Alarm over iPhone, iPad location tracking;

 ( NWO SPY GRIP of DEATH !!!! )

Apple under pressure to explain practice

 

SAN FRANCISCO - Privacy watchdogs are demanding answers from Apple Inc. about why iPhones and iPads are secretly collecting location data on users — records that cellular service providers routinely keep but require a court order to disgorge.

It's not clear if other smartphones and tablet computers are logging such information on their users. And this week's revelation that the Apple devices do wasn't even new — some security experts began warning about the issue a year ago.

But the worry prompted by a report from researchers Alasdair Allan and Pete Warden at a technology conference in Santa Clara raises questions about how much privacy you implicitly surrender by carrying around a smartphone. It also raises the issue of smartphone makers' responsibility to protect sensitive data that flows through their devices.

Much of the concern about the iPhone and iPad tracking stems from the fact the computers are logging users' physical co-ordinates without users knowing it — and that that information is then stored in an unencrypted form that would be easy for a hacker or a suspicious spouse or a law enforcement officer to find without a warrant.

Researchers emphasize that there's no evidence that Apple itself has access to this data. The data apparently stays on the device itself, and computers the data is backed up to. Apple didn't respond to a request for comment by The Associated Press.

Tracking is a normal part of owning a cellphone. What's done with that data, though, is where the controversy lies.

A central question in this controversy is whether a smartphone should act merely as a conduit of location data to service providers and approved applications — or as a more active participant by storing the data itself, to make location-based applications run more smoothly or help better target mobile ads or any number of other uses.

Location data is some of the most valuable information a mobile phone can provide, since it can tell advertisers not only where someone's been, but also where they might be going — and what they might be inclined to buy when they get there.

Allan and Warden said the location co-ordinates and time stamps in the Apple devices aren't always exact, but appear in a file that typically contains about a year's worth of data that when taken together provide a detailed view of users' travels.

"We're not sure why Apple is gathering this data, but it's clearly intentional, as the database is being restored across backups, and even device migrations," they wrote in a blog posting announcing the research.

Allan said in an email to the AP that he and Warden haven't looked at how other smartphones behave in this regard, but added there's suspicion that phones that run Google Inc.'s Android software might behave in a similar way and is being investigated.

Google did not respond to a request for comment.

Alex Levinson, a security expert, said the tracking Apple's devices do isn't new — or a surprise to those in the computer forensics community.

The Apple devices have been retaining the information for some time, but it was kept in a different form until the release of the iOS 4 operating software last year, Levinson, technical lead for the Katana Forensics firm, wrote on his blog.

Through his work with law enforcement agencies, Levinson said he was able to access the location data in older iPhones and warned about the issue over a year ago. The location data is now easier to find because of a change in the way iPhone applications access the data, he said.

"Either way, it is not secret, malicious, or hidden," Levinson wrote. "Users still have to approve location access to any application and have the ability to instantly turn off location services to applications inside the settings menu on their device."

The existence of the location-data file on the phone is alarming because it's unencrypted, the researchers said, which means that anyone with access to the device can see it.

Charlie Miller, a prominent iPhone hacker, said a security change that Apple made last month would make extracting the file from the phone in a remote attack very difficult. Even if an attacker were to break into someone's phone looking for the file, he wouldn't have the right privileges to access the file.

The data is "pretty well-protected on the phone," Miller, principal security analyst with Independent Security Evaluators, said in an interview.

"On the phone, they take a lot of precautions." He said. "It's sort of frightening in the sense that it's there, and it's full of information about where you've been, but the good news is it's not easy to get to."

But it's a different matter when the data is transferred to another computer in a backup. If the backup computer is infected with malicious software, the file could easily be located and sent to the hacker. A way to protect against that is to encrypt the iPhone backup through iTunes, the researchers said.

The issue has prompted several members of Congress to write letters to Apple, based in Cupertino, to answer questions about the practice.

Sen. Al Franken, D-Minn., said it raises "serious privacy concerns," especially for children using the devices, since "anyone who gains access to this single file could likely determine the location of a user's home, the businesses he frequents, the doctors he visits, the schools his children attend, and the trips he has taken — over the past months or even a year."

Rep. Edward Markey, D-Mass., questioned whether the practice may be illegal under a federal law governing the use of location information for commercial purposes, if consumers weren't properly informed.

"Apple needs to safeguard the personal location information of its users to ensure that an iPhone doesn't become an iTrack," he said in a statement. "Collecting, storing and disclosing a consumer's location for commercial purposes without their express permission is unacceptable and would violate current law."

Apple shares rose $8.29, or 2.4 per cent, to $350.70 Thursday on the strength of the company's latest quarterly financial results, which showed Apple's net income nearly doubled, in large part on strength of iPhone sales.

 

NOTE; What they are NOT telling you; 1.Such a well-coordinated high tech spying program was clearly designed; ordered by the CIA, it is in reality part of Echelon tracking system for world dominance and active violent suppression of all resistance.

2. Not just iphone Apple, but all smart phones are involved. More lies and misdirected information to con you.

3.The batteries cannot be removed on your cell phones since 1996 by law, so they cannot now be turned off, so they can turn them on and listen to you at any time

4. Michigan police admit thay can steal your phone numbers, all applications, all passwords, and all data from your new cell phone with one swipe of their reader. You will note that this easy access by police spies is not mentioned anywhere in the public domain of information on the new spying / tracking application that totally steals all your privacy and turns you into a state-owned controlled slave.

5. All automobiles since 1998 ish have built-in hidden black boxes that record  your every move should an accident occur. Everything is recorded, and if you mislead the police, or speak in your own favor with prejudice, you will have the book thrown at you as they have information they are not revealing to YOU. This is like planting a permanent camera in your skull to prosecute you for any wrong doings.

You need to be a member of puredevoteeseva to add comments!

Join puredevoteeseva

Votes: 0
Email me when people reply –

Replies

  • David Gomez
    TG Daily
    April 26, 2011

    Michigan State Police are accused of stealing driver’s cell phone data on routine traffic stops. Michigan has become a digital police state.

    And if people in Michigan just stand by and let this digital totalitarian crap continue, it will probably come to your state too. We are a nation of copycats after all, governments in the United States like to take other people’s ideas to control people and make them their own.

    Now I’m assuming that the cops are taking people’s phones during traffic stops and plugging it into the machine the machine they supposedly have, because that’s what most of the stories have said. However, a story from the Detroit News on April 13 said that the devices were able to get this information from the phones without the owner’s knowledge.

This reply was deleted.