A place to cache linked articles (think custom and personal wayback machine)
Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

index.md 10KB

il y a 3 ans
12345678910111213141516171819202122232425262728
  1. title: Your Car Is Spying on You. A CBP Contract Shows the Risks.
  2. url: https://theintercept.com/2021/05/03/car-surveillance-berla-msab-cbp/
  3. hash_url: ce7d120b6e5c13644a538f5116b4409b
  4. <p><u>U.S. Customs and Border Protection</u> purchased technology that vacuums up reams of personal information stored inside cars, according to a federal contract reviewed by The Intercept, illustrating the serious risks in connecting your vehicle and your smartphone.</p>
  5. <p><a href="https://beta.sam.gov/opp/28e69f99d22440418297dbb0820e86d3/view?sort=-modifiedDate&amp;index=opps&amp;is_active=1&amp;page=1">The contract</a>, shared with The Intercept by Latinx advocacy organization Mijente, shows that CBP paid Swedish data extraction firm MSAB $456,073 for a bundle of hardware including five iVe “vehicle forensics kits” manufactured by Berla, an American company. A related document indicates that CBP believed the kit would be “critical in CBP investigations as it can provide evidence [not only] regarding the vehicle’s use, but also information obtained through mobile devices paired with the infotainment system.” The document went on to say that iVe was the only tool available for purchase that could tap into such systems.</p>
  6. <p>According to statements by Berla’s own founder, part of the draw of vacuuming data out of cars is that so many drivers are oblivious to the fact that their cars are generating so much data in the first place, often including extremely sensitive information inadvertently synced from smartphones.</p>
  7. <p>Indeed, MSAB marketing materials promise cops access to a vast array of sensitive personal information quietly stored in the infotainment consoles and various other computers used by modern vehicles — a tapestry of personal details akin to what CBP might get when cracking into one’s personal phone. MSAB claims that this data can include “Recent destinations, favorite locations, call logs, contact lists, SMS messages, emails, pictures, videos, social media feeds, and the navigation history of everywhere the vehicle has been.” MSAB even touts the ability to retrieve deleted data, divine “future plan[s],” and “Identify known associates and establish communication patterns between them.”</p>
  8. <p>The kit, MSAB says, also has the ability to discover specific events that most car owners are probably unaware are even recorded, like “when and where a vehicle’s lights are turned on, and which doors are opened and closed at specific locations” as well as “gear shifts, odometer reads, ignition cycles, speed logs, and more.” This car-based surveillance, in other words, goes many miles beyond the car itself.</p>
  9. <p><a href="https://www.msab.com/products/ive-vehicle-forensics/">iV</a><a href="https://www.msab.com/products/ive-vehicle-forensics/">e is compatible </a><a href="https://www.msab.com/products/ive-vehicle-forensics/">with over two dozen makes</a> of vehicle and is rapidly expanding its acquisition and decoding capabilities, according to MSAB.</p>
  10. <p>Civil liberties watchdogs said the CBP contract raises concerns that these sorts of extraction tools will be used more broadly to circumvent constitutional protections against unreasonable searches. “The scale at which CBP can leverage a contract like this one is staggering,” said Mohammad Tajsar, an attorney with the American Civil Liberties Union of Southern California.</p>
  11. <p>MSAB spokesperson Carolen Ytander declined to comment on the privacy and civil liberties risks posed by iVe. When asked if the company maintains any guidelines on use of its technology, they said the company “does not set customer policy or governance on usage.”</p>
  12. <h3>Getting Smartphone Data Without Having to Crack Into a Smartphone</h3>
  13. <p>MSAB’s contract with CBP ran from June of last year until February 28, 2021, and was with the agency’s “<a href="https://www.cbp.gov/about/labs-scientific-svcs">forensic and scientific arm</a>,” Laboratories and Scientific Services. It included training on how to use the MSAB gear.</p>
  14. <p>Interest from the agency, the largest law enforcement force in the United States, likely stems from police setbacks in the ongoing war to crack open smartphones.</p>
  15. <p>Attacking such devices was a key line of business for MSAB before it branched out into extracting information from cars. The ubiquity of the smartphone provided police around the world with an unparalleled gift: a large portion of an individual’s private life stored conveniently in one object we carry nearly all of the time. But as our phones have become more sophisticated and more targeted, they’ve grown better secured as well, with phone makers like Apple and phone device-cracking outfits like MSAB and Cellebrite engaged in a constant back-and-forth to gain a technical edge over the other.</p>
  16. <p>So data-hungry government agencies have increasingly moved to exploit the rise of the smart car, whose dashboard-mounted computers, Bluetooth capabilities, and USB ports have, with the ascendancy of the smartphone, become as standard as cup holders. Smart car systems are typically intended to be paired with your phone, allowing you to take calls, dictate texts, plug in map directions, or “read ”emails from behind the wheel. Anyone who’s taken a spin in a new-ish vehicle and connected their phone — whether to place a hands-free call, listen to Spotify, or get directions — has probably been prompted to share their entire contact list, presented as a necessary step to place calls but without any warning that a perfect record of everyone they’ve ever known will now reside inside their car’s memory, sans password.</p>
  17. <p>The people behind CBP’s new tool are well aware that they are preying on consumer ignorance. In a podcast appearance <a href="https://www.nbcnews.com/tech/tech-news/snitches-wheels-police-turn-car-data-destroy-suspects-alibis-n1251939">first reported by NBC News</a> last summer, Berla founder Ben LeMere remarked, “People rent cars and go do things with them and don’t even think about the places they are going and what the car records.” In a 2015 appearance on the podcast “The Forensic Lunch,” LeMere told the show’s hosts how the company uses exactly this accidental-transfer scenario in its trainings: “Your phone died, you’re gonna get in the car, plug it in, and there’s going to be this nice convenient USB port for you. When you plug it into this USB port, it’s going to charge your phone, absolutely. And as soon as it powers up, it’s going to start sucking all your data down into the car.”</p>
  18. <p>In the same podcast, LeMere also recounted the company pulling data from a car rented at BWI Marshall Airport outside Washington, D.C.:</p>
  19. <blockquote><p>“We had a Ford Explorer … we pulled the system out, and we recovered 70 phones that had been connected to it. All of their call logs, their contacts and their SMS history, as well as their music preferences, songs that were on their device, and some of their Facebook and Twitter things as well. … And it’s quite comical when you sit back and read some of the the text messages.”</p></blockquote>
  20. <p>The ACLU’s Tajsar explained, “What they’re really saying is ‘We can exploit people because they’re dumb. <i>… </i>We can leverage consumers’ lack of understanding in order to exploit them in ways that they might object to if it was done in the analog world.’”</p>
  21. <h3>Exploiting the Wild “Frontier of the Fourth<b> Amendment”</b></h3>
  22. <p>The push to make our cars extensions of our phones (often without any meaningful data protection) makes them tremendously enticing targets for generously funded police agencies with insatiable appetites for surveillance data. Part of the appeal is that automotive data systems remain on what Tajsar calls the “frontier of the Fourth Amendment.” While courts <a href="https://epic.org/amicus/cell-phone/riley/">increasingly</a> <a href="https://www.eff.org/effector/31/10">recognize</a> your phone’s privacy as a direct extension of your own, the issue of cracking infotainment systems and downloading their contents remains unsettled, and CBP could be “exploiting the lack of legal coverage to get at information that otherwise would be protected by a warrant,” Tajsar said.</p>
  23. <p>MSAB’s technology is doubly troubling in the hands of CBP, an agency with <a href="https://www.reuters.com/article/us-usa-immigration-privacy/u-s-border-agents-do-not-need-warrants-to-search-digital-devices-court-rules-idUSKBN2AA2AL">a powerful exception from the Fourth Amendment</a> and a historical tendency toward aggressive surveillance and repressive tactics. The agency recently used drones to monitor protests against the police murder of George Floyd and routinely conducts <a href="https://epic.org/testimony/congress/EPIC-HHSC-WarentlessSearchesBorder-July2018.pdf">warrantless searches of electronic devices</a> at or near the border.</p>
  24. <p>“It would appear that this technology can be applied like warrantless phone searches on anybody that CBP pleases,” said Mijente’s Jacinta Gonzalez, “which has been a problem for <a href="https://theintercept.com/2019/02/08/us-mexico-border-journalists-harassment/">journalists, activists, and lawyers</a>, as well as anyone else CBP decides to surveil, without providing any reasonable justification. With this capability, it seems very likely CBP would conduct searches based on intelligence about family/social connections, etc., and there wouldn’t seem to be anything preventing racial profiling.”</p>
  25. <p>Tajsar shared these concerns.</p>
  26. <p>“Whenever we have surveillance technology that’s deeply invasive, we are disturbed,” he said. “When it’s in the hands of an agency that’s consistently refused any kind of attempt at basic accountability, reform, or oversight, then it’s Defcon 1.”</p>
  27. <p>Part of the problem is that CBP’s parent agency, the Department of Homeland Security, is designed to proliferate intelligence and surveillance technologies “among major law enforcement agencies across the country,” said Tajsar. “What CBP have will trickle down to what your local cops on the street end up getting. That is not a theoretical concern.”</p>