable without a warrant, saying it was a “remarkable” claim (documents courtesy of Knight First Amendment Institute at Columbia University).

The government takes the remarkable position here that cell phones should not be treated any differently for Fourth Amendment purposes than any other property a traveler carries across a border. Opp’n Br. It urges this Court to deem such searches “routine” and to hold that no individualized suspicion whatsoever is needed for border officials to search a traveler’s cell phone upon entry into the United States….In essence, the government argues that no practical limits should be placed on cell phone searches at the border whatsoever, as long as they fall into what agents categorize as a “manual” search (i.e., one unaided by extrinsic technology but limited only by the border agents’ time and interest in examining the phone’s contents).

And the government’s position fails to account for both the substantial privacy intrusions at issue here, as well as the Supreme Court’s Fourth Amendment jurisprudence concerning other advanced technologies that carry with them the potential to reveal vast amounts of the owner’s personal data.

Judge Morrison emphasized the sensitive nature of data that is available through a forcible search of one’s phone, and the intimate details of a person’s life such a search would reveal.

Until technology that can “translate people’s brain activity — like the unspoken thoughts swirling through our minds — into actual speech” meaningfully advances,8 reviewing the information in a person’s cell phone is the best approximation government officials have for mindreading. A person’s search history can reveal the questions that keep him up at night, including questions he might be too ashamed to ask his spouse or doctor. Data on a person’s cell phone may reflect information about her that is so private, she would not disclose it to her therapist or closest friend. It is not just that cell phones often contain intimate information available in microscopic detail — the number of steps the phone’s user took that day and where she took them, the results of recent blood work in the application where her doctor uploads all her medical records, or the calendar reminder for a meeting with her local Alcoholics Anonymous chapter or prayer group. It i s that the details, taken together, can provide a kaleidoscopic view of the user’s whole life.

Judge Morrison compares the situation to previous rulings that applied the Fourth Amendment to cell phone location data.

In Carpenter v. United States, 585 U.S. 296, 311–12 (2018), the Court concluded that cell-site location data, even though it is collected by (and thus not kept private from) third party cell phone companies, requires Fourth Amendment protection for precisely this reason….It reasoned that cell-site location data “provides an all-encompassing record of the holder’s whereabouts. As with GPS information, the time-stamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his ‘familial, political, professional, religious, and sexual associations.’”

Judge Morrison then makes the point that, if protections apply to location data, they should apply even more to data on one’s phone.

The logic of Carpenter applies with even greater force to the information contained on cell phones, which includes not only the historic and specific location information captured by cell-site data, but droves of other sensitive information that is “detailed, encyclopedic, and effortlessly compiled.” Id. at 297. If the cell-site location records at issue in Carpenter hold “the privacies of life,” id.at 305 (citation omitted), then surely the heightened privacy interests associated with the far greater trove of information in a traveler’s cell phone data strike at the very heart of the Fourth Amendment.

The case also shown a spotlight on issues involving journalists, in which many have seemingly been targeted by border agents, especially after writing pieces about sensitive political topics.

The amici brief filed by the Knight First Amendment Institute at Columbia University and the Reporters Committee for Freedom of the Press makes a persuasive case that warrantless searches of cell phones not only constitute an unjustified governmental intrusion into travelers’ private expressions of religion, personal associations, and journalistic endeavors — they also risk chilling the exercise of those rights. Specifically, amici assert that border searches of electronic devices burden freedom of the press by chilling reporter-source communications. Amici Br. 12. They argue that “[j]ournalists are particularly vulnerable to the chilling effects of electronic device searches, both because confidential or vulnerable sources may refuse to speak with reporters for fear that anything they say may end up in the government’s hands, and because such searches can be used to retaliate against or deter reporting critical of the government.”

Judge Morrison said there is evidence to support the belief that incidents with journalists were not random, nor were they the work of overzealous agents, but likely a “targeted effort to surveil journalists.”

Amici’s concerns are not hypothetical but instead are based on the recent experience of numerous journalists who were flagged for secondary inspection and were required to surrender their electronic devices for warrantless searches and, in some cases, downloading of the devices’ contact lists and contents based on these journalists’ ongoing coverage of politically sensitive issues, like migration through the U.S.-Mexico border.12 After formal complaints were filed regarding a series of such incidents in 2019, it was revealed that they may not have been the isolated acts of individual border agents who suspected that a particular traveler’s device contained contraband but instead part of a targeted effort to surveil journalists in particular: a non-public CBP database that contained the names of journalists covering migration issues and which pushed “alerts” to flag those journalists for secondary screening when they returned from international travel.13 And even without the specter of a larger, insidious effort targeting journalists at the border, there remains a considerable and undue risk that — without the safeguards of a judicial warrant — journalists’ sources in and outside the United States will be fearful of relaying information about matters of public concern to them. If journalists cannot reasonably assure their sources that border officials will not have broad discretion to access and download their contacts, notes, electronic messages, and recordings, the risk of chilling fundamental press activities is unduly high.

Conclusion

In her final conclusion, Judge Morrison ruled that probable cause and a warrant must be the bar that is met for the government to be given access to such an intimate look into the life of individuals.

The right to dissent is the “fixed star in our constitutional constellation.” W.Va. State Bd. of Educ. v. Barnette, 319 U.S. 624, 642 (1943). Courts must be vigilant in protecting that right, whether in the context of barring compelled speech, see id., or — as here — guarding against government intrusion into the private, expressive activities of those who may hold disfavored viewpoints. Where the government seeks access to private devices that hold such a vast array of expressive content, only the standard conceived by the Founders and codified in the Fourth Amendment — probable cause and the approval of a neutral magistrate — can bear the weight of that obligation.

Judge Morrison’s ruling is a welcome one for journalists and non-journalists alike, shutting down what many believed to be a blatant example of unconstitutional government overreach. While the ruling applies primarily to the Eastern District of New York, Judge Morrison’s decision joins a growing list of similar decisions that have placed the burden on CBP to have a legitimate basis to search a traveler’s phone.

With the growing number of cases upholding the Fourth Amendment, a legal precedent is slowly being set that should lead to greater protections for individual privacy. In the wake of Judge Morrison’s ruling—at least in New York—users’ private data should be a bit more secure at the US border than it has been in decades.

More Information

Please see How to Protect Your Data At the US Border for more info and practical steps every traveler can take to protect their data.

]]>
606027
Federal Court Pauses Net Neutrality https://www.webpronews.com/federal-court-pauses-net-neutrality/ Tue, 16 Jul 2024 00:33:42 +0000 https://www.webpronews.com/?p=605777 A federal court has paused the FCC’s net neutrality plans to give itself more time to determine if the rules will stand or be permanently overturned.

The FCC voted in April to restore net neutrality. The rules, which ensure companies cannot penalize or throttle certain internet traffic, were originally passed during the Obama administration, before being repealed by the Trump-era FCC.

The current FCC voted 3-2 to restore net neutrality, even closing loopholes that experts warned could be abused by internet service providers. Michael Powell, President & CEO of NCTA – The Internet & Television Association, wasted no time promising “years of litigation and uncertainty.”

According to The Verge, the Sixth Circuit Court of Appeals’ panel of judges said a temporary “administrative stay is warranted.” The judges are weighing the merits of the case brought by broadband providers.

The administrative stay is in effect till August 5, at which point the judges will hopefully have reached a final decision.

]]>
605777
Microsoft Accused of Violating Children’s Privacy In the EU https://www.webpronews.com/microsoft-accused-of-violating-childrens-privacy-in-the-eu/ Thu, 06 Jun 2024 12:00:00 +0000 https://www.webpronews.com/?p=605066 Microsoft is facing another complaint in the EU, this time a claim the company “violates children’s privacy – but blames your local school.”

The complaint was filed by noyb (none of your business), a privacy-focused EU non-profit. While praising the EU’s efforts to implement digital learning post-pandemic, nyob says that a small number of companies are abusing the situation “with the intention of getting children used to their systems and creating a new generation of future ‘loyal’ customers.”

The non-profit specifically calls out Microsoft, saying the company is trying to skirt the GDPR—the EU’s privacy regulation—by saying that schools control student data.

Software vendors like Microsoft have an enormous market power, allowing them to dictate the terms and conditions of contracts with anyone who wants to use their products. At the same time, these software providers try to dodge responsibility by insisting that almost all of it lies with local authorities or schools. In reality, neither has the power to influence how Microsoft actually processes user data. Instead, they are faced with a take-it-or-leave-it situation where all the decision-making power and profits lie with Microsoft, while schools are expected to bear most of the risks. Schools have no realistic way of negotiating or changing the terms.

According to the complaint, Microsoft and other companies are putting schools in a no-win scenario by trying to shift the responsibility to them, while maintaining control of the relevant data.

In practice, this leads to a situation where Microsoft is trying to contractually dump most of its legal responsibilities under the GDPR on schools that provide Microsoft 365 Education services to their pupils or students. This means, for example, that access requests to Microsoft go unanswered – while schools have no realistic way of complying with such requests because they don’t hold the necessary data.

Maartje de Graaf, data protection lawyer at noyb: “This take-it-or-leave-it approach by software vendors such as Microsoft is shifting all GDPR responsibilities to schools. Microsoft holds all the key information about data processing in its software, but is pointing the finger at schools when it comes to exercising rights. Schools have no way of complying with the transparency and information obligations.”

To make matters worse, nyob says that Microsoft is tracking minors’ activity.

But this is not the only issue at hand. Although the complainant did not consent to tracking, Microsoft 365 Education still installed cookies that, according to Microsoft’s own documentation, analyse user behaviour, collect browser data and are used for advertising. Such tracking, which is commonly used for highly-invasive profiling, is apparently carried out without the complainant’s school even knowing. As Microsoft 365 Education is widely used, the company is likely to track all minors using their educational products. The company has no valid legal basis for this processing.

Felix Mikolasch, data protection lawyer at noyb: “Our analysis of the data flows is very worrying. Microsoft 365 Education appears to track users regardless of their age. This practice is likely to affect hundreds of thousands of pupils and students in the EU and EEA. Authorities should finally step up and effectively enforce the rights of minors.”

Microsoft has already faced multiple complaints within the EU that have led to the company making significant changes to its business. If this latest complaint gains traction, Microsoft may be forced to make yet more changes to its operations.

]]>
605066
Are Third Party Apps Good Enough to Stream Movies https://www.webpronews.com/third-party-apps-stream-movies/ Mon, 20 May 2024 15:19:23 +0000 https://www.webpronews.com/?p=604784 Smart TVs and streaming devices come with pre-installed apps that allow you to access a wide range of entertainment content. However, this does not mean that you can stream any content you wish on these apps. Yes, using the preinstalled apps, you can stream only the content offered by them for streaming. However, users always want more options in every category whether it’s entertainment, sports, or family shows. 

Another problem with official apps is that they offer paid content, for which users need to take a subscription plan. Now, many users wish to stream free content like movies and TV shows, and third party apps make it available for them. This is one of the major reasons for the popularity of third party apps. 

To access more content, most users install third party apps on their streaming device. These third party apps offer more entertainment through their free and paid services. However, despite many advantages, there are also some disadvantages of using third party apps. Let us explore the pros and cons of using third party apps to conclude whether they are good to go for streaming movies. 

Pros of Third Party Apps 

There are multiple benefits of installing and using third party apps on any streaming device. These benefits are more than just getting access to entertainment content. Before we talk about the advantages, though, I should warn you that, unless you modify the settings, Firesticks and similar gadgets do not let you use third-party apps.

You have two options: jailbreak your device to enable the installation of third-party apps, or modify the settings to do so. There are limitless ways to stream on Jailbroken device. You can install third party apps and steam both free and paid content from different platforms. Now coming to the third party apps, let us find out all the pros of using such apps. 

Low Cost Entertainment

Not all third party apps are free, but some charge their users a subscription fee. However, the subscription fee of third party apps is less affordable than the mainstream apps like Netflix and Amazon Prime. Users looking for affordable entertainment plans can look into third party apps. So, users get more entertainment at affordable prices, which is another reason for the growing popularity of these apps. 

High Quality Streaming

Third party apps allow you to access high quality videos for free or for a fraction of the cost that major apps like Netflix and Prime Video charge. Therefore, you get high quality resolution at drop-dead prices. So, if you are looking for high quality streaming at reasonable prices, you can look out for third party apps for your streaming device. However, it is best to check the quality of streaming with free trials before subscribing to a paid plan. 

Free Entertainment

Most people install third party apps on their device in order to access free content. The built-in apps on any streaming device require you to pay for a subscription to access the content. 

However, there are many third party apps that offer you access to entertainment content including movies, music and TV shows for free. Some apps offer both free and paid services. You can access free content and access more content and higher quality like 4K on their paid subscription. 

For example, there is a Kodi app that lets you stream content from a variety of streaming platforms. It comes with various addons like The Crew, Scrubs V2, Seren and Umbrella which lets you watch on demand content. 

Users can explore the latest movies, TV shows, sports events and kids’ content available to watch on the Crew Kodi addon. Such apps allow you to watch both free and paid content. However, free entertainment is the primary reason for the popularity of third party apps. 

Variety of Content

Most standard apps are dedicated to one category, like movies or TV shows. On the other hand, third party apps offer you a variety of content including movies, TV shows, family shows and web series. For example, some kids apps also offer educational videos in addition to entertainment for kids. So, with third party apps, users get more variety of content in a single app. This helps users to install fewer apps and save storage space on their TV or streaming device. 

Enhanced Security for your Device

As we use our devices connected to the internet, we download multiple cookies and some are infected with viruses and malware. There are many third party security apps that scan your device for viruses, malware and harmful cookies. Therefore, you can install a security app to scan your AI devices and remove the viruses, malware or harmful cookies Compatible with multiple devices

As most third party apps are compatible with multiple devices, you can install and use them on different devices. For example, you can use an app to stream content on your TV, smartphone and computer as well.

Customization Options

Third party apps allow you to customize their interface to offer you a seamless streaming experience. You can change the themes, and options to make the app look appealing and easy to use. So, you are not bound to use that boring interface and customize your UI by choosing the theme you like. Most apps offer you multiple UI and theme options to choose the one that appeals to you the most. 

Support for multiple languages

Many third party streaming apps allow you to use the app in multiple languages. This is especially useful for users who don’t know the English language. They can use the app in their local language to understand it better and use it effectively. Using an app in your native language allows you to use it more easily and freely. It makes you understand the options and settings easily and makes it convenient to use.

Cons of Third Party Apps 

Despite the above-mentioned benefits, third party apps also have several disadvantages. Let us explore all those cons of using third party apps on streaming devices.

Low Quality Videos

Not all, but some third party apps may offer low quality resolution of videos. In some apps you may find videos buffering endlessly. So, low quality is a major issue in using third party apps. So, while choosing any third party app, it is essential to test the resolution and streaming quality. If they offer the resolution that meets your expectation, you can install it on your device and stream movies or TV shows. 

Risk of shutting down

Some apps stream exclusive content like live sports events, that is illegal. Yes, users can enjoy the broadcast of live events, but as third party apps don’t own the rights to telecast those events, the apps having the exclusive rights of the event can file a lawsuit against such apps. So, it is beneficial to check whether the apps you use have the rights to telecast the content you wish to watch. If not, you should go for some other option. 

Viruses and Malware

There is a probability of viruses and malware downloading with third party apps. Usually, when you download apps from unofficial sources, there are chances of viruses and malware that can damage your device memory and software. Therefore, it is always better to download third party apps from their official websites or app stores. 

Unavailability of Updates

All official apps come up with regular updates to fix the bugs and tech issues. But with third-party apps, updates may or may not be available. These apps don’t get updated automatically. Also, they might not work after an update on your streaming device, leaving you frustrated and longing for simpler times.

Storage Struggles

Third-party programs take up memory on streaming devices, which typically have limited storage space. Your device may get slower and you may run out of space for the apps you really use if you install too many. To preserve storage on your device, it is usually preferable to install fewer apps than you really need. 

Summing Up

Using third-party apps on your TV or streaming device may offer you many benefits, but it doesn’t mean you can ignore the risks associated with their use. While they might offer access to a world of content, these risks, from security concerns to legal troubles. It is always better to do your research about the legitimacy of the apps before installing and using them on your device. 

]]>
604784
How Can I Spy on My Partner’s Phone? https://www.webpronews.com/spy-on-partners-phone/ Sun, 19 May 2024 12:53:35 +0000 https://www.webpronews.com/?p=604769 Are you suspicious of your partner’s activities? Wondering if they’re being honest with you? Thoughts like these can destroy your mental peace and make you feel stuck in one place. What if we told you there’s a way to ascertain facts and settle things once and for all?

Yes, in today’s digital age, it’s easier than ever to spy on your partner’s phone discreetly. From concerns about infidelity to ensuring their safety, there are various reasons why you might consider spying on your partner’s phone.

Why Might It Be Necessary?

Trust forms the very basis of a relationship. However, certain circumstances may give rise to doubts that might cloud the trust. There are valid reasons why you might feel the need to spy on your partner’s phone.

Infidelity, unfortunately, is one of the most common concerns that can shake the core of any relationship. If you notice suspicious behavior or if your partner has given you reasons to doubt their fidelity, it’s natural to seek reassurance. Monitoring their phone activity might offer clarity and provide peace of mind by either dispelling your suspicions or confirming them.

Beyond infidelity, ensuring your partner’s safety is paramount. In today’s world, where unforeseen dangers lurk both online and offline, tracking your partner’s phone can serve as a precautionary measure. Whether they’re traveling alone, going through a challenging situation, or simply navigating unfamiliar territories, being able to monitor their location and communication can offer a sense of security for both parties involved.

How to Track Your Spouse’s Phone?

If you’ve ever wondered how to spy on my partner’s phone for free and with minimal effort, there are several methods you can explore. Accessing iCloud or Android backups is one option, allowing you to view their data remotely. Setting up WhatsApp Desktop as the second option provides full access to their conversations, albeit with some visibility on their end. Finally, See What Someone Is Doing on Their Phone Through Wi-Fi by using apps like Eyezy, Find My Phone or Google Maps can also help pinpoint their location discreetly.

iCloud or Android Backup

One method to track your spouse’s phone activity is by accessing their iCloud or Android backups. By gaining access to their iCloud account, you can remotely activate a backup of their device, granting you access to their data, including messages, photos, and app activity. Similarly, Android users can utilize the backup feature to retrieve information from their partner’s device. This method allows for discreet monitoring without the need for physical access to the phone. However, the backup information can be pretty limited and you also must have their iCloud/Google credentials to log in.

Set Up WhatsApp Desktop

Another approach to tracking partner’s phone is by setting up WhatsApp Desktop. This option provides full access to their WhatsApp account, enabling you to view their messages, photos, and calls in real-time. However, it’s worth noting that the linked desktop will be visible in the settings of their WhatsApp account, potentially alerting them to the monitoring activity. Despite this visibility, it remains a convenient method for tracking their conversations discreetly.

Use Find My Phone or Google Maps

For tracking your partner’s location, apps like Find My Phone or Google Maps can be invaluable tools. By using these applications, you can pinpoint the exact whereabouts of your spouse without their knowledge. Whether you’re concerned about their safety or simply curious about their whereabouts, these tracking features offer a discreet way to monitor their movements.

Eyezy- The Ultimate Solution

One of the most effective ways to monitor your partner’s phone is through an app. While there are a lot of apps to monitor your partner’s phone, Eyezy stands out as the number one choice. This powerful tool is designed for families concerned about their loved one’s well-being.

With Eyezy, you can track calls, messages, browsing history, and even GPS location in real-time. Its intuitive interface and comprehensive features make it the number-one choice for those seeking peace of mind. With Eyezy, you can discreetly ensure your partner’s safety and gain valuable insights into their digital activity, fostering trust and transparency in your relationship.

Features of Eyezy include:

  • Call Monitoring
  • Text Message & Email Tracking
  • Browsing History & Online Activity Viewing
  • GPS Location Tracking
  • Geo-Fencing
  • Social Media Monitoring
  • Remote Camera & Ambient Recording
  • Device Storage Access
  • Keylogger & Screen Recording
  • Keyword Alerts
  • Centralized Control Panel

Conclusion

Your decision to spy on partner’s phone may seem intrusive. However, sometimes it becomes necessary for your peace of mind or their safety.

By using discrete methods and reliable apps like Eyezy, you can gain insight into their activities without jeopardizing trust. Remember to use these tools responsibly and prioritize open communication in your relationship.

]]>
604769
FBI Deputy Director Urges More Warrantless Surveillance of Americans https://www.webpronews.com/fbi-deputy-director-urges-more-warrantless-surveillance-of-americans/ Thu, 09 May 2024 19:39:15 +0000 https://www.webpronews.com/?p=604420 FBI Deputy Director Paul Abbate said the quiet part out loud, seemingly acknowledging that warrantless wiretaps are unnecessary and yet urging employees to use them more.

Section 702 of the Foreign Intelligence Surveillance Act (FISA) was reauthorized and expanded, giving intelligence agencies and law enforcement broader scope to collect data on US citizens. The bill is so expansive that it was nicknamed the “Stasi Amendment,” a reference to the notorious East German secret police force.

Despite the FBI aggressively pushing for reauthorization of the expanded bill, it appears the agency knows such surveillance powers are not necessary. In an email leaked to WIRED, Deputy Director Paul Abbate urges FBI employees to use the ability to search for data on US citizens in an effort to prove that the capability is needed.

“To continue to demonstrate why tools like this are essential to our mission, we need to use them, while also holding ourselves accountable for doing so properly and in compliance with legal requirements,” Abbate wrote in the email. [Emphasis his.]

“I urge everyone to continue to look for ways to appropriately use US person queries to advance the mission, with the added confidence that this new pre-approval requirement will help ensure that those queries are fully compliant with the law,” added Abbate.

As a general rule, if the program was truly necessary, wouldn’t its value already be apparent? Wouldn’t the FBI have plenty of data to show how much it needs the program if it was truly yielding results? Why should the FBI’s employees need to use warrantless surveillance more to provide why they need to use it in the first place?

Lawmakers are evidently beginning to ask the same questions.

“The deputy director’s email seems to show that the FBI is actively pushing for more surveillance of Americans, not out of necessity but as a default,” says US representative Zoe Lofgren. “This directly contradicts earlier assertions from the FBI during the debate over Section 702’s reauthorization.”

Section 702 allows US intelligence agencies to monitor the communications of foreign individuals for national security reasons. As part of that surveillance, the communications of US citizens is often scooped up as well, and the bill allows for those communications to be stored for years. What’s more, the FBI has the authority to go back and search those communications in conjunction with things that have nothing to do with national security, such as a criminal investigation, and can share that information with other law enforcement.

If the FBI had a well-established track record of responsibly using its ability there might be slightly less concern. By the FBI’s own admission, however, the agency has a terrible track record of abusing its access to said data.

It’s little wonder that Senator Ron Wyden slammed the expansion of Section 702.

“The House bill represents one of the most dramatic and terrifying expansions of government surveillance authority in history,” Senator Wyden said. “It allows the government to force any American who installs, maintains, or repairs anything that transmits or stores communications to spy on the government’s behalf. That means anyone with access to a server, a wire, a cable box, a wifi router, or a phone. It would be secret: the Americans receiving the government directives would be bound to silence, and there would be no court oversight. I will do everything in my power to stop this bill.”

And that was before the leaked email that “directly contradicts earlier assertions from the FBI during the debate over Section 702’s reauthorization.”

]]>
604420
FCC Nixes Internet Fast Lanes, Closing Loophole That Worried Experts https://www.webpronews.com/fcc-nixes-internet-fast-lanes-closing-loophole-that-worried-experts/ Wed, 08 May 2024 23:11:20 +0000 https://www.webpronews.com/?p=604388 The Federal Communications Commission (FCC) has reinstated net neutrality, closing a loophole along the way that worried some experts.

The FCC voted to restore net neutrality in late April, leveling the playing field for large and small internet companies alike. The agency released its final ruling yesterday, containing some changes that closed a potential loophole by nixing so-called “fast lanes.”

The Issue

At the heart of the issue was the possibility that some ISPs could create internet fast lanes for certain types of traffic. Although the net neutrality rules prohibited paid fast lanes, a loophole existed for fast lanes as long as ISPs did not charge the companies providing the content, services, or applications to customers.

Stanford Law Professor Barbara van Schewick warned the FCC before the final vote that ISPs could abuse fast lanes, essentially bypassing net neutrality by coming at the issue from a different direction: don’t slow undesirable traffic down, simply speed up desirable traffic.

Professor van Schewick outlined the issue with such an approach:

Net neutrality means that we, the people who use the internet, get to decide what we do online, without interference from ISPs. ISPs do not get to interfere with our choices by blocking, speeding up or slowing down apps or kinds of apps. Apps compete on a level playing field, and users, not ISPs, determine which apps are successful.

Differences in performance, including relative differences in performance, matter. Even small differences in load times affect how long people stay on a site, how much they pay, and whether they’ll come back. Those differences also affect how high up sites show in search results.

Thus, letting ISPs choose which apps get to be in a fast lane lets them, not users, pick winners and losers online.

The FCC’s Final Ruling

In its final ruling, the FCC cited Professor van Schewick’s letter before making the following clarification:

Our interpretation of “throttling” encompasses a wide variety of conduct that could impair or degrade an end user’s ability to access content of their choosing. We clarify that a BIAS provider’s decision to speed up “on the basis of Internet content, applications, or services” would “impair or degrade” other content, applications, or services which are not given the same treatment.

Essentially, the FCC is taking the approach that any prioritization of certain traffic will ultimately lead to ISPs playing favorites, giving them the ability to pick winners and losers and put smaller companies at an unfair advantage.

Chairwoman Rosenworcel’s Statement

“I think in a modern digital economy we should have a national net neutrality policy and make clear the Nation’s expert on communications has the ability to act when it comes to broadband,” said Chairwoman Jessica Rosenworcel. “This is good for consumers, good for public safety, and good for national security. And that is why we are taking this action today under Title II of the Communications Act.”

Chairwoman Rosenworcel emphasized the widespread support for net neutrality that consumers expressed to the agency.

“Let’s start with consumers,” she continued.”They spoke out in droves when this agency repealed net neutrality. They jammed our in-boxes, overwhelmed our online comment system, and clogged our phone lines. They clamored to get net neutrality back. In the intervening years, they have not stopped. Thousands of consumers write us month after month seeking to have this agency help them navigate issues with their broadband service. Yet, as a result of the last FCC throwing these policies out and backing away from broadband, we can only take action when they have issues with their long distance voice service. There is nothing modern about that.

Chairwoman Rosenworcel then addressed the fast lane issue directly.

“Consumers have made clear to us they do not want their broadband provider cutting sweetheart deals, with fast lanes for some services and slow lanes for others,” she said. “They do not want their providers engaging in blocking, throttling, and paid prioritization. And if they have problems they expect the Nation’s expert authority on communications to be able to respond. Because we put national net neutrality rules back on the books, we fix that today.”

A Free and Open Internet

The reinstatement of net neutrality helps ensure a level playing field for companies of all sizes and prevents ISPs from acting as gatekeepers that decide what companies succeed or fail based on the quality of internet traffic they receive.

Essentially, the reinstatement of net neutrality helps codify the principles of a free and open internet that was very much a critical component in the minds of its founders.

]]>
604388
Wireless Carriers Plan to Fight FCC’s Fines https://www.webpronews.com/wireless-carriers-plan-to-fight-fccs-fines/ Wed, 08 May 2024 20:56:19 +0000 https://www.webpronews.com/?p=604386 The top US wireless carriers have announced plans to fight the FCC’s fines for selling access to their customers’ location data.

The FCC announced in late April that it was fining AT&T, T-Mobile, and Verizon a combined $200 million for illegally sharing customer location data with third-party companies, as well as failing to put sufficient safeguards in place to protect that data.

“Our communications providers have access to some of the most sensitive information about us. These carriers failed to protect the information entrusted to them. Here, we are talking about some of the most sensitive data in their possession: customers’ real-time location information, revealing where they go and who they are,” FCC Chairwoman Jessica Rosenworcel said at the time. “As we resolve these cases – which were first proposed by the last Administration – the Commission remains committed to holding all carriers accountable and making sure they fulfill their obligations to their customers as stewards of this most private data.”

In statements to Mashable, all three carriers said they plan to fight the fines in court, and accused the FCC of placing blame in the wrong place.

“The FCC order lacks both legal and factual merit,” an AT&T spokesperson told the outlet. “It unfairly holds us responsible for another company’s violation of our contractual requirements to obtain consent, ignores the immediate steps we took to address that company’s failures, and perversely punishes us for supporting life-saving location services like emergency medical alerts and roadside assistance that the FCC itself previously encouraged.”

At the heart of the issue is how data aggregators the carriers had deals with used the data they had access to, with all three companies blaming these other companies for the misuse of customer data. Further complicating the issue is that both Verizon and T-Mobile shut down the aggregator location services several years ago.

“In this case, when one bad actor gained unauthorized access to information relating to a very small number of customers, we quickly and proactively cut off the fraudster, shut down the program, and worked to ensure this couldn’t happen again,” a Verizon spokesperson told Mashable.

]]>
604386
Senators Urge Restrictions On TSA’s Use of Facial Recognition https://www.webpronews.com/senators-urge-restrictions-on-tsas-use-of-facial-recognition/ Sat, 04 May 2024 20:27:20 +0000 https://www.webpronews.com/?p=604230 A bipartisan group of senators have written to Senate Majority Leader Chuck Schumer and Minority Leader Mitch McConnell calling for restrictions on TSA’s use of facial recognition.

The Transportation Security Administration has been increasingly rolling out facial recognition to airports around the US. While travelers can opt-out, in favor of traditional screenings, some passengers are unaware of this and other choose facial recognition screening out of convenience or a lack of understanding of the privacy issues involved.

Senators are calling on Schumer and McConnell to take the lead in restricting TSA’s use of facial recognition “until rigorous congressional oversight occurs,” citing TSA’s plans to make facial recognition mandatory.

Congress must address this issue in the 2024 Federal Aviation Administration Reauthorization. TSA announced in July that they plan to expand facial recognition surveillance from 25 to over 430 airports. While TSA states the program is optional, it is the stated intent of the TSA to expand this technology beyond the security checkpoint and require that passengers undergo facial recognition scans every time they travel. In 2018, TSA released their Biometrics Roadmap detailing their goal of a “biometrically-enabled curb-to-gate passenger experience.” In April 2023, TSA Administrator Pekoske admitted at the South by Southwest Conference that “we will get to the point where we will require biometrics across the board.”

As the senators point out, people becoming comfortable with facial recognition at airports is a slippery slope that could lead to mass surveillance across the board, with little to no objection from citizens:

The potential for misuse of this technology extends far beyond airport security checkpoints. Once Americans become accustomed to government facial recognition scans, it will be that much easier for the government to scan citizens’ faces everywhere, from entry into government buildings, to passive surveillance on public property like parks, schools, and sidewalks.

The senators go on to state that TSA’s plans are disingenuous since there is no evidence that facial recognition makes air travel safer:

Furthermore, this powerful surveillance technology as deployed by TSA does not make air travel safer. In response to congressional inquiries, TSA has not produced evidence that more false identification documents have been discovered since their implementation of facial recognition. The 3% error rate cited by TSA represents more than 68,000 mismatches daily if used on all 2.3 million daily travelers. Recent news reports that hundreds of passengers have bypassed TSA security checkpoints entirely in recent years suggests that TSA should focus on the fundamentals, not expanding its facial recognition program.

With the TSA’s announcement in July 2023 that they plan to expand facial recognition surveillance from 25 to over 430 airports, it is clear that we are at a critical juncture. The scope of the government’s use of facial recognition on Americans will expand exponentially under TSA’s plans, with little to no public discourse or congressional oversight.

Given the myriad of abuses TSA agents have been accused and/or found guilty of—everything from overly aggressive screenings and pat-downs to sexual assault—it’s little wonder that senators are concerns about the abuses that come result from the agency’s widespread and mandatory use of facial recognition.

The letter was signed by Senators Jeffrey A. Merkley, John Kennedy, Edward J. Markley, Roger Marshall, M.D., Kevin Cramer, Ron Wyden, Steve Daines, Elizabeth Warren, Mike Braun, Bernie Sanders, Cynthia Lummis, Chris Van Hollen, Peter Welch, Laphonza Butler.

]]>
604230
FBI’s Warrantless Search of Americans’ Data Drops By 50% In 2023 https://www.webpronews.com/fbis-warrantless-search-of-americans-data-drops-by-50-in-2023/ Sat, 04 May 2024 19:24:43 +0000 https://www.webpronews.com/?p=604227 Warrantless surveillance of Americans has been in the news lately, but the FBI says its surveillance of Americans dropped by roughly 50% in 2023.

Section 702 of the Foreign Intelligence Surveillance Act was recently reauthorized and expanded, widening the scope of individuals and professions that can be pressed into helping authorities surveil others. Despite the reauthorization, the FBI says warrantless surveillance of Americans is down significantly in its Annual Statistical Transparency Report.

The FBI says the number of US person queries in the period from November 2022 to December 2023, dropped to 57,094. In contrast, the previous year saw 119,383 queries, and the year before that saw 2,964,643. The FBI says its figures are almost certainly over-counted as a result of how the FBI counts queries:

While the FBI’s methodology closely matches that used by other IC elements, it still is almost certainly
an overcount with respect to queries that are part of batch jobs. This is because, as indicated elsewhere
in this report, if even one query term in a batch job is identified by a user as a U.S. person query term
and labeled as such, FBI systems apply the U.S. person label to every query term in that batch. The FBI’s
counting methodology does not correct for this type of over-counting.

The FBI also says the variance in queries from one year to the next based on the investigations being conducted. For example, in the first half of 2021, there were a large number of queries related to a single investigation pertaining to foreign actors trying to launch cyberattacks on US critical infrastructure. This accounted for 1.9 million of the 2,964,643 queries in that period.

Interestingly, the FBI acknowledges that it uses the data it queries reasons other than its intended purpose, to foil and catch terrorists.

As noted above, FBI is the only intelligence agency with Section 702 querying procedures that allow for
queries that are reasonably likely to retrieve evidence of a crime, in addition to queries that are reasonably
likely to return foreign intelligence information. Recognizing that unrelated crimes can be discovered in
the course of conducting FISA activities, Congress required that FISA minimization procedures contain
provisions addressing how to treat evidence of unrelated crimes acquired in the course of a foreign intelligence activity….There are also instances where the FISA-derived information
sought is both relevant to foreign intelligence information and a criminal act (e.g., information relating
to international terrorism).

In recent years, both Congress and the FISC have focused particular attention on instances in which
FBI’s purpose at the time of the query is solely to retrieve evidence of a crime and that are not designed
to retrieve foreign intelligence information. There are two specific requirements related to these queries:
(1) a statutory requirement for FBI to obtain a court order to review the results of certain evidence of
a crime-only queries related to a predicated criminal investigation and (2) a FISC quarterly reporting
requirement to provide the number of U.S. person evidence of a crime-only queries that resulted in
content review, whether or not they are associated with a predicated criminal investigation. Both are
explained below with corresponding statistics.

This is at the heart of issue critics have with Section 702, namely that it allows law enforcement to mine data collected expressly for intelligence gathering to be used in investigations completely unrelated to national security.

As the FBI highlights, some measures have been put in place to regulate these instances, but evidence consistently shows that the FBI has played fast and loose with its access to this data. The Electronic Frontier Foundation (EFF), citing the FBI’s own internal documents, outlines the abuses that continue to occur:

Despite reassurances from the intelligence community about its “culture of compliance,” these documents depict almost no substantial consideration of privacy or civil liberties. They also suggest that in the years before these guidelines were written, even amidst widespread FBI misuse of the databases to search for Americans’ communications, there were even fewer written guidelines governing their use. Above all, FBI agents can still search for and read Americans’ private communications collected under Section 702, all without a warrant or judicial oversight.

The EFF minces no words in its description of Section 702:

Section 702 has become something Congress never intended: a domestic spying tool. Congress should consider ending the program entirely, but certainly not reauthorize Section 702 without critical reforms, including true accountability and oversight.

While critics will no doubt be happy to see the number of US persons queries dropped significantly in 2023, most will not be satisfied until the FBI and law enforcement is required to get a warrant to access and use the data collected on Americans.

]]>
604227
FCC Fines Wireless Carriers For Illegally Sharing Customer Location Data https://www.webpronews.com/fcc-fines-wireless-carriers-for-illegally-sharing-customer-location-data/ Tue, 30 Apr 2024 10:30:00 +0000 https://www.webpronews.com/?p=603958 The Federal Communications Commission has fined AT&T, Sprint, T-Mobile, and Verizon for illegally sharing access to customer location data.

According to the FCC, the four carriers illegally shared access to customer location data and failed to put proper protection in place to safeguard such data. The FCC has fined Sprint $12 million, T-Mobile $80 million, AT&T more than $57 million, and Verizon nearly $47 million, for just under $200 million total.

The FCC Enforcement Bureau investigations of the four carriers found that each carrier sold access to its customers’ location information to “aggregators,” who then resold access to such information to third-party location-based service providers. In doing so, each carrier attempted to offload its obligations to obtain customer consent onto downstream recipients of location information, which in many instances meant that no valid customer consent was obtained. This initial failure was compounded when, after becoming aware that their safeguards were ineffective, the carriers continued to sell access to location information without taking reasonable measures to protect it from unauthorized access.

“Our communications providers have access to some of the most sensitive information about us. These carriers failed to protect the information entrusted to them. Here, we are talking about some of the most sensitive data in their possession: customers’ real-time location information, revealing where they go and who they are,” said FCC Chairwoman Jessica Rosenworcel. “As we resolve these cases – which were first proposed by the last Administration – the Commission remains committed to holding all carriers accountable and making sure they fulfill their obligations to their customers as stewards of this most private data.”

As the FCC points out, section 222 of the Communication Act requires that carriers “take reasonable measures to protect certain customer information, including location information.” The law also requires carriers to protect customer confidentiality and get customers’ consent before sharing their data.

“The protection and use of sensitive personal data such as location information is sacrosanct,” said Loyaan A. Egal, Chief of the FCC Enforcement Bureau and Chair of its Privacy and Data Protection Task Force. “When placed in the wrong hands or used for nefarious purposes, it puts all of us at risk. Foreign adversaries and cybercriminals have prioritized getting their hands on this information, and that is why ensuring service providers have reasonable protections in place to safeguard customer location data and valid consent for its use is of the highest priority for the Enforcement Bureau.”

]]>
603958