Police Using IoT To Detect Crime

Privacy invasions related to the Internet of Things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.

There are no meaningful federal privacy laws in the US, outside of those that keep medical data, sealed court documents and some government records such as IRS tax returns away from prying eyes. Unless that changes, the IoT will make privacy a quaint recollection of our youth.

The Arkansas case pits Benton County Prosecutor Nathan Smith against James Bates, a homeowner whose friend was discovered dead in a hot tub after a night of intense drinking. Bates’ lawyer is arguing the death was an accident. The county is trying to determine the facts.

The government accessed records from an IoT water heater and argued that the amount of water used in the early morning was sufficient to have washed away evidence. Bates’ lawyer counters that the amount of water used does not represent a spike above the previous day’s level.

But the attempt to access the Echo records is more troubling. It began with the seemingly innocuous observation of a witness that Bates was playing music through his Echo. That gave authorities the idea to hear what information requests Bates might have made on the day of the death. It’s a 2017 version of accessing search engine history.

The Associated Press quoted Smith as saying that he “has no idea if the device recorded anything related to the death” but that he was simply chasing down all possible leads. In other words, it’s a fishing expedition.

Specifically, the prosecutor’s office is seeking all “audio recordings, transcribed records, text records and other data” from Bates’ Echo, according to a search warrant.

Here’s the problem with always-on devices such as Echo and Apple’s Siri: For it to react the moment it hears the magic word (Alexa in Amazon’s case, Siri for Apple), it has to be constantly listening.

Many consumers assume that the worst-case scenario is that the government could learn every inquiry they make to a device, which is indeed analogous to reviewing cached search engine queries. But the actual worst-case scenario is that these devices can overhear any and all conversations or sounds near it.

What if a court order demanded that everything be recorded on a suspect’s device? What if it asked that someone be alerted if the suspect said a series of words, such as the victim’s name?

What if, instead of the victim’s name, it was looking for anyone uttering an elected official’s name? Or maybe it’s a company lawyer seeking to know what its employees say about it when at home? Without explicit privacy rules, there is no limit to how far these requests could go.

Amazon issued a statement saying that it “will not release customer information without a valid and binding legal demand” and that Amazon objects to “overbroad or otherwise inappropriate demands as a matter of course.”

That sounds great and all, but it means nothing. If any judge anywhere signs a warrant, bingo, you have a valid and binding legal demand. In many instances, you don’t even need a judge. Any attorney, on his/her own, can subpoena documents as part of a case. That’s also instantly valid and binding, unless a judge intervenes.

As for “overbroad or otherwise inappropriate demands,” any judge or lawyer who issues such a demand is quite unlikely to consider their own demand overboard or inappropriate, so that doesn’t help, either.

We need real privacy laws in the US, where law enforcement, and anyone else, needs to have a specific and provable fact that they are trying to back up. Not certain how it should be worded, but I think prohibiting any request where the prosecutor tells reporters that he “has no idea if the device recorded anything related to the death” is a good place to start.

Computerworld:   

New Technology To Really Close The US / Mexican Border:

 

 

« Malware Traders Switch To Less Suspicious File Types
Montreal’s Future In Smart Sensors And AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.