Skip to main content

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data.

Go
ogle sensorvault location tracking history
It's no secret that Google tracks you everywhere, even when you keep Google's Location History feature disabled.
As revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude.
According to Google, the company uses this location-tracking features with an intent to improve its users' experience, like "personalized maps, recommendations based on places you've visited, help finding your phone, real-time traffic updates about your commute, and more useful ads."
Moreover, it's also known that Google could share your location data with federal authorities in criminal investigations when asked with a warrant.
Google 'SensorVault' Database Help Police Solve Crimes
But what many people weren't aware of is that Google also helps federal authorities identify suspects of crimes by sharing location history of all devices that passed through crime scenes over a certain time period.
It should be noted Google doesn't share personal information of all nearby users; instead, it asks the police to first analyze location history of all users and narrows down results to only a few selected users to receive their names, email addresses, and other personal data from Google.
A new in-depth report from The New York Times revealed that Google maintains a database, known internally as Sensorvault, over nearly the past decade, containing detailed location records from hundreds of millions of phones around the world, and shares with authorities nationwide with warrants to mine it to help in criminal cases.
According to several unnamed Google employees cited in the report, such requests to dive into Google's Sensorvault database have spiked in the last six months, with the company receiving as many as 180 requests in just one week.
How Does Law Enforcement Use Google SensorVault Database?
To seek location data, law enforcement needs to get a so-called "geofence" warrant.
Here below I have tried to step-by-step illustrate how Google shares location data when "legally" required:
The authorities reached out to Google with a geofence warrant looking for smartphones Google had recorded around the crime scene.
After receiving the warrant, Google gathers location information from its Sensorvault database and sends it to investigators, with each device identified by an anonymous ID code and not the actual identity of the devices.
Investigators then review the data, look for patterns of the devices near the crime scene, and request further location data on devices from Google that appear relevant to see the particular device movement beyond the original area defined in the warrant.
When investigators narrow results to a few devices, which they think may belong to suspects or witnesses, Google reveals the real name, email address and other data associated with the devices.
The NYT report explained the entire process when federal agents requested the location data to investigate a string of bombings around Austin, Texas.
Federal agents first used this technique of catching criminals in 2016, which has since been spread to local departments across the country, including in California, Florida, Minnesota, and Washington.
While the technique has been proven to work, it's not a foolproof way to catch criminals.
Some cases highlighted by the NYT report showed how police used this data to accuse innocents, with one man jailed for a week last year in a murder investigation after being recorded near the killing location and then released after investigators pinpointed and arrested another suspect.
It's no surprise that law enforcement seeks help from tech companies during criminal investigations, but the use of location history databases like Sensorvault has raised concerns... concerns about the privacy of users... concerns about data collection... concerns about innocent being accused and implicated.

Comments

Popular posts from this blog

We Bring You Brief Series of Sanctions Against Uganda Government Officials.

📸: Gen Abel Kandiho. On 9-December-2021, USA slapped sanctions against the then CMI Commander Gen Abel Kandiho. 📸: Gen Kale Kayihura. On 9-December-2022, UK slapped sanctions against former Police Boss Gen Kale Kayihura. 📸: Commissioner General of Prisons, Johnson Byabashaija. Again on this 4-December-2023, the same USA has slapped sanctions against Uganda Prisons Commander Johnson Byabashaija over alleged torture and human rights abuses in Prisons across Uganda. We ask, has USA and UK made December as an LCM to slap sanctions against high ranking government officials in Uganda even when the sanctions just remain on paper without deeper investigations to ascertain logical conclusions or remedy to that effect ?. #iip_updates  #Information_is_Power  #we_inform_the_uninformed

WHERE IS MINISTER OF SEX SIMON LOKODO?. (He deserves a battle of soda from me! Ministe`r esalanga mabee. He is quick to run after Mrs Dr Stella Nyanzi and other Opposition elements. Government aza aza edo zuu vaa kpere bua). Anyway, below is the article! POLICE OFFICER AKOL ESTHER CHARGED OF BEING A PUBLIC NUISANCE Naughty Officer Officer who embarrassed police after leaking nude photo charged 13.03.2018 She serves in the 'Very Important Persons Protection Unit'  Akol Esther  (Courtesy) A female police officer whose nude photo surfaced on social media has been charged of being a public nuisance. Akol Esther serves in the Very Important Persons Protection Unit (VIPPU) of the police force. Kampala Metropolitan Police spokesperson Luke Owoyesigire says Akol Esther might be demoted or expelled from the police force if found guilty of circulating nude photos. Police court is yet to announce date when Akol Esther is expected to appear for a hearing. This comes at a time when Pornography Control Committee is taking tough measures against persons circulating pornography content. The committee warned and promised to arrest persons who will circulate pornographic content.

POLICE OFFICER AKOL ESTHER CHARGED OF BEING A PUBLIC NUISANCE Naughty Officer Officer who embarrassed police after leaking nude photo charged 13.03.2018 She serves in the 'Very Important Persons Protection Unit' Akol Esther  (Courtesy) A female police officer whose nude photo surfaced on social media has been charged of being a public nuisance. Akol Esther serves in the Very Important Persons Protection Unit (VIPPU) of the police force. Kampala Metropolitan Police spokesperson Luke Owoyesigire says  Akol Esther might be demoted or expelled from the police force if found guilty of circulating nude photos . Police court is yet to announce date when Akol Esther is expected to appear for a hearing. This comes at a time when Pornography Control Committee is taking tough measures against persons circulating pornography content. The committee warned and promised to arrest persons who will circulate pornographic content.

How to Host a Website for Free From Your PC or Laptop.

Why pay for a web hosting service when your old computer can do the same thing? Learn how to self-host your site. If you're planning to launch a website but don't want to pay recurring monthly or annual hosting fees, you can use any old laptop or desktop PC to host a website for free. It's a great way to utilize your old system instead of throwing it away. In this guide, we will install and set up services on our 10-year-old laptop to host a WordPress, Joomla, or custom HTML or PHP-based website with a free SSL certificate. MAKEUSEOF VIDEO OF THE DAY Things You Will Need to Host a Website Following are the pre-requisites to host a website for free from home with just your computer: An old laptop or PC running Ubuntu Server. A registered domain name for your website Ethernet cable to connect the laptop or PC to router for reliable and fast connection Step 1: Update and Upgrade the Packages After  installing Ubuntu Server on your computer , execute the following c