LOCATION DATA. Location information from mobile devices is typically obtained using the following:

Size: px
Start display at page:

Download "LOCATION DATA. Location information from mobile devices is typically obtained using the following:"

Transcription

1 LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5. Global Positioning System (GPS) 6. Malware 7. Historic call detail records Toolbox Page 1 of 13

2 CELL PING TRIANGULATION The Federal Communications Commission has mandated that the E911 System must be accurate to within 100 meters for 67 percent of calls and 300 meters for 90 percent of calls. Using this system an operator can ping a device and calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do this result from the way the mobile network is built, and is commonly called triangulation. A cell phone s signal will often be received simultaneously by more than one cell site when operating in areas with a high concentration of cell sites and overlaps in coverage. When this occurs, a mathematical process called triangulation may determine the phone s location if either: (1) three points receiving the signal are known; or (2) two points receiving the signal are known, along with the direction in which the cell site received the signal. Accuracy One way the operator can do this is to observe the signal strength that different towers observe from a particular subscriber's mobile phone, and then calculate where that phone must be located in order to account for these observations. The accuracy with which the operator can figure out a subscriber's location varies depending on many factors, including the technology the operator uses and how many cell sites they have in an area. Very often, it is accurate to about the level of a city block, but in some systems it can be more accurate. There is no way to hide from this kind of tracking as long as your mobile phone is powered on and transmitting signals to an operator's network. Although normally only the mobile operator itself can perform this kind of tracking, a government could force the operator to turn over location data about a user (in real-time or as a matter of historical record). Tower Dump Another related kind of government request is called a tower dump. In this case, a government asks a mobile operator for a list of all of the mobile devices that were present in a certain area at a certain time. Toolbox Page 2 of 13

3 MOBILE SIGNAL TRACKING IMSI CATCHER (STINGRAY) Federal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a StingRay. These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as other wireless devices in the vicinity. In addition, these devices can be configured to capture the content of voice and data communications. StingRay technology is sold by the Harris Corporation. Other Harris cell site simulator models include the TriggerFish, KingFish, and Hailstorm. The more generic term for the technology is IMSI catcher, in reference to the unique identifier or international mobile subscriber identity of a wireless device. The equipment consists of an antenna, an electronic device that processes the signals transmitted on cell phone frequencies and a laptop computer that analyzes the signals and allows the agent to configure the collection of information. It can be carried by hand or mounted on vehicles or even drones. If the government knows a suspect s location, it can use the device to determine the unique numeric identifier associated with that cell phone The IMSI catcher needs to be taken to a particular location in order to find or monitor devices at that location. Toolbox Page 3 of 13

4 Constitutional Concerns First, use of an IMSI catcher triggers Fourth Amendment scrutiny because it constitutes both a search and a seizure within the meaning of the Fourth Amendment. Second, there is a strong argument that IMSI catchers can never be used consistent with the Fourth Amendment because they engage in the electronic equivalent of a general search. Third, law enforcement must at least obtain a warrant; a statutory order does not suffice. Fourth, even if law enforcement obtained a warrant, it is likely invalid because the data obtained through stingrays may not be disclosed to the defense, because the federal government contends that stingrays are a secret national security technology, and (2) that the orders authorizing the use of stingrays may be sealed, in some cases effectively permanently. Toolbox Page 4 of 13

5 Constitutional Concerns The government s omission of information about new surveillance technology from a warrant application prevents courts from exercising their constitutional oversight and would render a warrant invalid. A warrant that fails to disclose the government s intended use of an IMSI catcher is predicated on a material omission. Currently there is no reliable defense against IMSI catchers A defendant is entitled to a Franks hearing. A warrant that accurately describes the IMSI catcher s capabilities would be facially invalid. Toolbox Page 5 of 13

6 WI-FI/BLUETOOTH TRACKING These signals are transmitted with less power than a mobile signal and can normally be received only within a short range (such as within the same room or the same building), although sometimes using a sophisticated antenna allows these signals to be detected from unexpectedly long distances. MAC Address Both of these kinds of wireless signals include a unique serial number for the device, called a MAC address, which can be seen by anybody who can receive the signal. The device manufacturer chooses this address at the time the device is created and it cannot be changed. MAC address can be observed in wireless signals even if a device is not actively connected to a particular wireless network Unfortunately, the MAC address can be observed in wireless signals even if a device is not actively connected to a particular wireless network, or even if it is not actively transmitting data. Whenever Wi-Fi is turned on on a typical smartphone, the smartphone will transmit occasional signals that include the MAC address and thus let others nearby recognize that that particular device is present. Accuracy These forms of tracking can be a highly accurate way to tell when a person enters and leaves a building due to the limited range. Wi-Fi network operators can also see the MAC address of every device that joins their network, which means that they can recognize particular devices over time, and tell whether you are the same person who joined the network in the past (even if you don't type your name or address anywhere or sign in to any services). Toolbox Page 6 of 13

7 LOCATION INFORMATION FROM APPS AND WEB BROWSING Modern smartphones provide ways for the phone to determine its own location, often using GPS and sometimes using other services provided by location companies (which usually ask the company to guess the phone's location based on a list of cell phone towers and/or Wi-Fi networks that the phone can see from where it is). Apps can ask the phone for this location information and use it to provide services that are based on location, such as maps that show you your position on the map. Some of these apps will then transmit your location over the network to a service provider, which, in turn, provides a way for other people to track you. Some smartphones will give you some kind of control over whether apps can find out your physical location; a good privacy practice is to try to restrict which apps can see this information, and at a minimum to make sure that your location is only shared with apps that you trust and that have a good reason to know where you are. Co-Traveler The Washington Post reported in December 2013 on NSA location-tracking tools that collect massive amounts of information on the whereabouts of cell phones around the world, mainly by tapping phone companies' infrastructure to observe which towers particular phones connect to. A tool called CO-TRAVELER uses this data to find relationships between different people's movements (to figure out which people's devices seem to be traveling together, as well as whether one person appears to be following another). Co-Traveler uses this data to find relationships between different people's movements Toolbox Page 7 of 13

8 GLOBAL POSITIONING SYSTEM GPS The Global Positioning System (GPS) lets devices anywhere in the world figure out their own locations quickly and accurately. GPS works based on analyzing signals from satellites that are operated by the U.S. government as a public service for everyone. The GPS satellites only transmit signals. The satellites do not receive or observe anything from your phone, and the satellites and GPS system operators do not know where any particular user or device is located or even how many people are using the system. This is possible because the individual GPS receivers (like those inside smart phones) calculate their own positions by determining how long it took the radio signals from different satellites to arrive. Toolbox Page 8 of 13

9 Usually, this tracking is done by apps running on a Smartphone. They ask the phone's operating system for its location (determined via GPS). Then the apps are able to transmit this information to someone else over the Internet. There are also tiny GPS-receiving devices that can be surreptitiously hidden in someone's possessions or attached to a vehicle; those receivers determine their own location and then actively retransmit it over a network, usually the mobile phone network. In a landmark 2012 decision, the court held that GPS tracking is a search under the Fourth Amendment. Toolbox Page 9 of 13

10 MALWARE Phones can get viruses and other kinds of malware (malicious software), either because the user was tricked into installing malicious software, or because someone was able to hack into the device using a security flaw in the existing device software. As with other kinds of computing device, the malicious software can then spy on the device's user. Malware can read private data and activate the device's sensors. For example, malicious software on a mobile phone could read private data on the device (like stored text messages or photos). It could also activate the device's sensors (such as microphone, camera, GPS) to find where the phone is or to monitor the environment, even turning the phone into a bug. A further concern is that malicious software could theoretically make a phone pretend to power off, while secretly remaining turned on (and showing a black screen, so that the user wrongly believes that the phone is turned off). This concern has led to some people physically removing the batteries from their devices when having very sensitive conversations. Precautions based on powering off phones could be noticed by a mobile operator; for example, if ten people all travel to the same building and then all switch off their phones at the same time, the mobile operator, or somebody examining its records, might conclude that those people were all at the same meeting and that the participants regarded it as sensitive. This would be harder to detect if the participants had instead left their phones at home or at the office. Toolbox Page 10 of 13

11 HISTORIC CALL DETAIL RECORDS Carrier based location data is collected by obtaining historical call detail records for a particular phone from the cellular carrier along with a listing of the cell tower locations for that carrier. This data is then analyzed for the purpose of generally placing a cell phone in a location on a map. Often historical cell site records only indicate the date, time and duration of calls, whether calls are inbound or outbound, and show the originating and terminating cell sites for calls received or placed on the phone. Usually, cellular companies record the cell site to which a phone connects for benign purposes, such as determining whether roaming charges apply and tracking call volume by location. Recently, however, law enforcement has begun using cell site data to track the location of cell phones. Traditional view of cell site location information has been (1) that the subscriber has no privacy interest in it, because it is voluntarily shared with the service provider in the course of using cell phone service; These records can only narrow location to the geographic coverage area of the originating and terminating cell sites. (2) that law enforcement access to such information is therefore regulated principally by the Stored Communications Act, 18 U.S.C et seq., rather than the Fourth Amendment; and (3) that because location data are non-content records, they are available under the SCA through a court order based on a showing of specific facts providing reasonable grounds to believe that the data are relevant and material to a criminal investigation. See 18 U.S.C. 2703(c)-(d). Toolbox Page 11 of 13

12 At best, these records can only narrow location to the geographic coverage area of the originating and terminating cell sites, rather than pinpoint the specific location of the cell phone. It cannot be determined that the cell phone was closest to the site processing the call because factors other than geographic location can affect signal strength. A better theory on which to offer historical cell site data is not to prove where the phone user was at a specific time, but to prove where he or she could not have been. Reliability of principles and methodology even if an expert is qualified, a party can still object to the reliability of methods used by the expert to draw conclusions. Toolbox Page 12 of 13

13 At least two federal courts have held Daubert hearings to assess the reliability and relevance of expert testimony based on historical cell site interpretation 1. Procedural Issues - A party against whom cell site evidence is offered should consider bringing a motion in limine to exclude it on grounds of admissibility. 2. Otherwise, a party should timely raise an objection at trial on Daubert grounds to preserve the right to object to scientific or technical evidence and preserve the issue on appeal. There are no published set of principles or methods governing the estimation of cell site coverage area. Digital Evidence Toolbox For more information regarding location information and call detail records, see the section: Call Detail Records For more information on social media and internet evidence, call now and speak with a certified expert. is available 24 hours in emergency cases. Toolbox Page 13 of 13

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania (Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,

More information

DIGITAL EVIDENCE TOOL BOX

DIGITAL EVIDENCE TOOL BOX DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital

More information

Mobile Devices. Objectives. Types of Devices 4/25/2012

Mobile Devices. Objectives. Types of Devices 4/25/2012 Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored

More information

Electronic Surveillance & Constitutional/Legislative Protections

Electronic Surveillance & Constitutional/Legislative Protections Electronic Surveillance & Constitutional/Legislative Protections Eric Vos Federal Defender District of Puerto Rico Eric_Vos@ao.uscourts.gov What is Electronic Surveillance? Not? What We Will Cover Cell

More information

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might

More information

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

The Case for Secure Communications

The Case for Secure Communications Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

It s Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

It s Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law It s Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law Steven M. Bellovin https://www.cs.columbia.edu/~smb Joint work with Matt Blaze, Susan Landau, and Stephanie Pell

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?

Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group Notice Whose Personal Data do we collect? Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice For the purposes of applicable data protection and privacy laws, The Stonhard Group, a division of Stoncor Group, Inc. ( The

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Dear Chairman Upton, Chairman Walden, Chairwoman Bono Mack, Vice Chair Terry, and Vice Chair Blackburn:

Dear Chairman Upton, Chairman Walden, Chairwoman Bono Mack, Vice Chair Terry, and Vice Chair Blackburn: May 9, 2011 The Honorable Fred Upton 2125 Rayburn House Office Building The Honorable Greg Walden 2182 Rayburn House Office Building The Honorable Mary Bono Mack 104 Cannon House Office Building The Honorable

More information

Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials

Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials 1. Definitions of Some Key Terms 2. Historical Cell-Site Location Information Subpoena Example 3. Non-Disclosure

More information

Wireless Public Alerting

Wireless Public Alerting Wireless Public Alerting 1. What is wireless public alerting? Wireless public alerting allows governments across Canada to send public safety messages directly to smartphones in a region. If there is an

More information

Michael Phelps Foundation: Privacy Policy

Michael Phelps Foundation: Privacy Policy Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer

Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Ahmad Rahmati and Lin Zhong Rice Efficient Computing Group (recg.org) Dept. of Electrical & Computer Engineering Rice University

More information

1/8/2013. Not one, single technology, rather a convergence of several technologies Systems for:

1/8/2013. Not one, single technology, rather a convergence of several technologies Systems for: Tracking Technologies Priscilla ill Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law Copyright 2012 Priscilla Grantham & National Center for Justice and the Rule of Law

More information

Player Loyalty Program Terms & Conditions

Player Loyalty Program Terms & Conditions Player Loyalty Program Terms & Conditions Important: This is a legal agreement between the New Mexico Lottery Authority ("NMLA") and the user ("you" or "user"). Please read the following terms carefully.

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010 Safety and Security in a Digital Age South Carolina Bar Convention Family Law Section January 22, 2010 Melissa F. Brown Melissa F. Brown, LLC 145 King Street, Suite 405 Charleston, SC 29401 843.722.8900

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Phones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING

Phones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen 2016 NNEDV How do abusers misuse phones and location devices? What are survivors telling you? 2016 NNEDV 2 CELL PHONES: SPYING & MONITORING

More information

Presenter Name. Date

Presenter Name. Date Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration

More information

Cisco Smart+Connected Communities

Cisco Smart+Connected Communities Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

ANNEXES. to the. Proposal for a Regulation of the European Parliament and of the Council

ANNEXES. to the. Proposal for a Regulation of the European Parliament and of the Council EUROPEAN COMMISSION Brussels, 17.4.2018 COM(2018) 225 final ANNEXES 1 to 3 ANNEXES to the Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

Gathering and Using Cell Phone and Location Evidence in Criminal Cases

Gathering and Using Cell Phone and Location Evidence in Criminal Cases Gathering and Using Cell Phone and Location Evidence in Criminal Cases Jerome D. Greco Legal Aid Society Digital Forensics Staff Attorney Kings County Criminal Bar Association October 18, 2018 Interactive

More information

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information

More information

LightGig Communications, LLC Privacy Policy

LightGig Communications, LLC Privacy Policy LightGig Communications, LLC Privacy Policy Effective Date: December 06, 2018 1. Privacy Policy Overview LightGig Communications, LLC ( we, us, or our ) operates the website https://lightgig.com/ (the

More information

802.11n in the Outdoor Environment

802.11n in the Outdoor Environment POSITION PAPER 802.11n in the Outdoor Environment How Motorola is transforming outdoor mesh networks to leverage full n advantages Municipalities and large enterprise customers are deploying mesh networks

More information

DRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments.

DRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments. ATTACHMENT #1 Regular LF&A Meeting of August 13, 2007 DRAFT Amendment to Chapter 102 Taxation Article I In General, by adding a new Section 102-4 titled Omitted Real Property Assessments. Sec. 102-4 Omitted

More information

Verify that Wi-Fi option is turned on. Swipe down from the top of the screen once by using two fingers, or twice using one finger. Tap > Wi-Fi.

Verify that Wi-Fi option is turned on. Swipe down from the top of the screen once by using two fingers, or twice using one finger. Tap > Wi-Fi. Troubleshooting I can't find an email using the BlackBerry Device Search app The BlackBerry Device Search app only searches email that is in the BlackBerry Hub. To learn how to add email accounts to the

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

EnviroIssues Privacy Policy Effective Date:

EnviroIssues Privacy Policy Effective Date: EnviroIssues Privacy Policy Effective Date: 9-28-18 EnviroIssues, Inc. ( we, us, our ) is committed to protecting the privacy of visitors to its website and users of its services (each a Service and collectively

More information

Location, Location, Location

Location, Location, Location Location, Location, Location Larry Rudolph 1 Outline Positioning Technology GPS and others Location Specifiers Privacy Issues Universal Location On earth, we need three piece of information: latitude,

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing.

This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the right to make changes in technical

More information

Definitions Know What I Mean?

Definitions Know What I Mean? Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their

More information

This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing.

This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the right to make changes in technical

More information

Follow Me User s Manual

Follow Me User s Manual Follow Me User s Manual SYSTEM REQUIREMENTS AND TERMS USED IN THE MANUAL Windows Mobile-based device - Pharos Traveler GPS devices, Pocket PCs, and Pocket PC Phones. Windows CE device Pharos Drive GPS

More information

An ordinance adding Section to CHAPTER 28, MOTOR VEHICLES AND

An ordinance adding Section to CHAPTER 28, MOTOR VEHICLES AND DRAFT 2/14/08 ORDINANCE NO. An ordinance adding Section 28-41.2 to CHAPTER 28, MOTOR VEHICLES AND TRAFFIC, of the Dallas City Code, as amended; prohibiting the use of a hand-held mobile telephone to engage

More information

Topcon GRS-1 1 Receiver Field Preparation

Topcon GRS-1 1 Receiver Field Preparation Topcon GRS-1 1 Receiver Field Preparation What do you need to know to get started with your Topcon GRS-1? Topcon GRS-1 Receiver - Field Preparation Some Common Questions Which TopSURV modules do I buy?

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

ApprovedContact.com Privacy Policy This Privacy Policy is effective on December 11, 2012.

ApprovedContact.com Privacy Policy This Privacy Policy is effective on December 11, 2012. ApprovedContact.com Privacy Policy This Privacy Policy is effective on December 11, 2012. General This Privacy Policy describes the practices that Approved Contact, LLC, a Nevada limited liability company,

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Acceptance. Changes to this Policy

Acceptance. Changes to this Policy Privacy Policy Last Updated: January 3, 2019 Thank you for visiting Etalia Foods! We work hard to provide you unforgettable and naturally gluten-free pizzas. We know that by choosing Etalia Foods for your

More information

Challenges and Opportunities for Statistics in Digital Forensics

Challenges and Opportunities for Statistics in Digital Forensics Challenges and Opportunities for Statistics in Digital Forensics Turing Gateway to Mathematics Isaac Newton Institute 1 st December 2016 Dr. James Luck (james.luck@met.police.uk) TOTAL POLICING Date Arial

More information

Internet Service Provider Agreement

Internet Service Provider Agreement Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable

More information

WirelessED. Choosing and Using Mobile Devices

WirelessED. Choosing and Using Mobile Devices Choosing and Using Mobile Devices Browsing the Internet watching a video sending email on the go are just a few of things you can do with a data-ready mobile device and a data service plan. Being connected

More information

Sending images from a camera to an iphone (PowerShot G3 X)

Sending images from a camera to an iphone (PowerShot G3 X) Sending images from a camera to an iphone (PowerShot G3 X) IMPORTANT In the following explanation, smartphone setting procedures are indicated by the icon, and camera setting procedures are indicated by

More information

AACJ Winter Seminar January 8-9, 2015 Stingray Talk by Daniel Rigmaiden

AACJ Winter Seminar January 8-9, 2015 Stingray Talk by Daniel Rigmaiden AACJ Winter Seminar January 8-9, 2015 Stingray Talk by Daniel Rigmaiden Email: ddrigmaiden@freedomdujour.com Twitter: @ddrigmaiden I. Background [Who am I and why does my opinion matter?] A. I was indicted

More information

FINALLY, A SIMPLE SMARTPHONE.

FINALLY, A SIMPLE SMARTPHONE. FINALLY, A SIMPLE SMARTPHONE. All-New STAYING INDEPENDENT HAS NEVER BEEN THIS EASY. EASY The Jitterbug Smart is designed to be easy to use from the moment you turn it on. A new, 35% bigger screen makes

More information

Avaya one-x Mobile User Guide for Windows Mobile

Avaya one-x Mobile User Guide for Windows Mobile Avaya one-x Mobile User Guide for Windows Mobile 18-602903 Issue 2 December 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

Privacy Policy. I. How your information is used. Registration and account information. March 3,

Privacy Policy. I. How your information is used. Registration and account information. March 3, Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and

More information

Sunstar Americas, Inc.

Sunstar Americas, Inc. PAGE 1 of 5 Policy The use of Mobile devices in the conduct of SAI business shall be governed as follows: For Company Owned mobile devices: a. SAI will determine the equipment, services and carriers that

More information

AT&T Encrypted Mobile Voice

AT&T Encrypted Mobile Voice AT&T Encrypted Mobile Voice Solution Overview AT&T Encrypted Mobile Voice Problem Need for increased security for confidential and sensitive mobile voice calls Solution AT&T Encrypted Mobile Voice is a

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,

More information

1. INFORMATION WE COLLECT AND THE REASON FOR THE COLLECTION 2. HOW WE USE COOKIES AND OTHER TRACKING TECHNOLOGY TO COLLECT INFORMATION 3

1. INFORMATION WE COLLECT AND THE REASON FOR THE COLLECTION 2. HOW WE USE COOKIES AND OTHER TRACKING TECHNOLOGY TO COLLECT INFORMATION 3 Privacy Policy Last updated on February 18, 2017. Friends at Your Metro Animal Shelter ( FAYMAS, we, our, or us ) understands that privacy is important to our online visitors to our website and online

More information

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October 2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,

More information

MOBILE COMPUTING 2/11/18. Location-based Services: Definition. Convergence of Technologies LBS. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 2/11/18. Location-based Services: Definition. Convergence of Technologies LBS. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Location-based Services: Definition LBS: A certain service that is offered to the users based on their locations. Convergence of Technologies GIS/ Spatial Database

More information

Accession Communicator for Mobile

Accession Communicator for Mobile Accession Communicator for Mobile Quick Start Guide ACCESSION COMMUNICATOR FOR MOBILE Your AireSpring phone service can be used to make or receive calls from your desk phone, your PC or MAC, and your mobile

More information

Internet Concepts. Learning objectives. An understanding of the services available through the Internet

Internet Concepts. Learning objectives. An understanding of the services available through the Internet lesson plan Learning objectives An understanding of the services available through the Internet An understanding of the technology underlying Internet security 0 An understanding of the risks associated

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

Networks and Telecommunication

Networks and Telecommunication Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Proxim Wireless. All rights reserved.

Proxim Wireless. All rights reserved. Wireless Network Design Best Practices Regardless of the application, today wireless broadband is the order of the day, providing fiber like connectivity and reliability in a matter of hours. However,

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Personal Data & Privacy Policy Statement

Personal Data & Privacy Policy Statement Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and

More information

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure

More information

Introduction. Precautions when Using ZEED T-Connect. Digital Map Information for Route Guidance Purposes. Navigation System Operations

Introduction. Precautions when Using ZEED T-Connect. Digital Map Information for Route Guidance Purposes. Navigation System Operations 0.8 Introduction About this Manual This manual represents the start-up guide for the ZEED T-Connect smartphone application provided to users who purchase new Toyota vehicles. It provides details on initial

More information

AMALFI Frequently Asked Questions

AMALFI Frequently Asked Questions AMALFI Frequently Asked Questions The FAQ Sections include the following: Top Questions 1-13 The Basics 14-22 Troubleshooting 23-27 Using Your Product 28-45 Purchasing and Returning 46-51 Data Roaming

More information

2013 ISACA IT Risk/Reward Barometer India Consumer Results. October

2013 ISACA IT Risk/Reward Barometer India Consumer Results. October ISACA IT Risk/Reward Barometer India Consumer Results October www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Rachel D souza, Ketchum Sampark,

More information

2013 ISACA IT Risk/Reward Barometer US Consumer Results. October

2013 ISACA IT Risk/Reward Barometer US Consumer Results. October 2013 ISACA IT Risk/Reward Barometer US Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,

More information

Privacy Statement for DROP Connect Products and Services

Privacy Statement for DROP Connect Products and Services Privacy Statement for DROP Connect Products and Services Policy active as of February 7, 2018 This Privacy Statement for DROP Products and Services ( Privacy Statement ) describes information that Chandler

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David

More information

All-New INTRODUCING THE SIMPLEST SMARTPHONE EVER.

All-New INTRODUCING THE SIMPLEST SMARTPHONE EVER. All-New INTRODUCING THE SIMPLEST SMARTPHONE EVER. All-New INTRODUCING THE ALL-NEW JITTERBUG SMART2 Staying independent has never been this easy. EASY The all-new Jitterbug Smart2 is designed to be easy

More information

UNITY MOBILE FOR WP 8.1 END USER GUIDE

UNITY MOBILE FOR WP 8.1 END USER GUIDE UNITY MOBILE FOR WP 8.1 END USER GUIDE Contents 1. Introduction... 3 2. How It Works... 4 3. Getting Started... 5 3.1 Login... 5 3.2 Linking Unity to the Mobile Device... 5 3.3 Specifying the Outgoing

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Wireless and Mobile Network Investigation

Wireless and Mobile Network Investigation Wireless and Mobile Network Investigation Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } WiFi network investigations } Cellular network

More information

Effective October 31, Privacy Policy

Effective October 31, Privacy Policy Privacy Policy The nic.gop website is operated by Republican State Leadership Committee, Inc. ( Team.gop, we or us ). This Privacy Policy applies to nic.gop and any other website offered by Team.gop, which

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

The State of the Trust Gap in 2015

The State of the Trust Gap in 2015 The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years

More information

UNITY MOBILE IPHONE USER GUIDE

UNITY MOBILE IPHONE USER GUIDE UNITY MOBILE IPHONE USER GUIDE CONTENTS 1 Introduction... 2 2 How It Works... 3 3 Getting Started... 4 3.1 Login... 4 3.2 Linking Unity to the Mobile Device... 5 3.3 Specifying the Outgoing Call Option...

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Using GIS in Designing and Deploying Wireless Network in City Plans

Using GIS in Designing and Deploying Wireless Network in City Plans Using GIS in Designing and Deploying Wireless Network in City Plans Iyad Aldasouqi Royal Scientific Society The Middle East Scientific Institute for Security Jordan Walid A. Salameh Princess Sumaya University

More information