LOCATION DATA. Location information from mobile devices is typically obtained using the following:
|
|
- Annabel Knight
- 5 years ago
- Views:
Transcription
1 LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5. Global Positioning System (GPS) 6. Malware 7. Historic call detail records Toolbox Page 1 of 13
2 CELL PING TRIANGULATION The Federal Communications Commission has mandated that the E911 System must be accurate to within 100 meters for 67 percent of calls and 300 meters for 90 percent of calls. Using this system an operator can ping a device and calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do this result from the way the mobile network is built, and is commonly called triangulation. A cell phone s signal will often be received simultaneously by more than one cell site when operating in areas with a high concentration of cell sites and overlaps in coverage. When this occurs, a mathematical process called triangulation may determine the phone s location if either: (1) three points receiving the signal are known; or (2) two points receiving the signal are known, along with the direction in which the cell site received the signal. Accuracy One way the operator can do this is to observe the signal strength that different towers observe from a particular subscriber's mobile phone, and then calculate where that phone must be located in order to account for these observations. The accuracy with which the operator can figure out a subscriber's location varies depending on many factors, including the technology the operator uses and how many cell sites they have in an area. Very often, it is accurate to about the level of a city block, but in some systems it can be more accurate. There is no way to hide from this kind of tracking as long as your mobile phone is powered on and transmitting signals to an operator's network. Although normally only the mobile operator itself can perform this kind of tracking, a government could force the operator to turn over location data about a user (in real-time or as a matter of historical record). Tower Dump Another related kind of government request is called a tower dump. In this case, a government asks a mobile operator for a list of all of the mobile devices that were present in a certain area at a certain time. Toolbox Page 2 of 13
3 MOBILE SIGNAL TRACKING IMSI CATCHER (STINGRAY) Federal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a StingRay. These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as other wireless devices in the vicinity. In addition, these devices can be configured to capture the content of voice and data communications. StingRay technology is sold by the Harris Corporation. Other Harris cell site simulator models include the TriggerFish, KingFish, and Hailstorm. The more generic term for the technology is IMSI catcher, in reference to the unique identifier or international mobile subscriber identity of a wireless device. The equipment consists of an antenna, an electronic device that processes the signals transmitted on cell phone frequencies and a laptop computer that analyzes the signals and allows the agent to configure the collection of information. It can be carried by hand or mounted on vehicles or even drones. If the government knows a suspect s location, it can use the device to determine the unique numeric identifier associated with that cell phone The IMSI catcher needs to be taken to a particular location in order to find or monitor devices at that location. Toolbox Page 3 of 13
4 Constitutional Concerns First, use of an IMSI catcher triggers Fourth Amendment scrutiny because it constitutes both a search and a seizure within the meaning of the Fourth Amendment. Second, there is a strong argument that IMSI catchers can never be used consistent with the Fourth Amendment because they engage in the electronic equivalent of a general search. Third, law enforcement must at least obtain a warrant; a statutory order does not suffice. Fourth, even if law enforcement obtained a warrant, it is likely invalid because the data obtained through stingrays may not be disclosed to the defense, because the federal government contends that stingrays are a secret national security technology, and (2) that the orders authorizing the use of stingrays may be sealed, in some cases effectively permanently. Toolbox Page 4 of 13
5 Constitutional Concerns The government s omission of information about new surveillance technology from a warrant application prevents courts from exercising their constitutional oversight and would render a warrant invalid. A warrant that fails to disclose the government s intended use of an IMSI catcher is predicated on a material omission. Currently there is no reliable defense against IMSI catchers A defendant is entitled to a Franks hearing. A warrant that accurately describes the IMSI catcher s capabilities would be facially invalid. Toolbox Page 5 of 13
6 WI-FI/BLUETOOTH TRACKING These signals are transmitted with less power than a mobile signal and can normally be received only within a short range (such as within the same room or the same building), although sometimes using a sophisticated antenna allows these signals to be detected from unexpectedly long distances. MAC Address Both of these kinds of wireless signals include a unique serial number for the device, called a MAC address, which can be seen by anybody who can receive the signal. The device manufacturer chooses this address at the time the device is created and it cannot be changed. MAC address can be observed in wireless signals even if a device is not actively connected to a particular wireless network Unfortunately, the MAC address can be observed in wireless signals even if a device is not actively connected to a particular wireless network, or even if it is not actively transmitting data. Whenever Wi-Fi is turned on on a typical smartphone, the smartphone will transmit occasional signals that include the MAC address and thus let others nearby recognize that that particular device is present. Accuracy These forms of tracking can be a highly accurate way to tell when a person enters and leaves a building due to the limited range. Wi-Fi network operators can also see the MAC address of every device that joins their network, which means that they can recognize particular devices over time, and tell whether you are the same person who joined the network in the past (even if you don't type your name or address anywhere or sign in to any services). Toolbox Page 6 of 13
7 LOCATION INFORMATION FROM APPS AND WEB BROWSING Modern smartphones provide ways for the phone to determine its own location, often using GPS and sometimes using other services provided by location companies (which usually ask the company to guess the phone's location based on a list of cell phone towers and/or Wi-Fi networks that the phone can see from where it is). Apps can ask the phone for this location information and use it to provide services that are based on location, such as maps that show you your position on the map. Some of these apps will then transmit your location over the network to a service provider, which, in turn, provides a way for other people to track you. Some smartphones will give you some kind of control over whether apps can find out your physical location; a good privacy practice is to try to restrict which apps can see this information, and at a minimum to make sure that your location is only shared with apps that you trust and that have a good reason to know where you are. Co-Traveler The Washington Post reported in December 2013 on NSA location-tracking tools that collect massive amounts of information on the whereabouts of cell phones around the world, mainly by tapping phone companies' infrastructure to observe which towers particular phones connect to. A tool called CO-TRAVELER uses this data to find relationships between different people's movements (to figure out which people's devices seem to be traveling together, as well as whether one person appears to be following another). Co-Traveler uses this data to find relationships between different people's movements Toolbox Page 7 of 13
8 GLOBAL POSITIONING SYSTEM GPS The Global Positioning System (GPS) lets devices anywhere in the world figure out their own locations quickly and accurately. GPS works based on analyzing signals from satellites that are operated by the U.S. government as a public service for everyone. The GPS satellites only transmit signals. The satellites do not receive or observe anything from your phone, and the satellites and GPS system operators do not know where any particular user or device is located or even how many people are using the system. This is possible because the individual GPS receivers (like those inside smart phones) calculate their own positions by determining how long it took the radio signals from different satellites to arrive. Toolbox Page 8 of 13
9 Usually, this tracking is done by apps running on a Smartphone. They ask the phone's operating system for its location (determined via GPS). Then the apps are able to transmit this information to someone else over the Internet. There are also tiny GPS-receiving devices that can be surreptitiously hidden in someone's possessions or attached to a vehicle; those receivers determine their own location and then actively retransmit it over a network, usually the mobile phone network. In a landmark 2012 decision, the court held that GPS tracking is a search under the Fourth Amendment. Toolbox Page 9 of 13
10 MALWARE Phones can get viruses and other kinds of malware (malicious software), either because the user was tricked into installing malicious software, or because someone was able to hack into the device using a security flaw in the existing device software. As with other kinds of computing device, the malicious software can then spy on the device's user. Malware can read private data and activate the device's sensors. For example, malicious software on a mobile phone could read private data on the device (like stored text messages or photos). It could also activate the device's sensors (such as microphone, camera, GPS) to find where the phone is or to monitor the environment, even turning the phone into a bug. A further concern is that malicious software could theoretically make a phone pretend to power off, while secretly remaining turned on (and showing a black screen, so that the user wrongly believes that the phone is turned off). This concern has led to some people physically removing the batteries from their devices when having very sensitive conversations. Precautions based on powering off phones could be noticed by a mobile operator; for example, if ten people all travel to the same building and then all switch off their phones at the same time, the mobile operator, or somebody examining its records, might conclude that those people were all at the same meeting and that the participants regarded it as sensitive. This would be harder to detect if the participants had instead left their phones at home or at the office. Toolbox Page 10 of 13
11 HISTORIC CALL DETAIL RECORDS Carrier based location data is collected by obtaining historical call detail records for a particular phone from the cellular carrier along with a listing of the cell tower locations for that carrier. This data is then analyzed for the purpose of generally placing a cell phone in a location on a map. Often historical cell site records only indicate the date, time and duration of calls, whether calls are inbound or outbound, and show the originating and terminating cell sites for calls received or placed on the phone. Usually, cellular companies record the cell site to which a phone connects for benign purposes, such as determining whether roaming charges apply and tracking call volume by location. Recently, however, law enforcement has begun using cell site data to track the location of cell phones. Traditional view of cell site location information has been (1) that the subscriber has no privacy interest in it, because it is voluntarily shared with the service provider in the course of using cell phone service; These records can only narrow location to the geographic coverage area of the originating and terminating cell sites. (2) that law enforcement access to such information is therefore regulated principally by the Stored Communications Act, 18 U.S.C et seq., rather than the Fourth Amendment; and (3) that because location data are non-content records, they are available under the SCA through a court order based on a showing of specific facts providing reasonable grounds to believe that the data are relevant and material to a criminal investigation. See 18 U.S.C. 2703(c)-(d). Toolbox Page 11 of 13
12 At best, these records can only narrow location to the geographic coverage area of the originating and terminating cell sites, rather than pinpoint the specific location of the cell phone. It cannot be determined that the cell phone was closest to the site processing the call because factors other than geographic location can affect signal strength. A better theory on which to offer historical cell site data is not to prove where the phone user was at a specific time, but to prove where he or she could not have been. Reliability of principles and methodology even if an expert is qualified, a party can still object to the reliability of methods used by the expert to draw conclusions. Toolbox Page 12 of 13
13 At least two federal courts have held Daubert hearings to assess the reliability and relevance of expert testimony based on historical cell site interpretation 1. Procedural Issues - A party against whom cell site evidence is offered should consider bringing a motion in limine to exclude it on grounds of admissibility. 2. Otherwise, a party should timely raise an objection at trial on Daubert grounds to preserve the right to object to scientific or technical evidence and preserve the issue on appeal. There are no published set of principles or methods governing the estimation of cell site coverage area. Digital Evidence Toolbox For more information regarding location information and call detail records, see the section: Call Detail Records For more information on social media and internet evidence, call now and speak with a certified expert. is available 24 hours in emergency cases. Toolbox Page 13 of 13
(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania
(Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More informationMobile Devices. Objectives. Types of Devices 4/25/2012
Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored
More informationElectronic Surveillance & Constitutional/Legislative Protections
Electronic Surveillance & Constitutional/Legislative Protections Eric Vos Federal Defender District of Puerto Rico Eric_Vos@ao.uscourts.gov What is Electronic Surveillance? Not? What We Will Cover Cell
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationCell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking
The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationKIK s GUIDE FOR LAW ENFORCEMENT
Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features
More informationELECTRIC APP - PRIVACY POLICY
By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service
More informationThe Cellular Interceptor CC2800 Series
The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.
More informationThe Case for Secure Communications
Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationIt s Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law
It s Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law Steven M. Bellovin https://www.cs.columbia.edu/~smb Joint work with Matt Blaze, Susan Landau, and Stephanie Pell
More informationMOBILE DEVICE FORENSICS
MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital
More informationRippleMatch Privacy Policy
RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/
More informationFritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?
Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice For the purposes of applicable data protection and privacy laws, The Stonhard Group, a division of Stoncor Group, Inc. ( The
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationDear Chairman Upton, Chairman Walden, Chairwoman Bono Mack, Vice Chair Terry, and Vice Chair Blackburn:
May 9, 2011 The Honorable Fred Upton 2125 Rayburn House Office Building The Honorable Greg Walden 2182 Rayburn House Office Building The Honorable Mary Bono Mack 104 Cannon House Office Building The Honorable
More informationGathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials
Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials 1. Definitions of Some Key Terms 2. Historical Cell-Site Location Information Subpoena Example 3. Non-Disclosure
More informationWireless Public Alerting
Wireless Public Alerting 1. What is wireless public alerting? Wireless public alerting allows governments across Canada to send public safety messages directly to smartphones in a region. If there is an
More informationMichael Phelps Foundation: Privacy Policy
Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects
More informationOffice Properties Income Trust Privacy Notice Last Updated: February 1, 2019
General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information
More informationContext-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer
Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Ahmad Rahmati and Lin Zhong Rice Efficient Computing Group (recg.org) Dept. of Electrical & Computer Engineering Rice University
More information1/8/2013. Not one, single technology, rather a convergence of several technologies Systems for:
Tracking Technologies Priscilla ill Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law Copyright 2012 Priscilla Grantham & National Center for Justice and the Rule of Law
More informationPlayer Loyalty Program Terms & Conditions
Player Loyalty Program Terms & Conditions Important: This is a legal agreement between the New Mexico Lottery Authority ("NMLA") and the user ("you" or "user"). Please read the following terms carefully.
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationIn this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number
ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this
More informationSafety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010
Safety and Security in a Digital Age South Carolina Bar Convention Family Law Section January 22, 2010 Melissa F. Brown Melissa F. Brown, LLC 145 King Street, Suite 405 Charleston, SC 29401 843.722.8900
More informationBCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement
BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance
More informationPhones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING
Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen 2016 NNEDV How do abusers misuse phones and location devices? What are survivors telling you? 2016 NNEDV 2 CELL PHONES: SPYING & MONITORING
More informationPresenter Name. Date
Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration
More informationCisco Smart+Connected Communities
Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented
More informationThe Use of Technology to Enhance Investigation
The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source
More informationCWNP PW Certified Wireless Analysis Professional. Download Full Version :
CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g
More informationANNEXES. to the. Proposal for a Regulation of the European Parliament and of the Council
EUROPEAN COMMISSION Brussels, 17.4.2018 COM(2018) 225 final ANNEXES 1 to 3 ANNEXES to the Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationThe challenges, opportunities and setting the framework for 5G EMF and Health
The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management
More informationSnap Inc. Law Enforcement Guide
Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street
More informationGathering and Using Cell Phone and Location Evidence in Criminal Cases
Gathering and Using Cell Phone and Location Evidence in Criminal Cases Jerome D. Greco Legal Aid Society Digital Forensics Staff Attorney Kings County Criminal Bar Association October 18, 2018 Interactive
More informationEmployee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC
Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information
More informationLightGig Communications, LLC Privacy Policy
LightGig Communications, LLC Privacy Policy Effective Date: December 06, 2018 1. Privacy Policy Overview LightGig Communications, LLC ( we, us, or our ) operates the website https://lightgig.com/ (the
More information802.11n in the Outdoor Environment
POSITION PAPER 802.11n in the Outdoor Environment How Motorola is transforming outdoor mesh networks to leverage full n advantages Municipalities and large enterprise customers are deploying mesh networks
More informationDRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments.
ATTACHMENT #1 Regular LF&A Meeting of August 13, 2007 DRAFT Amendment to Chapter 102 Taxation Article I In General, by adding a new Section 102-4 titled Omitted Real Property Assessments. Sec. 102-4 Omitted
More informationVerify that Wi-Fi option is turned on. Swipe down from the top of the screen once by using two fingers, or twice using one finger. Tap > Wi-Fi.
Troubleshooting I can't find an email using the BlackBerry Device Search app The BlackBerry Device Search app only searches email that is in the BlackBerry Hub. To learn how to add email accounts to the
More informationIt s still very important that you take some steps to help keep up security when you re online:
PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means
More informationEnviroIssues Privacy Policy Effective Date:
EnviroIssues Privacy Policy Effective Date: 9-28-18 EnviroIssues, Inc. ( we, us, our ) is committed to protecting the privacy of visitors to its website and users of its services (each a Service and collectively
More informationLocation, Location, Location
Location, Location, Location Larry Rudolph 1 Outline Positioning Technology GPS and others Location Specifiers Privacy Issues Universal Location On earth, we need three piece of information: latitude,
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationThis guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing.
This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the right to make changes in technical
More informationDefinitions Know What I Mean?
Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their
More informationThis guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing.
This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the right to make changes in technical
More informationFollow Me User s Manual
Follow Me User s Manual SYSTEM REQUIREMENTS AND TERMS USED IN THE MANUAL Windows Mobile-based device - Pharos Traveler GPS devices, Pocket PCs, and Pocket PC Phones. Windows CE device Pharos Drive GPS
More informationAn ordinance adding Section to CHAPTER 28, MOTOR VEHICLES AND
DRAFT 2/14/08 ORDINANCE NO. An ordinance adding Section 28-41.2 to CHAPTER 28, MOTOR VEHICLES AND TRAFFIC, of the Dallas City Code, as amended; prohibiting the use of a hand-held mobile telephone to engage
More informationTopcon GRS-1 1 Receiver Field Preparation
Topcon GRS-1 1 Receiver Field Preparation What do you need to know to get started with your Topcon GRS-1? Topcon GRS-1 Receiver - Field Preparation Some Common Questions Which TopSURV modules do I buy?
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationApprovedContact.com Privacy Policy This Privacy Policy is effective on December 11, 2012.
ApprovedContact.com Privacy Policy This Privacy Policy is effective on December 11, 2012. General This Privacy Policy describes the practices that Approved Contact, LLC, a Nevada limited liability company,
More informationGM Information Security Controls
: Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5
More informationAcceptance. Changes to this Policy
Privacy Policy Last Updated: January 3, 2019 Thank you for visiting Etalia Foods! We work hard to provide you unforgettable and naturally gluten-free pizzas. We know that by choosing Etalia Foods for your
More informationChallenges and Opportunities for Statistics in Digital Forensics
Challenges and Opportunities for Statistics in Digital Forensics Turing Gateway to Mathematics Isaac Newton Institute 1 st December 2016 Dr. James Luck (james.luck@met.police.uk) TOTAL POLICING Date Arial
More informationInternet Service Provider Agreement
Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable
More informationWirelessED. Choosing and Using Mobile Devices
Choosing and Using Mobile Devices Browsing the Internet watching a video sending email on the go are just a few of things you can do with a data-ready mobile device and a data service plan. Being connected
More informationSending images from a camera to an iphone (PowerShot G3 X)
Sending images from a camera to an iphone (PowerShot G3 X) IMPORTANT In the following explanation, smartphone setting procedures are indicated by the icon, and camera setting procedures are indicated by
More informationAACJ Winter Seminar January 8-9, 2015 Stingray Talk by Daniel Rigmaiden
AACJ Winter Seminar January 8-9, 2015 Stingray Talk by Daniel Rigmaiden Email: ddrigmaiden@freedomdujour.com Twitter: @ddrigmaiden I. Background [Who am I and why does my opinion matter?] A. I was indicted
More informationFINALLY, A SIMPLE SMARTPHONE.
FINALLY, A SIMPLE SMARTPHONE. All-New STAYING INDEPENDENT HAS NEVER BEEN THIS EASY. EASY The Jitterbug Smart is designed to be easy to use from the moment you turn it on. A new, 35% bigger screen makes
More informationAvaya one-x Mobile User Guide for Windows Mobile
Avaya one-x Mobile User Guide for Windows Mobile 18-602903 Issue 2 December 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document
More informationPrivacy Policy. I. How your information is used. Registration and account information. March 3,
Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and
More informationSunstar Americas, Inc.
PAGE 1 of 5 Policy The use of Mobile devices in the conduct of SAI business shall be governed as follows: For Company Owned mobile devices: a. SAI will determine the equipment, services and carriers that
More informationAT&T Encrypted Mobile Voice
AT&T Encrypted Mobile Voice Solution Overview AT&T Encrypted Mobile Voice Problem Need for increased security for confidential and sensitive mobile voice calls Solution AT&T Encrypted Mobile Voice is a
More informationThis guide describes features that are common to most models. Some features may not be available on your tablet.
User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,
More information1. INFORMATION WE COLLECT AND THE REASON FOR THE COLLECTION 2. HOW WE USE COOKIES AND OTHER TRACKING TECHNOLOGY TO COLLECT INFORMATION 3
Privacy Policy Last updated on February 18, 2017. Friends at Your Metro Animal Shelter ( FAYMAS, we, our, or us ) understands that privacy is important to our online visitors to our website and online
More information2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October
2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,
More informationMOBILE COMPUTING 2/11/18. Location-based Services: Definition. Convergence of Technologies LBS. CSE 40814/60814 Spring 2018
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Location-based Services: Definition LBS: A certain service that is offered to the users based on their locations. Convergence of Technologies GIS/ Spatial Database
More informationAccession Communicator for Mobile
Accession Communicator for Mobile Quick Start Guide ACCESSION COMMUNICATOR FOR MOBILE Your AireSpring phone service can be used to make or receive calls from your desk phone, your PC or MAC, and your mobile
More informationInternet Concepts. Learning objectives. An understanding of the services available through the Internet
lesson plan Learning objectives An understanding of the services available through the Internet An understanding of the technology underlying Internet security 0 An understanding of the risks associated
More informationPrivacy Policy. Information about us. What personal data do we collect and how do we use it?
This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,
More informationNetworks and Telecommunication
Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationProxim Wireless. All rights reserved.
Wireless Network Design Best Practices Regardless of the application, today wireless broadband is the order of the day, providing fiber like connectivity and reliability in a matter of hours. However,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationPersonal Data & Privacy Policy Statement
Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and
More informationSmart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities
Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure
More informationIntroduction. Precautions when Using ZEED T-Connect. Digital Map Information for Route Guidance Purposes. Navigation System Operations
0.8 Introduction About this Manual This manual represents the start-up guide for the ZEED T-Connect smartphone application provided to users who purchase new Toyota vehicles. It provides details on initial
More informationAMALFI Frequently Asked Questions
AMALFI Frequently Asked Questions The FAQ Sections include the following: Top Questions 1-13 The Basics 14-22 Troubleshooting 23-27 Using Your Product 28-45 Purchasing and Returning 46-51 Data Roaming
More information2013 ISACA IT Risk/Reward Barometer India Consumer Results. October
ISACA IT Risk/Reward Barometer India Consumer Results October www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Rachel D souza, Ketchum Sampark,
More information2013 ISACA IT Risk/Reward Barometer US Consumer Results. October
2013 ISACA IT Risk/Reward Barometer US Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,
More informationPrivacy Statement for DROP Connect Products and Services
Privacy Statement for DROP Connect Products and Services Policy active as of February 7, 2018 This Privacy Statement for DROP Products and Services ( Privacy Statement ) describes information that Chandler
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationMEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL
National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David
More informationAll-New INTRODUCING THE SIMPLEST SMARTPHONE EVER.
All-New INTRODUCING THE SIMPLEST SMARTPHONE EVER. All-New INTRODUCING THE ALL-NEW JITTERBUG SMART2 Staying independent has never been this easy. EASY The all-new Jitterbug Smart2 is designed to be easy
More informationUNITY MOBILE FOR WP 8.1 END USER GUIDE
UNITY MOBILE FOR WP 8.1 END USER GUIDE Contents 1. Introduction... 3 2. How It Works... 4 3. Getting Started... 5 3.1 Login... 5 3.2 Linking Unity to the Mobile Device... 5 3.3 Specifying the Outgoing
More informationVocabulary Bank organized by module
Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationWireless and Mobile Network Investigation
Wireless and Mobile Network Investigation Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } WiFi network investigations } Cellular network
More informationEffective October 31, Privacy Policy
Privacy Policy The nic.gop website is operated by Republican State Leadership Committee, Inc. ( Team.gop, we or us ). This Privacy Policy applies to nic.gop and any other website offered by Team.gop, which
More informationACCEPTABLE USE POLICY
Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER
More informationThe State of the Trust Gap in 2015
The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years
More informationUNITY MOBILE IPHONE USER GUIDE
UNITY MOBILE IPHONE USER GUIDE CONTENTS 1 Introduction... 2 2 How It Works... 3 3 Getting Started... 4 3.1 Login... 4 3.2 Linking Unity to the Mobile Device... 5 3.3 Specifying the Outgoing Call Option...
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationUsing GIS in Designing and Deploying Wireless Network in City Plans
Using GIS in Designing and Deploying Wireless Network in City Plans Iyad Aldasouqi Royal Scientific Society The Middle East Scientific Institute for Security Jordan Walid A. Salameh Princess Sumaya University
More information