小程序
传感搜
传感圈

Yes, Phones Can Reveal if Someone Gets an Abortion

2022-08-09
关注

A leaked memo has revealed that the Supreme Court plans to overturn the landmark Roe v. Wade decision. If this does occur, so-called trigger laws already passed in 13 states—along with other laws on the way—would immediately prohibit abortions in a large portion of the country. And one of the ways courts could find people to prosecute is to use the data that our phones produce every day.

A smartphone can be a massive storehouse of personal information. Most people carry one at all times, automatically registering their daily activities through Internet searches, browsing, location data, payment history, phone records, chat apps, contact lists and calendars. “Your phone knows more about you than you do. There is data on your phone that could show how many times a day you go to the bathroom, things that are incredibly intimate,” says Evan Greer, director of the nonprofit digital rights organization Fight for the Future. “If, because of these draconian laws, basic activities like seeking or providing reproductive health care become criminalized in a manner that would allow law enforcement to get an actual warrant for your device, it could reveal incredibly sensitive information—not just about that person but about everyone that they communicate with.”

Even with Roe intact, this type of digital footprint has already been used to prosecute those seeking to terminate pregnancies. In 2017 a woman in Mississippi experienced an at-home pregnancy loss. A grand jury later indicted her for second-degree murder, based in part on her online search history—which recorded that she had looked up how to induce a miscarriage. (The charge against the woman was eventually dropped.)

Such information can be extracted directly from a phone. But doing so legally requires a judge to issue a warrant. And for this, law enforcement officials must show they have probable cause to believe a search is justified. This requirement can deter frivolous searches—but it can also be evaded with relative ease. In particular, privacy activists warn that law enforcement agencies can sidestep the need for a warrant by obtaining much of the same information from private companies. “A little-known treasure trove of information about Americans is held by data brokers, who sell their digital dossiers about people to whoever will pay their fee,” explains Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory. “Law enforcement agencies have used data brokers to do an end run around the Fourth Amendment’s warrant requirement. They just buy the information they’d otherwise need a warrant to get.”

They can also access these data by presenting a tech company with a subpoena, which is easier to obtain than a warrant because it only requires “reasonable suspicion” of the need for a search, Greer explains, not the higher bar of probable cause. “We also have seen law enforcement in the past issue [subpoenas for] incredibly broad requests,” Greer says. “For example, requesting that a search engine hand over the IP addresses of everyone who has searched for a specific term or requesting that a cell phone company hand over what’s considered ‘geofence data,’ [which reveal] all of the cell phones that were in a certain area at a certain time.”

By obtaining these data in bulk—whether through purchase or subpoena—an agency can crack down on a large number of people at once. And geofence and other location data can easily reveal who has visited a clinic that provides abortion care. Greer’s worry is not merely theoretical: Vice’s online tech news outlet Motherboard recently reported two cases of location data brokers selling or freely sharing information about people who had visited abortion clinics, including where they traveled before and after these visits. Although both companies claimed they had stopped selling or sharing this information in the wake of the news coverage, other data brokers are free to continue this type of tracking.

Such information can be even more revealing when combined with health data. For that reason, some privacy advocates warn against period-tracking apps, which many use to stay on top of their menstrual cycles and track their fertility. When software is “tracking your period, and your period’s regular, then your period is late, [the app] could certainly identify a pregnancy before someone might be aware of it,” says Daniel Grossman, a professor of obstetrics, gynecology and reproductive science at University of California, San Francisco. Government officials have in fact already charted periods to determine a person’s pregnancy status. For example, in 2019 a Missouri state official said his office had created a spreadsheet to track the periods of patients who had visited the state’s lone Planned Parenthood facility. In that case, the government did not obtain its information from an app, but the incident demonstrates the interest that authorities might have in such data.

Although policies vary depending on the app involved, experts say companies that produce menstrual-cycle programs generally have no obligation to keep these data private. “If it’s not part of a health system, which I think most of these [apps] are not, I don’t think there would necessarily be any [privacy] requirement,” Grossman says. Despite the fact that these data are about personal health, they are not protected by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), which protects health information from being shared without a patient’s consent. “Everyone needs to understand that HIPAA, the federal health privacy law, is not the huge magic shield that many people seem to believe it is,” Pfefferkorn warns. “HIPAA is actually fairly limited in terms of which entities it applies to—and your period-tracking app is not one of them. Plus, HIPAA has exceptions for law enforcement and judicial proceedings. So even if an entity (such as an abortion clinic) is covered by HIPAA, that law doesn’t provide absolute protection against having your reproductive health care records disclosed to the police.”

Ultimately, the vulnerability of users’ phone data depends on the choices made by the companies that develop the software and apps they use. For instance, when contacted with a request for comment, a representative of the period-tracking app Clue responded, “Keeping Clue users’ sensitive data safe is fundamental to our mission of self-empowerment, and it is fundamental to our business model, too—because that depends on earning our community’s trust. In addition, as a European company, Clue is obligated under European law (the General Data Protection Regulation, GDPR) to apply special protections to our users’ reproductive health data. We will not disclose it.” In the U.S., however, many companies are not subject to GDPR’s requirements—and plenty of them take advantage of their free rein to sell data on to third parties. Experts recommend that users read the privacy policies and terms of service of any given app before entrusting it with their data.

“What this exposes is that the entire tech industry’s business model of vacuuming up essentially as much data as possible, in the hopes that it can be turned into profits, has created this vast attack surface for surveillance and crackdowns on people’s basic rights,” Greer says. “And when we start thinking about how activities that are perfectly legal right now could be criminalized in the very near future, it exposes how even very seemingly mundane or innocuous data collection or storage could put people in danger.” Lawmakers have introduced privacy legislation such as the Fourth Amendment Is Not For Sale Act, which would prevent law enforcement from sidestepping the need for a warrant by purchasing information from data brokers. But this has not passed into law.

Instead of relying on the government to protect privacy, some advocates suggest it would be more effective to pressure companies directly. “I think that our best bet for carrying out systemic change now is to call on companies that are gathering this data to simply stop collecting it and to stop sharing it and to make plans for what is going to happen when the government demands it,” says Eva Galperin, director of cybersecurity at the nonprofit Electronic Frontier Foundation, which promotes digital rights.

Individuals can also take steps to maintain their privacy now rather than waiting on action from either the government or the tech industry. As a first line of defense, Greer recommends locking accounts securely: protecting phones and computers with strong passwords, using password managers for other programs and turning on two-factor authentication. “These three steps will protect you from most non-law-enforcement attacks,” Greer says. For those worried about law enforcement, organizations such as the Digital Defense Fund have published security guides on how to further hide one’s information. Potential steps include using encrypted chat apps, privacy-centric browsers such as Tor or Brave and virtual private networks to screen one’s online communications and activity. Additionally, disabling location tracking or leaving a phone at home while visiting a clinic can protect information about one’s whereabouts.

Such measures may seem unnecessary now, but Galperin warns that, without the protection of Roe v. Wade, the fear that our most personal information can be weaponized against us is justified. “I have spent more than a decade working with journalists and activists, people in vulnerable populations all over the world and especially in authoritarian regimes,” she says. “And the most important lessons that I have learned from this work is that when rights are curtailed, it happens very quickly. And when that happens, you need to have all of your privacy and security plans in place already, because if you are making those changes after your rights have already been taken away, it is already too late.”

参考译文
是的,手机可以显示某人是否堕胎了
一份泄露的备忘录透露,最高法院计划推翻具有里程碑意义的罗伊诉韦德案的判决。如果这种情况真的发生,已经在13个州通过的所谓的触发法——连同其他正在进行中的法律——将立即在全国大部分地区禁止堕胎。法院可以找到起诉人们的方法之一就是使用我们手机每天产生的数据。智能手机可以是一个巨大的个人信息仓库。大多数人都会随身携带一部手机,通过互联网搜索、浏览、位置数据、支付记录、电话记录、聊天应用程序、联系人列表和日历等方式自动记录他们的日常活动。你的手机比你自己更了解你。你手机上的数据可以显示你一天上几次厕所,这些都是非常亲密的事情,”非盈利数字权利组织“为未来而战”的负责人埃文·格里尔说。“如果因为这些严厉的法律,寻求或提供生殖健康护理等基本活动被定为犯罪行为,从而让执法部门能够获得对你的设备的实际搜查令,这可能会泄露极其敏感的信息——不仅是关于那个人,还包括与他们交流的每个人。”即使Roe案件的判决是完整的,这种类型的数字足迹已经被用于起诉那些寻求终止妊娠的人。2017年,密西西比州的一名妇女在家流产了。大陪审团后来以二级谋杀罪起诉她,部分依据是她的网上搜索历史——记录了她曾搜索过如何引产。(对这名女子的指控最终被撤销。)这些信息可以直接从电话中提取。但从法律上讲,这样做需要法官签发搜查令。为此,执法官员必须证明他们有合理的理由相信搜查是正当的。这一要求可以阻止无意义的搜索,但也可以相对轻松地规避。特别是,隐私活动人士警告说,执法机构可以通过从私人公司获取很多相同的信息来避开申请搜查令的需要。斯坦福大学互联网天文台(Stanford Internet Observatory)的研究学者Riana Pfefferkorn解释说:“数据经纪人掌握着一个鲜为人知的关于美国人的宝贵信息宝库,他们把关于人们的数字档案卖给任何愿意支付费用的人。”“执法机构利用数据经纪人来绕过第四修正案的授权要求。他们只是买了那些需要搜查令才能得到的信息。格里尔解释说,他们还可以通过向科技公司提交传票来获取这些数据,而传票比搜查令更容易获得,因为它只需要对搜查的必要性进行“合理怀疑”,而不是要求更高的“合理理由”。格里尔表示:“我们还看到,过去执法部门发出的(传票)要求非常广泛。”“例如,要求搜索引擎交出所有搜索过特定词条的人的IP地址,或要求手机公司交出所谓的‘地理围栏数据’,(这些数据显示)在特定时间在特定地区的所有手机。”通过大量获取这些数据——无论是通过购买还是通过传票——一个机构可以一次打击大量的人。地理围栏和其他位置数据可以很容易地显示谁去过提供堕胎护理的诊所。格里尔的担心不仅仅是理论上的:Vice的在线科技新闻媒体Motherboard最近报道了两起位置数据经纪人出售或自由分享去过堕胎诊所的人的信息的案例,包括他们在去诊所之前和之后去了哪里。虽然这两家公司都声称,在新闻报道之后,他们已经停止出售或分享这些信息,但其他数据经纪商可以自由地继续这种类型的跟踪。 如果将这些信息与健康数据结合起来,就更能说明问题。出于这个原因,一些隐私倡导者对经期跟踪应用程序提出了警告,许多人使用这些应用程序来跟踪自己的月经周期,并跟踪自己的生育能力。加州大学旧金山分校的妇产科和生殖科学教授丹尼尔·格罗斯曼(Daniel Grossman)说,当软件“跟踪你的月经,你的月经很规律,那么你的月经很晚,(该应用程序)肯定可以在别人意识到之前确定怀孕了。”事实上,政府官员已经用图表来确定一个人的怀孕状态。例如,2019年,密苏里州的一名官员表示,他的办公室创建了一个电子表格,来跟踪去过该州唯一一家计划生育机构的患者的生理期。在这种情况下,政府并没有从应用程序获取信息,但该事件表明当局可能对这些数据感兴趣。尽管政策因涉及的应用程序而异,但专家表示,生产月经周期程序的公司通常没有义务保护这些数据的隐私。格罗斯曼说:“如果它不是健康系统的一部分,我认为大多数(应用程序)不是,我不认为一定会有任何(隐私)要求。”尽管这些数据是关于个人健康的,但它们不受1996年《健康保险携带和问责法》(HIPAA)的保护,该法案保护健康信息不得在未经患者同意的情况下共享。“每个人都需要明白,联邦健康隐私法HIPAA并不像许多人认为的那样是一个巨大的魔法盾牌,”普费肯警告说。“HIPAA实际上在适用对象方面是相当有限的,你的月经跟踪应用程序不在其中。此外,HIPAA对执法和司法程序有例外。因此,即使一个实体(如堕胎诊所)受HIPAA的保护,该法律并不能提供绝对的保护,防止你的生殖健康保健记录被披露给警方。“最终,用户手机数据的脆弱性取决于开发他们使用的软件和应用程序的公司所做的选择。例如,在收到置评请求时,周期跟踪应用Clue的一名代表回应说,“保护Clue用户敏感数据的安全是我们自我授权的基本使命,也是我们商业模式的基本原则——因为这取决于能否赢得我们社区的信任。此外,作为一家欧洲公司,Clue有义务根据欧洲法律(通用数据保护条例,GDPR)对用户的生殖健康数据进行特殊保护。我们不会透露。”然而,在美国,许多公司不受GDPR的约束,很多公司利用自己的自由使用权向第三方出售数据。专家建议,用户在将自己的数据委托给任何应用程序之前,都应阅读其隐私政策和服务条款。格里尔说:“这件事暴露出,整个科技行业收集尽可能多的数据,并希望将其转化为利润的商业模式,为监视和打击人们的基本权利创造了巨大的攻击面。”“当我们开始思考,现在完全合法的活动在不久的将来可能会被定为犯罪时,它暴露出,即使是非常平凡或无害的数据收集或存储也可能会把人们置于危险之中。”议员们已经提出了隐私立法,比如《第四修正案非卖品法》(Fourth Amendment Is Not For Sale Act),该法案将防止执法部门通过从数据中间商购买信息来绕开获得授权的需要。但这还没有成为法律。 一些倡导人士建议,与其依赖政府来保护隐私,不如直接向公司施压更有效。促进数字权利的非营利组织电子前沿基金会(Electronic Frontier Foundation)的网络安全主管伊娃·加尔佩林(Eva Galperin)说:“我认为,我们现在进行系统性变革的最佳选择是呼吁正在收集这些数据的公司停止收集这些数据,停止分享这些数据,并为政府要求这样做时将发生的事情制定计划。”个人也可以采取措施保护自己的隐私,而不是等待政府或科技行业采取行动。作为第一道防线,格里尔建议安全锁定账户:用强密码保护手机和电脑,对其他程序使用密码管理器,并启用双因素身份验证。格里尔说:“这三个步骤可以保护你免受大多数非执法部门的攻击。”对于那些担心执法的人,数字防御基金(Digital Defense Fund)等组织已经发布了如何进一步隐藏个人信息的安全指南。潜在的措施包括使用加密的聊天应用程序、以隐私为中心的浏览器(如Tor或Brave)以及虚拟专用网络来筛选个人的在线通信和活动。此外,关闭位置跟踪或在去诊所时把手机留在家里可以保护个人的行踪信息。现在看来,这些措施似乎是不必要的,但加尔佩林警告说,没有罗伊诉韦德案的保护,担心我们最个人的信息会被用作武器来对付我们是有道理的。她说:“我花了十多年的时间与记者、活动家、世界各地的弱势群体,尤其是独裁政权中的人们一起工作。”“我从这项工作中学到的最重要的教训是,当权利受到限制时,它发生得非常快。当这种情况发生时,你需要已经有了所有的隐私和安全计划,因为如果你在权利被剥夺后才做出这些改变,那就已经太晚了。”
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

Minco AH439S1N10EN 温湿度变送器

Minco空间湿度探测器组件具有温度补偿功能,结构紧凑,重量轻。它们是为直接安装在建筑内墙上而设计的。他们的特点是集成电路传感器与稳定的聚合物元件,是由烧结不锈钢过滤器封装,加上先进的微处理器,以提供准确和可重复的测量。温度输出是可选的。,用于需要:

评论

您需要登录才可以回复|注册

提交评论

scientific

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

如何投资无人机行业:深入研究无人机ETF

提取码
复制提取码
点击跳转至百度网盘