mobile data/cellular data abuse research (Processes (How is data accessed?…
mobile data/cellular data abuse research
Apple vs FBI: All you need to know (Kharpal, 2016)
FBI attempted to force Applie Inc. to create backdoor into iPhone device in response to San Bernardino shootings after phone from assailant was recovered.
DHS purchases data access from Venntel Inc. in order to obtain individual's geolocation data without warrant. Data is then provided to IC for analysis and production
How data is transferred?
How is data stored?
How is data accessed?
Applications and web services
Verizon claims informed consent in user agreement
Verizon Reselling Its Customers' Locations Is A Reminder We Are All Just Data For Sale (Leetaru, 2018)
How is data created?
What is MD/CD ?
"The transmission of data via a cellular carrier. Cellular data is the default and provides access to the Internet when not within a Wi-Fi hotspot. Hotspots take precedence (see Wi-Fi hotspot)."
Sensitive Data Input
What does the US government know about you? (Anon, D. 2018)
18 U.S. Code § 2511.Interception and disclosure of wire, oral, or electronic communications prohibited
50 U.S. Code SUBCHAPTER I—ELECTRONIC SURVEILLANCE