Travelers heading into the US have many reasons to be cautious about their devices, and a July report from the Department of Homeland Security gives even more concern on how much data border patrol agents can pull from your phones and computers.
In a Privacy Impact Assessment released on July 30, the DHS detailed its US Border Patrol Digital Forensics program, specifically for its development of tools to collect data from electronic devices. For years, DHS and border agents were allowed to search devices without a warrant, until a court found the practice unconstitutional in November 2019.
In 2018, the agency searched more than 33,000 devices, compared to 30,200 searches in 2017 and just 4,764 searches in 2015. Civil rights advocates have argued against this kind of surveillance, stating that it violates people's rights to their privacy.
The report highlights the DHS's capabilities, which shows that agents can create an exact copy of data on devices when travelers cross the border. According to the DHS, extracted data from devices can include:
- Contacts
- Call Logs/Details
- IP Addresses used by the device
- Calendar Events
- GPS Locations used by the device
- Emails
- Social Media Information
- Cell Site Information
- Phone Numbers
- Videos and Pictures
- Account Information (User Names and Aliases)
- Text/chat messages
- Financial Accounts and Transactions
- Location History
- Browser bookmarks
- Notes
- Network Information
- Tasks List
The agency did not respond to a request for comment. The policy to retain this data for 75 years still remains, according to the report.
iPhone owners can now plug in hardware security keys with the YubiKey 5Ci
That data is extracted and saved on the DHS's local digital forensics network, and transferred to PenLink, a phone surveillance software that helps manage metadata taken from devices. The company is used by police across the US to intercept text messages, phone calls and GPS data from devices.
But it also analyzes data from social media and tech platforms, according to its website.
On its Free Trial offer, PenLink tells potential customers that it can map collected data including Snapchat geolocations, Facebook logged locations and Google's geofenced data. The company did not respond to a request for comment.
"USBP uses the information it gathers using these tools to develop leads, identify trends associated with illicit activity, and further law enforcement actions related to terrorism, human and narcotic smuggling, and other activities posing a threat to border security or national security or indicative of criminal activity," the DHS's report stated.
The detailed list of how much information your phone can give about you comes several days before the National Security Agency advised its staffers the best practices to keeping your device data private, which include turning off location services, advertising permissions and deactivating Bluetooth and Wi-Fi.
The DHS said the privacy risks of using the tools are low because only trained forensics technicians will have access to the tools, and only data relevant to investigations will be extracted.
That assurance is a stark contrast from what lawyers from the American Civil Liberties Union and the Electronic Frontier Foundation found, after a lawsuit revealed that agents had searched through traveler's devices without any restrictions, and often for unrelated reasons like enforcing bankruptcy laws and helping outside investigations.
"device" - Google News
August 11, 2020 at 03:08AM
https://ift.tt/31DFATd
Homeland Security details new tools for extracting device data at US borders - CNET
"device" - Google News
https://ift.tt/2KSbrrl
https://ift.tt/2YsSbsy
Bagikan Berita Ini
0 Response to "Homeland Security details new tools for extracting device data at US borders - CNET"
Post a Comment