对 Google 位置数据中的隐私没有合理的期望
No reasonable expectation of privacy in one's Google location data

原始链接: https://fourthamendment.com/?p=58338

在“美国诉查特里”一案中,法院裁定,人们对自己的 Google 位置数据没有合理的隐私期望,因为这些数据是自愿与 Google 共享的。 用户必须在其移动设备上明确启用位置共享、位置历史记录、“位置报告”和 Google 位置准确性,以允许 Google 跟踪和存储他们的位置历史记录数据。 超过三分之一的活跃 Google 用户启用了位置记录。 尽管用户对其位置数据保持一定的控制,但他们仍然可以选择查看、编辑、删除或暂停其收集。 然而,一旦启用,即使不直接使用手机,谷歌也会通过 GPS 持续跟踪位置。 当当局通过“地理围栏令”寻求位置数据时,谷歌会提供指定时间范围内特定区域内设备的匿名列表。 在评估请求后,Google 可能会拒绝过于宽泛的要求。 此过程涉及识别地理围栏区域内的用户,提供匿名设备编号、纬度和经度坐标、时间戳、置信区间和位置数据源。 谷歌有一个三步程序来处理地理围栏请求,这降低了未经授权入侵用户隐私的风险。 尽管如此,由于自 2016 年以来地理围栏请求数量不断增加,对隐私泄露的担忧持续增加。

最大化在线隐私涉及调整几个关键领域的设置: 1. Google 活动控制:禁用所有活动历史记录,确保除非另有说明,否则不会出现任何内容。 2. 在 iOS 设备上,限制 Google 应用程序的后台权限以节省电池寿命并减少数据收集。 限制除地图之外的所有应用程序的位置服务权限,地图只能在“使用时”授予。 3. 针对不同目的使用单独的 Google 帐户有助于防止跨应用程序数据合并。 完全避免使用谷歌应用程序可以进一步保护隐私。 4. 执法机构获取个人数据仍然是一个复杂的话题。 当存在滥用、监督不足或立法模糊的可能性时,就会出现隐私问题。 然而,在调查效率和隐私保护之间取得平衡至关重要。 准确的信息赋予辩护律师、法官和陪审团等刑事司法行为者权力。 5. 大多数人都经历过从银行到零售机构等众多平台上普遍存在的数据收集。 允许执法部门有限地访问这些数据有助于解决重大案件。 然而,保持对隐私的合理期望并了解隐私控制的局限性至关重要。
相关文章

原文

There is no reasonable expectation of privacy in one’s Google location data. It’s willingly shared with Google. United States v. Chatrie, 2024 U.S. App. LEXIS 16692 (4th Cir. July 9, 2024) (2-1):

Location History is turned off by default, so a user must take several affirmative steps before Google begins tracking and storing his Location History data. First, he must enable location sharing on his mobile device. Second, he must opt in to the Location History setting on his Google account, either through an internet browser, a Google application (such as Google Maps), or his device settings (for Android devices). Before he can activate the setting, however, Google always presents him language that explains the basics of the service. Third, he must enable the “Location Reporting” feature on his mobile device. And fourth, he must sign in to his Google account on that device. Only when a user follows these steps will Google begin tracking and storing his Location History data. Roughly one-third of active Google users have enabled Location History.

Even after a user opts in, he maintains some control over his location data. He can review, edit, or delete any information that Google has already obtained. So, for instance, he could decide he only wants to keep data for certain dates and to delete the rest. Or he could decide to delete everything. Google also allows him to pause (i.e., disable) the collection of future Location History data. Whatever his choice, Google will honor it. From start to finish, then, the user controls how much Google tracks and stores his Location History data.

Once a user enables Location History, Google constantly monitors his location through GPS, even when he isn’t using his phone. And if he has an Android phone, he can turn on another setting—”Google Location Accuracy”—that enables Google to determine his location using more inputs than just GPS, such as Wi-Fi access points and mobile networks. As a result, Location History can be more precise than other location-tracking mechanisms, including cell-site location information. But whether Google Location Accuracy is activated or not, Location History’s power should not be exaggerated. In the end, it is only an estimate of a device’s location. So when Google records a set of location coordinates, it includes a value (measured in meters) called a “confidence interval,” which represents Google’s confidence in the accuracy of the estimate. Google represents that for any given location point, there is a 68% chance that a user is somewhere within the confidence interval.

Google stores all Location History data in a repository called the “Sensorvault.” The Sensorvault assigns each device a unique identification number and maintains all Location History data associated with that device. Google then uses this data to build aggregate models to assist applications like Google Maps.

In 2016, Google began receiving “geofence warrants” from law enforcement seeking to access location information. A geofence warrant requires Google to produce Location History data for all users who were within a geographic area (called a geofence) during a particular time period. Since 2016, geofence requests have skyrocketed in number: Google claims it saw a 1,500% increase in requests from 2017 to 2018 and a 500% increase from 2018 to 2019. Concerned with the potential threat to user privacy, Google consulted internal counsel and law enforcement agencies in 2018 and developed its own three-step procedure for responding to geofence requests. Since then, Google has objected to any geofence request that disregards this procedure.

Google’s procedure works as follows: At Step One, law enforcement obtains a warrant that compels Google to disclose an anonymous list of users whose Location History shows they were within the geofence during a specified timeframe. But Google does not keep any lists like this on-hand. So it must first comb through its entire Location History repository to identify users who were present in the geofence. Google then gives law enforcement a list that includes for each user an anonymized device number, the latitude and longitude coordinates and timestamp of each location point, a confidence interval, and the source of the stored Location History (such as GPS or Wi-Fi). Before disclosing this information, Google reviews the request and objects if Google deems it overly broad.

At Step Two, law enforcement reviews the information it receives from Google. If it determines that it needs more, then law enforcement can ask Google to produce additional location coordinates. This time, the original geographical and temporal limits no longer apply; for any user identified at Step One, law enforcement can request information about his movements inside and outside the geofence over a broader period. Yet Google generally requires law enforcement to narrow its request for this more expansive location data to only a subset of the users pinpointed in Step One.

Finally, at Step Three, law enforcement determines which individuals are relevant to the investigation and then compels Google to provide their account-identifying information (usually their names and email addresses). Here, too, Google typically requires law enforcement to taper its request from the previous step, so law enforcement can’t merely request the identity of every user identified in Step Two.

Bloomberg: Geofence Warrant Decision Exposes Hole in Fourth Amendment Law by Cassandre Coyer & Tonya Riley (“A split appeals court opinion clearing the government’s acquisition of users’ mobile-device location data from Google of constitutional scrutiny will likely spark more friction between emerging technologies and the scope of law enforcement searches, attorneys warned. [¶] The US Court of Appeals for the Fourth Circuit’s ruling in US v. Chatrie concluded, over a dissent, that the use of such geofencing doesn’t constitute a search under the Fourth Amendment.”)

联系我们 contact @ memedata.com