[OPLIN 4cast] OPLIN 4Cast #596: Your phone's location data...leaked

OPLIN Support support at oplin.ohio.gov
Wed May 30 10:32:44 EDT 2018


Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
[image: OPLIN 4Cast]

OPLIN 4Cast #596: Your phone's location data...leaked
May 30th, 2018

[image: Smart phone showing navigation map] We've already talked about facial
recognition <https://4cast.oplin.org/?p=6931> this month in the *4cast*, so
I'm not going to cover that again. Still, there's been a lot of news
recently about uses and abuses of the technology (in Chinese classrooms
<http://www.scmp.com/news/china/society/article/2146387/pay-attention-back-chinese-school-installs-facial-recognition>,
New York schools <https://boingboing.net/2018/05/21/kafka-high.html>, an Oregon
sheriff's department
<https://techcrunch.com/2018/05/22/amazon-facial-recognition-software-raises-privacy-concerns-with-the-aclu/>,
your own emotions
<https://techcrunch.com/2018/05/22/realeyes-which-uses-ai-and-a-front-facing-camera-to-read-viewers-emotions-raises-16-2m/>)
that you may want to catch up on.

But I'd like to highlight a story that's gotten much less attention,
particularly when compared to coverage of how Cambridge Analytica exploited
Facebook's lax stewardship of customer data in its political consulting.
Regardless of whether you have location sharing turned on, your wireless
company knows where you are, and it shares that real-time location-tracking
data to companies without your consent. Further, those companies in turn
have been selling (or just giving away) that information.

   -
   - Service Meant to Monitor Inmates’ Calls Could Track You, Too
   <https://www.nytimes.com/2018/05/10/technology/cellphone-tracking-law-enforcement.html>
   [*New York Times*] "The service can find the whereabouts of almost any
   cellphone in the country within seconds. It does this by going through a
   system typically used by marketers and other companies to get location data
   from major cellphone carriers, including AT&T, Sprint, T-Mobile and
   Verizon."
   - Hacker Breaches Securus, the Company That Helps Cops Track Phones
   Across the US
   <https://motherboard.vice.com/en_us/article/gykgv9/securus-phone-tracking-company-hacked>
   [*Motherboard*] "Although it’s not clear how many of these customers are
   using Securus’s phone geolocation service, the news still signals the
   incredibly lax security of a company that is granting law enforcement
   exceptional power to surveill individuals."
   - Tracking Firm LocationSmart Leaked Location Data for Customers of All
   Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site
   <https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/>
   [*KrebsonSecurity*] "Anyone with a modicum of knowledge about how Web
   sites work could abuse the LocationSmart demo site to figure out how to
   conduct mobile number location lookups at will, *all without ever having
   to supply a password or other credentials*."
   - The Privacy Scandal That Should Be Bigger Than Cambridge Analytica
   <https://slate.com/technology/2018/05/the-locationsmart-scandal-is-bigger-than-cambridge-analytica-heres-why-no-one-is-talking-about-it.html>
   [*Slate*] "What the LocationSmart scandal lacks is not import, nor the
   potential for serious harm, but a link to some divisive political issue or
   societal outrage sufficient enough to generate visceral anger from people
   who aren’t privacy wonks."

*From the Ohio Web Library <http://ohioweblibrary.org>:*

   - "Risks Posed by Mobile Network Vulnerabilities
   <http://proxy.oplin.org:2054/login.aspx?direct=true&db=pwh&AN=122127368>
   ." *USA Today Magazine*, vol. 145, no. 2863, Apr. 2017, p. 8.
   - "Securus Technologies, Inc
   <http://proxy.oplin.org:2054/login.aspx?direct=true&db=buh&AN=124125858&site=ehost-live>
   ." *Securus Technologies, Inc. Marketline Company Profile*, 05 Apr.
   2017, pp. 1-12.
   - Shackford, Scott. "Let's Not Blame Tech Tools If This Sheriff
   Illegally Violated People's Privacy: Government, Not Private Companies, Is
   Supposed to Provide Oversight over Police Behavior
   <http://proxy.oplin.org:2054/login.aspx?direct=true&db=pwh&AN=129599554>
   ." *Hit & Run*, 11 May 2018, p. 1.

------------------------------
The *OPLIN 4cast* is a weekly compilation of recent headlines, topics, and
trends that could impact public libraries. You can subscribe to it in a
variety of ways, such as:

   - *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
   subscribing to the following URL: http://www.oplin.org/4cast/
   index.php/?feed=rss2.
   - *Live Bookmark.* If you're using the Firefox web browser, you can go
   to the 4cast website (http://www.oplin.org/4cast/) and click on the
   orange "radio wave" icon on the right side of the address bar. In Internet
   Explorer 7, click on the same icon to view or subscribe to the 4cast RSS
   feed.
   - *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
   OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
   http://lists.oplin.org/mailman/listinfo/OPLIN4cast
   <http://lists.oplin.org/mailman/listinfo/OPLIN4cast>.

© 2018 Ohio Public Library Information Network
[image: Find us on Slideshare] <http://www.slideshare.net/oplin>  [image:
Find us on Facebook] <http://www.facebook.com/oplin.org>  [image: Find us
on Google+] <https://plus.google.com/107751358238995507967>  [image: Find
us on Twitter] <http://www.twitter.com/oplin>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20180530/9052914d/attachment.html>


More information about the OPLIN4cast mailing list