Police Using IoT To Detect Crime

Privacy invasions related to the Internet of Things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.

There are no meaningful federal privacy laws in the US, outside of those that keep medical data, sealed court documents and some government records such as IRS tax returns away from prying eyes. Unless that changes, the IoT will make privacy a quaint recollection of our youth.

The Arkansas case pits Benton County Prosecutor Nathan Smith against James Bates, a homeowner whose friend was discovered dead in a hot tub after a night of intense drinking. Bates’ lawyer is arguing the death was an accident. The county is trying to determine the facts.

The government accessed records from an IoT water heater and argued that the amount of water used in the early morning was sufficient to have washed away evidence. Bates’ lawyer counters that the amount of water used does not represent a spike above the previous day’s level.

But the attempt to access the Echo records is more troubling. It began with the seemingly innocuous observation of a witness that Bates was playing music through his Echo. That gave authorities the idea to hear what information requests Bates might have made on the day of the death. It’s a 2017 version of accessing search engine history.

The Associated Press quoted Smith as saying that he “has no idea if the device recorded anything related to the death” but that he was simply chasing down all possible leads. In other words, it’s a fishing expedition.

Specifically, the prosecutor’s office is seeking all “audio recordings, transcribed records, text records and other data” from Bates’ Echo, according to a search warrant.

Here’s the problem with always-on devices such as Echo and Apple’s Siri: For it to react the moment it hears the magic word (Alexa in Amazon’s case, Siri for Apple), it has to be constantly listening.

Many consumers assume that the worst-case scenario is that the government could learn every inquiry they make to a device, which is indeed analogous to reviewing cached search engine queries. But the actual worst-case scenario is that these devices can overhear any and all conversations or sounds near it.

What if a court order demanded that everything be recorded on a suspect’s device? What if it asked that someone be alerted if the suspect said a series of words, such as the victim’s name?

What if, instead of the victim’s name, it was looking for anyone uttering an elected official’s name? Or maybe it’s a company lawyer seeking to know what its employees say about it when at home? Without explicit privacy rules, there is no limit to how far these requests could go.

Amazon issued a statement saying that it “will not release customer information without a valid and binding legal demand” and that Amazon objects to “overbroad or otherwise inappropriate demands as a matter of course.”

That sounds great and all, but it means nothing. If any judge anywhere signs a warrant, bingo, you have a valid and binding legal demand. In many instances, you don’t even need a judge. Any attorney, on his/her own, can subpoena documents as part of a case. That’s also instantly valid and binding, unless a judge intervenes.

As for “overbroad or otherwise inappropriate demands,” any judge or lawyer who issues such a demand is quite unlikely to consider their own demand overboard or inappropriate, so that doesn’t help, either.

We need real privacy laws in the US, where law enforcement, and anyone else, needs to have a specific and provable fact that they are trying to back up. Not certain how it should be worded, but I think prohibiting any request where the prosecutor tells reporters that he “has no idea if the device recorded anything related to the death” is a good place to start.

Computerworld:   

New Technology To Really Close The US / Mexican Border:

 

 

« Malware Traders Switch To Less Suspicious File Types
Montreal’s Future In Smart Sensors And AI »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

CyberRey

CyberRey

CyberRey is a leading distributor of comprehensive cybersecurity solutions, empowering organizations of all sizes to thrive in the digital age.