Please enable JavaScript.
Coggle requires JavaScript to display documents.
mobile data/cellular data abuse research (Processes (How is data accessed?…
mobile data/cellular data abuse research
Events
Apple vs FBI: All you need to know (Kharpal, 2016)
FBI attempted to force Applie Inc. to create backdoor into iPhone device in response to San Bernardino shootings after phone from assailant was recovered.
https://www.aclu.org/foia-document/foia-request-dhs-cbp-ice-cell-phone-location-data
DHS purchases data access from Venntel Inc. in order to obtain individual's geolocation data without warrant. Data is then provided to IC for analysis and production
Information System
Data Centers
People
Processes
How data is transferred?
How is data stored?
How is data accessed?
by individuals
Mobile devices
Applications and web services
by corporations
Verizon claims informed consent in user agreement
Verizon Reselling Its Customers' Locations Is A Reminder We Are All Just Data For Sale (Leetaru, 2018)
How is data created?
What is MD/CD ?
https://www.pcmag.com/encyclopedia/term/cellular-data
"The transmission of data via a cellular carrier. Cellular data is the default and provides access to the Internet when not within a Wi-Fi hotspot. Hotspots take precedence (see Wi-Fi hotspot)."
Sensitive MD/CD
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.672.225&rep=rep1&type=pdf
Personal Information
Sensitive Data Input
Device Metadata
Data
Government use
What does the US government know about you? (Anon, D. 2018)
LE
https://www.law.cornell.edu/uscode/text/18
18 U.S. Code § 2511.Interception and disclosure of wire, oral, or electronic communications prohibited
IC
https://www.law.cornell.edu/uscode/text/50/chapter-36
50 U.S. Code SUBCHAPTER I—ELECTRONIC SURVEILLANCE