A place to cache linked articles (think custom and personal wayback machine)
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512
  1. <!doctype html><!-- This is a valid HTML5 document. -->
  2. <!-- Screen readers, SEO, extensions and so on. -->
  3. <html lang="fr">
  4. <!-- Has to be within the first 1024 bytes, hence before the <title>
  5. See: https://www.w3.org/TR/2012/CR-html5-20121217/document-metadata.html#charset -->
  6. <meta charset="utf-8">
  7. <!-- Why no `X-UA-Compatible` meta: https://stackoverflow.com/a/6771584 -->
  8. <!-- The viewport meta is quite crowded and we are responsible for that.
  9. See: https://codepen.io/tigt/post/meta-viewport-for-2015 -->
  10. <meta name="viewport" content="width=device-width,initial-scale=1">
  11. <!-- Required to make a valid HTML5 document. -->
  12. <title>Twelve Million Phones, One Dataset, Zero Privacy (archive) — David Larlet</title>
  13. <meta name="description" content="Publication mise en cache pour en conserver une trace.">
  14. <!-- That good ol' feed, subscribe :). -->
  15. <link rel="alternate" type="application/atom+xml" title="Feed" href="/david/log/">
  16. <!-- Generated from https://realfavicongenerator.net/ such a mess. -->
  17. <link rel="apple-touch-icon" sizes="180x180" href="/static/david/icons2/apple-touch-icon.png">
  18. <link rel="icon" type="image/png" sizes="32x32" href="/static/david/icons2/favicon-32x32.png">
  19. <link rel="icon" type="image/png" sizes="16x16" href="/static/david/icons2/favicon-16x16.png">
  20. <link rel="manifest" href="/static/david/icons2/site.webmanifest">
  21. <link rel="mask-icon" href="/static/david/icons2/safari-pinned-tab.svg" color="#07486c">
  22. <link rel="shortcut icon" href="/static/david/icons2/favicon.ico">
  23. <meta name="msapplication-TileColor" content="#f0f0ea">
  24. <meta name="msapplication-config" content="/static/david/icons2/browserconfig.xml">
  25. <meta name="theme-color" content="#f0f0ea">
  26. <!-- Documented, feel free to shoot an email. -->
  27. <link rel="stylesheet" href="/static/david/css/style_2020-06-19.css">
  28. <!-- See https://www.zachleat.com/web/comprehensive-webfonts/ for the trade-off. -->
  29. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_regular.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  30. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_bold.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  31. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_italic.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  32. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_regular.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  33. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_bold.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  34. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_italic.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  35. <script type="text/javascript">
  36. function toggleTheme(themeName) {
  37. document.documentElement.classList.toggle(
  38. 'forced-dark',
  39. themeName === 'dark'
  40. )
  41. document.documentElement.classList.toggle(
  42. 'forced-light',
  43. themeName === 'light'
  44. )
  45. }
  46. const selectedTheme = localStorage.getItem('theme')
  47. if (selectedTheme !== 'undefined') {
  48. toggleTheme(selectedTheme)
  49. }
  50. </script>
  51. <meta name="robots" content="noindex, nofollow">
  52. <meta content="origin-when-cross-origin" name="referrer">
  53. <!-- Canonical URL for SEO purposes -->
  54. <link rel="canonical" href="https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html">
  55. <body class="remarkdown h1-underline h2-underline h3-underline hr-center ul-star pre-tick">
  56. <article>
  57. <header>
  58. <h1>Twelve Million Phones, One Dataset, Zero Privacy</h1>
  59. </header>
  60. <nav>
  61. <p class="center">
  62. <a href="/david/" title="Aller à l’accueil">🏠</a> •
  63. <a href="https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html" title="Lien vers le contenu original">Source originale</a>
  64. </p>
  65. </nav>
  66. <hr>
  67. <main>
  68. <p>
  69. <strong>Every minute of every day,</strong> everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times <a href="https://www.nytimes.com/privacy-project">Privacy Project</a> obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles.
  70. </p>
  71. <p>
  72. Each piece of information in this file represents the precise location of a single smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers.
  73. </p>
  74. <p>
  75. <em><em><em>[Related: </em><a href="https://www.nytimes.com/interactive/2019/12/20/opinion/location-data-national-security.html">How to Track President Trump</a><em> —</em><em> Read more about the national security risks found in the data.]</em></em>
  76. </em></p>
  77. <p>
  78. </p>
  79. <p>
  80. After spending months sifting through the data, tracking the movements of people across the country and speaking with dozens of data companies, technologists, lawyers and academics who study this field, we feel the same sense of alarm. In the cities that the data file covers, it tracks people from nearly every neighborhood and block, whether they live in mobile homes in Alexandria, Va., or luxury towers in Manhattan.
  81. </p>
  82. <p>
  83. One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices’ owners to the residences indefinitely.
  84. </p>
  85. <p>
  86. If you lived in one of the cities the dataset covers and use apps that share your location — anything from weather apps to local news apps to coupon savers — you could be in there, too.
  87. </p>
  88. <p>
  89. If you could see the full trove, you might never use your phone the same way again.
  90. </p>
  91. <p>
  92. <strong>The data reviewed by Times Opinion</strong> didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor.
  93. </p>
  94. <p>
  95. <a href="https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html">The Times</a> and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid.
  96. </p>
  97. <p>
  98. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be.
  99. </p>
  100. <p>
  101. <em><em><em>[Related: </em><a href="https://www.nytimes.com/interactive/2019/12/21/opinion/pasadena-smartphone-spying.html">Where Even the Children Are Being Tracked</a><em> — We followed every move of people in one city. Then we went to tell them.]</em></em>
  102. </em></p>
  103. <p>
  104. </p>
  105. <p>
  106. “The seduction of these consumer products is so powerful that it blinds us to the possibility that there is another way to get the benefits of the technology without the invasion of privacy. But there is,” said William Staples, founding director of the Surveillance Studies Research Center at the University of Kansas. “All the companies collecting this location information act as what I have called Tiny Brothers, using a variety of data sponges to engage in everyday surveillance.”
  107. </p>
  108. <p>
  109. In this and subsequent articles we’ll reveal what we’ve found and why it has so shaken us. We’ll ask you to consider the national security risks the existence of this kind of data creates and the specter of what such precise, always-on human tracking might mean in the hands of corporations and the government. We’ll also look at legal and ethical justifications that companies rely on to collect our precise locations and the deceptive techniques they use to lull us into sharing it.
  110. </p>
  111. <p>
  112. Today, it’s perfectly legal to collect and sell all this information. In the United States, as in most of the world, no federal law limits what has become a vast and lucrative trade in human tracking. Only internal company policies and the decency of individual employees prevent those with access to the data from, say, stalking an estranged spouse or selling the evening commute of an intelligence officer to a hostile foreign power.
  113. </p>
  114. <p>
  115. Companies say the data is shared only with vetted partners. As a society, we’re choosing simply to take their word for that, displaying a blithe faith in corporate beneficence that we don’t extend to far less intrusive yet more heavily regulated industries. Even if these companies are acting with the soundest moral code imaginable, there’s ultimately no foolproof way they can secure the data from falling into the hands of a foreign security service. Closer to home, on a smaller yet no less troubling scale, there are often few protections to stop an individual analyst with access to such data from tracking an ex-lover or a victim of abuse.
  116. </p>
  117. <h2 class="g-subhed g-optimize-type " id="">
  118. A DIARY OF YOUR EVERY MOVEMENT
  119. </h2>
  120. <p>
  121. <strong>The companies that collect</strong> all this information on your movements justify their business on the basis of three claims: People consent to be tracked, the data is anonymous and the data is secure.
  122. </p>
  123. <p>
  124. None of those claims hold up, based on the file we’ve obtained and our review of company practices.
  125. </p>
  126. <p>
  127. Yes, the location data contains billions of data points with no identifiable information like names or email addresses. But it’s child’s play to connect real names to the dots that appear on the maps.
  128. </p>
  129. <p>
  130. Here’s what that looks like.
  131. </p>
  132. <p>
  133. <strong>In most cases,</strong> ascertaining a home location and an office location was enough to identify a person. Consider your daily commute: Would any other smartphone travel directly between your house and your office every day?
  134. </p>
  135. <p>
  136. Describing location data as anonymous is “a completely false claim” that has been debunked in multiple studies, Paul Ohm, a law professor and privacy researcher at the Georgetown University Law Center, told us. “Really precise, longitudinal geolocation information is absolutely impossible to anonymize.”
  137. </p>
  138. <p>
  139. “D.N.A.,” he added, “is probably the only thing that’s harder to anonymize than precise geolocation information.”
  140. </p>
  141. <p>
  142. <em><em><em>[Work in the location tracking industry? Seen an abuse of data? We want to hear from you. Using a non-work phone or computer, contact us on a secure line at 440-295-5934, @charliewarzel on Wire or email </em><a href="mailto:charlie.warzel@nytimes.com">Charlie Warzel</a><em> and </em><a href="mailto:stuart.thompson@nytimes.com">Stuart A. Thompson</a><em> directly.]</em></em>
  143. </em></p>
  144. <p>
  145. Yet companies continue to claim that the data are anonymous. In marketing materials and at trade conferences, anonymity is a major selling point — key to allaying concerns over such invasive monitoring.
  146. </p>
  147. <p>
  148. To evaluate the companies’ claims, we turned most of our attention to identifying people in positions of power. With the help of publicly available information, like home addresses, we easily identified and then tracked scores of notables. We followed military officials with security clearances as they drove home at night. We tracked law enforcement officers as they took their kids to school. We watched high-powered lawyers (and their guests) as they traveled from private jets to vacation properties. We did not name any of the people we identified without their permission.
  149. </p>
  150. <p>
  151. The data set is large enough that it surely points to scandal and crime but our purpose wasn’t to dig up dirt. We wanted to document the risk of underregulated surveillance.
  152. </p>
  153. <p>
  154. Watching dots move across a map sometimes revealed hints of faltering marriages, evidence of drug addiction, records of visits to psychological facilities.
  155. </p>
  156. <p>
  157. Connecting a sanitized ping to an actual human in time and place could feel like reading someone else’s diary.
  158. </p>
  159. <p>
  160. In one case, we identified Mary Millben, a singer based in Virginia who has performed for three presidents, including President Trump. She was invited to the service at the Washington National Cathedral the morning after the president’s inauguration. That’s where we first found her.
  161. </p>
  162. <p>
  163. She remembers how, surrounded by dignitaries and the first family, she was moved by the music echoing through the recesses of the cathedral while members of both parties joined together in prayer. All the while, the apps on her phone were also monitoring the moment, recording her position and the length of her stay in meticulous detail. For the advertisers who might buy access to the data, the intimate prayer service could well supply some profitable marketing insights.
  164. </p>
  165. <p>
  166. “To know that you have a list of places I have been, and my phone is connected to that, that’s scary,” Ms. Millben told us. “What’s the business of a company benefiting off of knowing where I am? That seems a little dangerous to me.”
  167. </p>
  168. <p>
  169. Like many people we identified in the data, Ms. Millben said she was careful about limiting how she shared her location. Yet like many of them, she also couldn’t name the app that might have collected it. Our privacy is only as secure as the least secure app on our device.
  170. </p>
  171. <p>
  172. “That makes me uncomfortable,” she said. “I’m sure that makes every other person uncomfortable, to know that companies can have free rein to take your data, locations, whatever else they’re using. It is disturbing.”
  173. </p>
  174. <p>
  175. <em><em><em>[Related: </em><a href="https://www.nytimes.com/2019/12/26/reader-center/location-tracking-phones-questions.html">What’s the Worst That Could Happen With My Phone Data?</a><em> — Our journalists answers your questions about their investigation into how companies track smartphone users.]</em></em>
  176. </em></p>
  177. <p>
  178. The inauguration weekend yielded a trove of personal stories and experiences: elite attendees at presidential ceremonies, religious observers at church services, supporters assembling across the National Mall — all surveilled and recorded permanently in rigorous detail.
  179. </p>
  180. <p>
  181. Protesters were tracked just as rigorously. After the pings of Trump supporters, basking in victory, vanished from the National Mall on Friday evening, they were replaced hours later by those of participants in the Women’s March, as a crowd of nearly half a million descended on the capital. Examining just a photo from the event, you might be hard-pressed to tie a face to a name. But in our data, pings at the protest connected to clear trails through the data, documenting the lives of protesters in the months before and after the protest, including where they lived and worked.
  182. </p>
  183. <p>
  184. We spotted a senior official at the Department of Defense walking through the Women’s March, beginning on the National Mall and moving past the Smithsonian National Museum of American History that afternoon. His wife was also on the mall that day, something we discovered after tracking him to his home in Virginia. Her phone was also beaming out location data, along with the phones of several neighbors.
  185. </p>
  186. <p>
  187. The official’s data trail also led to a high school, homes of friends, a visit to Joint Base Andrews, workdays spent in the Pentagon and a ceremony at Joint Base Myer-Henderson Hall with President Barack Obama in 2017 (nearly a dozen more phones were tracked there, too).
  188. </p>
  189. <p>
  190. Inauguration Day weekend was marked by other protests — and riots. Hundreds of protesters, some in black hoods and masks, gathered north of the National Mall that Friday, eventually <a href="https://www.nytimes.com/2017/01/20/us/politics/inauguration-protests.html">setting fire to a limousine</a> near Franklin Square. The data documented those rioters, too. Filtering the data to that precise time and location led us to the doorsteps of some who were there. Police were present as well, many with faces obscured by riot gear. The data led us to the homes of at least two police officers who had been at the scene.
  191. </p>
  192. <p>
  193. As revealing as our searches of Washington were, we were relying on just one slice of data, sourced from one company, focused on one city, covering less than one year. Location data companies collect orders of magnitude more information every day than the totality of what Times Opinion received.
  194. </p>
  195. <p>
  196. Data firms also typically draw on other sources of information that we didn’t use. We lacked the mobile advertising IDs or other identifiers that advertisers often combine with demographic information like home ZIP codes, age, gender, even phone numbers and emails to create detailed audience profiles used in <a href="https://www.nytimes.com/interactive/2019/04/30/opinion/privacy-targeted-advertising.html">targeted advertising</a>. When datasets are combined, privacy risks can be amplified. Whatever protections existed in the location dataset can crumble with the addition of only one or two other sources.
  197. </p>
  198. <p>
  199. There are dozens of companies profiting off such data daily across the world — by collecting it directly from smartphones, creating new technology to better capture the data or creating audience profiles for targeted advertising.
  200. </p>
  201. <p>
  202. The full collection of companies can feel dizzying, as it’s constantly changing and seems impossible to pin down. Many use technical and nuanced language that may be confusing to average smartphone users.
  203. </p>
  204. <p>
  205. While many of them have been involved in the business of tracking us for years, the companies themselves are unfamiliar to most Americans. (Companies can work with data derived from GPS sensors, Bluetooth beacons and other sources. Not all companies in the location data business collect, buy, sell or work with granular location data.)
  206. </p>
  207. <p>
  208. Location data companies generally downplay the risks of collecting such revealing information at scale. Many also say they’re not very concerned about potential regulation or software updates that could make it more difficult to collect location data.
  209. </p>
  210. <p>
  211. “No, it doesn’t really keep us up at night,” Brian Czarny, chief marketing officer at Factual, one such company, said. He added that Factual does not resell detailed data like the information we reviewed. “We don’t feel like anybody should be doing that because it’s a risk to the whole business,” he said.
  212. </p>
  213. <p>
  214. In absence of a federal privacy law, the industry has largely relied on self-regulation. Several industry groups offer ethical guidelines meant to govern it. Factual joined the <a href="https://www.mmaglobal.com/">Mobile Marketing Association</a>, along with many other data location and marketing companies, in drafting a pledge intended to improve its self-regulation. The pledge is slated to be released next year.
  215. </p>
  216. <p>
  217. States are starting to respond with their own laws. The California Consumer Protection Act goes into effect next year and adds new protections for residents there, like allowing them to ask companies to delete their data or prevent its sale. But aside from a few new requirements, the law could leave the industry largely unencumbered.
  218. </p>
  219. <p>
  220. “If a private company is legally collecting location data, they’re free to spread it or share it however they want,” said Calli Schroeder, a lawyer for the privacy and data protection company VeraSafe.
  221. </p>
  222. <p>
  223. The companies are required to disclose very little about their data collection. By law, companies need only describe their practices in their privacy policies, which tend to be <a href="https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html">dense legal documents</a> that few people read and even fewer can truly understand.
  224. </p>
  225. <h2 class="g-subhed g-optimize-type " id="">
  226. EVERYTHING CAN BE HACKED
  227. </h2>
  228. <p>
  229. <strong>Does it really matter</strong> that your information isn’t actually anonymous? Location data companies argue that your data is safe — that it poses no real risk because it’s stored on guarded servers. This assurance has been undermined by the parade of publicly reported data breaches — to say nothing of breaches that don’t make headlines. In truth, sensitive information can be easily transferred or leaked, as evidenced by this very story.
  230. </p>
  231. <p>
  232. We’re constantly shedding data, for example, by surfing the internet or making credit card purchases. But location data is different. Our precise locations are used fleetingly in the moment for a targeted ad or notification, but then repurposed indefinitely for much more profitable ends, like tying your purchases to <a href="https://web.clearchanneloutdoor.com/radar">billboard ads</a> you drove past on the freeway. Many apps that use your location, like weather services, work perfectly well without your precise location — but collecting your location feeds a lucrative secondary business of analyzing, licensing and transferring that information to third parties.
  233. </p>
  234. <p class="g-source ">
  235. <span class="g-caption">The data contains simple information like date, latitude and longitude, making it easy to inspect, download and transfer. Note: Values are randomized to protect sources and device owners.</span>
  236. </p>
  237. <p>
  238. For many Americans, the only real risk they face from having their information exposed would be embarrassment or inconvenience. But for others, like survivors of abuse, the risks could be substantial. And who can say what practices or relationships any given individual might want to keep private, to withhold from friends, family, employers or the government? We found hundreds of pings in mosques and churches, abortion clinics, queer spaces and other sensitive areas.
  239. </p>
  240. <p>
  241. In one case, we observed a change in the regular movements of a Microsoft engineer. He made a visit one Tuesday afternoon to the main Seattle campus of a Microsoft competitor, Amazon. The following month, he started a new job at Amazon. It took minutes to identify him as Ben Broili, a manager now for Amazon Prime Air, a drone delivery service.
  242. </p>
  243. <p>
  244. “I can’t say I’m surprised,” Mr. Broili told us in early December. “But knowing that you all can get ahold of it and comb through and place me to see where I work and live — that’s weird.” That we could so easily discern that Mr. Broili was out on a job interview raises some obvious questions, like: Could the internal location surveillance of executives and employees become standard corporate practice?
  245. </p>
  246. <p>
  247. Mr. Broili wasn’t worried about apps cataloguing his every move, but he said he felt unsure about whether the tradeoff between the services offered by the apps and the sacrifice of privacy was worth it. “It’s an awful lot of data,” he said. “And I really still don’t understand how it’s being used. I’d have to see how the other companies were weaponizing or monetizing it to make that call.”
  248. </p>
  249. <p>
  250. If this kind of location data makes it easy to keep tabs on employees, it makes it just as simple to stalk celebrities. Their private conduct — even in the dead of night, in residences and far from paparazzi — could come under even closer scrutiny.
  251. </p>
  252. <p>
  253. Reporters hoping to evade other forms of surveillance by meeting in person with a source might want to rethink that practice. Every major newsroom covered by the data contained dozens of pings; we easily traced one Washington Post journalist through Arlington, Va.
  254. </p>
  255. <p>
  256. In other cases, there were detours to hotels and late-night visits to the homes of prominent people. One person, plucked from the data in Los Angeles nearly at random, was found traveling to and from roadside motels multiple times, for visits of only a few hours each time.
  257. </p>
  258. <p>
  259. While these pointillist pings don’t in themselves reveal a complete picture, a lot can be gleaned by examining the date, time and length of time at each point.
  260. </p>
  261. <p>
  262. Large data companies like Foursquare — perhaps the most familiar name in the location data business — say they don’t sell detailed location data like the kind reviewed for this story but rather use it to <a href="https://www.nytimes.com/2019/10/16/opinion/foursquare-privacy-internet.html">inform analysis</a>, such as measuring whether you <a href="https://enterprise.foursquare.com/products/attribution">entered a store</a> after seeing an ad on your mobile phone.
  263. </p>
  264. <p>
  265. But a number of companies do sell the detailed data. Buyers are typically data brokers and advertising companies. But some of them have little to do with consumer advertising, including financial institutions, geospatial analysis companies and real estate investment firms that can process and analyze such large quantities of information. They might pay more than $1 million for a tranche of data, according to a former location data company employee who agreed to speak anonymously.
  266. </p>
  267. <p>
  268. Location data is also collected and shared alongside a mobile advertising ID, a supposedly anonymous identifier about 30 digits long that allows advertisers and other businesses to tie activity together across apps. The ID is also used to combine location trails with other information like your name, home address, email, phone number or even an identifier tied to your Wi-Fi network.
  269. </p>
  270. <p>
  271. The data can change hands in almost real time, so fast that your location could be transferred from your smartphone to the app’s servers and exported to third parties in milliseconds. This is how, for example, you might see an ad for a new car some time after walking through a dealership.
  272. </p>
  273. <p>
  274. That data can then be resold, copied, pirated and abused. There’s no way you can ever retrieve it.
  275. </p>
  276. <p>
  277. Location data is about far more than consumers seeing a few more relevant ads. This information provides critical intelligence for big businesses. The Weather Channel app’s parent company, for example, analyzed users’ location data for <a href="https://web.archive.org/web/20180731211011/https://business.weather.com/writable/documents/Financial-Markets/InvestorInsights_SolutionSheet.pdf">hedge funds</a>, according to a <a href="https://www.nytimes.com/2019/01/03/technology/weather-channel-app-lawsuit.html">lawsuit filed in Los Angeles this year</a> that was triggered by Times reporting. And Foursquare received much attention in 2016 after using its data trove to <a href="https://medium.com/foursquare-direct/foursquare-predicts-chipotle-s-q1-sales-down-nearly-30-foot-traffic-reveals-the-start-of-a-mixed-78515b2389af">predict</a> that after an E. coli crisis, Chipotle’s sales would drop by 30 percent in the coming months. Its same-store sales ultimately <a href="https://www.cnbc.com/2016/04/26/chipotle-reports-first-quarter-results.html">fell 29.7 percent</a>.
  278. </p>
  279. <p>
  280. Much of the concern over location data has focused on telecom giants like Verizon and AT&amp;T, which have been <a href="https://www.wyden.senate.gov/imo/media/doc/at&amp;t%20letter%20to%20RW%206.15.pdf">selling location data</a> to third parties for years. Last year, Motherboard, Vice’s technology website, <a href="https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile">found</a> that once the data was sold, it was being shared to help bounty hunters find specific cellphones in real time. The resulting scandal forced the telecom giants to <a href="https://arstechnica.com/tech-policy/2018/06/verizon-and-att-will-stop-selling-your-phones-location-to-data-brokers/">pledge</a> they would stop selling location movements to data brokers.
  281. </p>
  282. <p>
  283. Yet no law prohibits them from doing so.
  284. </p>
  285. <p>
  286. Location data is transmitted from your phone via software development kits, or S.D.Ks. as they’re known in the trade. The kits are small programs that can be used to build features within an app. They make it easy for app developers to simply include location-tracking features, a useful component of services like weather apps. Because they’re so useful and easy to use, S.D.K.s are embedded in thousands of apps. Facebook, Google and Amazon, for example, have extremely popular S.D.K.s that allow smaller apps to connect to bigger companies’ ad platforms or help provide web traffic analytics or payment infrastructure.
  287. </p>
  288. <p>
  289. But they could also sit on an app and collect location data while providing no real service back to the app. Location companies may <a href="https://www.xmode.io/app-publishers/">pay</a> the apps to be included — collecting valuable data that can be monetized.
  290. </p>
  291. <p>
  292. “If you have an S.D.K. that’s frequently collecting location data, it is more than likely being resold across the industry,” said Nick Hall, chief executive of the data marketplace company VenPath.
  293. </p>
  294. <h2 class="g-subhed g-optimize-type " id="">
  295. THE ‘HOLY GRAIL’ FOR MARKETERS
  296. </h2>
  297. <p>
  298. <strong>If this information is so sensitive,</strong> why is it collected in the first place?
  299. </p>
  300. <p>
  301. For brands, following someone’s precise movements is key to understanding the “customer journey” — every step of the process from seeing an ad to buying a product. It’s the Holy Grail of advertising, one marketer said, the complete picture that connects all of our interests and online activity with our real-world actions.
  302. </p>
  303. <p>
  304. Once they have the complete customer journey, companies know a lot about what we want, what we buy and what made us buy it. Other groups have begun to find ways to use it too. Political campaigns could analyze the interests and demographics of <a href="https://www.wsj.com/articles/political-campaigns-track-cellphones-to-identify-and-target-individual-voters-11570718889">rally attendees</a> and use that information to shape their messages to try to manipulate particular groups. Governments around the world could have a new tool to identify protestors.
  305. </p>
  306. <p>
  307. Pointillist location data also has some clear benefits to society. Researchers can use the raw data to provide key insights for transportation studies and government planners. The City Council of Portland, Ore., unanimously <a href="https://www.opb.org/news/article/cellphone-location-data-portland-google-privacy/">approved a deal</a> to study traffic and transit by monitoring millions of cellphones. Unicef <a href="https://www.businesswire.com/news/home/20190910005037/en/Cuebiq%E2%80%99s-Data-Good-Program-UNICEF-High-Precision-Human">announced a plan</a> to use aggregated mobile location data to study epidemics, natural disasters and demographics.
  308. </p>
  309. <p>
  310. For individual consumers, the value of constant tracking is less tangible. And the lack of transparency from the advertising and tech industries raises still more concerns.
  311. </p>
  312. <p>
  313. Does a coupon app need to sell second-by-second location data to other companies to be profitable? Does that really justify allowing companies to track millions and potentially expose our private lives?
  314. </p>
  315. <p>
  316. Data companies say users consent to tracking when they agree to share their location. But those consent screens rarely make clear how the data is being packaged and sold. If companies were clearer about what they were doing with the data, would anyone agree to share it?
  317. </p>
  318. <p>
  319. What about data collected years ago, before hacks and leaks made privacy a forefront issue? Should it still be used, or should it be deleted for good?
  320. </p>
  321. <p>
  322. If it’s possible that data stored securely today can easily be hacked, leaked or stolen, is this kind of data worth that risk?
  323. </p>
  324. <p>
  325. Is all of this surveillance and risk worth it merely so that we can be served slightly more relevant ads? Or so that hedge fund managers can get richer?
  326. </p>
  327. <p>
  328. The companies profiting from our every move can’t be expected to voluntarily limit their practices. Congress has to step in to protect Americans’ needs as consumers and rights as citizens.
  329. </p>
  330. <p>
  331. Until then, one thing is certain: We are living in the world’s most advanced surveillance system. This system wasn’t created deliberately. It was built through the interplay of technological advance and the profit motive. It was built to make money. The greatest trick technology companies ever played was persuading society to surveil itself.
  332. </p>
  333. </main>
  334. </article>
  335. <hr>
  336. <footer>
  337. <p>
  338. <a href="/david/" title="Aller à l’accueil">🏠</a> •
  339. <a href="/david/log/" title="Accès au flux RSS">🤖</a> •
  340. <a href="http://larlet.com" title="Go to my English profile" data-instant>🇨🇦</a> •
  341. <a href="mailto:david%40larlet.fr" title="Envoyer un courriel">📮</a> •
  342. <abbr title="Hébergeur : Alwaysdata, 62 rue Tiquetonne 75002 Paris, +33184162340">🧚</abbr>
  343. </p>
  344. <template id="theme-selector">
  345. <form>
  346. <fieldset>
  347. <legend>Thème</legend>
  348. <label>
  349. <input type="radio" value="auto" name="chosen-color-scheme" checked> Auto
  350. </label>
  351. <label>
  352. <input type="radio" value="dark" name="chosen-color-scheme"> Foncé
  353. </label>
  354. <label>
  355. <input type="radio" value="light" name="chosen-color-scheme"> Clair
  356. </label>
  357. </fieldset>
  358. </form>
  359. </template>
  360. </footer>
  361. <script type="text/javascript">
  362. function loadThemeForm(templateName) {
  363. const themeSelectorTemplate = document.querySelector(templateName)
  364. const form = themeSelectorTemplate.content.firstElementChild
  365. themeSelectorTemplate.replaceWith(form)
  366. form.addEventListener('change', (e) => {
  367. const chosenColorScheme = e.target.value
  368. localStorage.setItem('theme', chosenColorScheme)
  369. toggleTheme(chosenColorScheme)
  370. })
  371. const selectedTheme = localStorage.getItem('theme')
  372. if (selectedTheme && selectedTheme !== 'undefined') {
  373. form.querySelector(`[value="${selectedTheme}"]`).checked = true
  374. }
  375. }
  376. const prefersColorSchemeDark = '(prefers-color-scheme: dark)'
  377. window.addEventListener('load', () => {
  378. let hasDarkRules = false
  379. for (const styleSheet of Array.from(document.styleSheets)) {
  380. let mediaRules = []
  381. for (const cssRule of styleSheet.cssRules) {
  382. if (cssRule.type !== CSSRule.MEDIA_RULE) {
  383. continue
  384. }
  385. // WARNING: Safari does not have/supports `conditionText`.
  386. if (cssRule.conditionText) {
  387. if (cssRule.conditionText !== prefersColorSchemeDark) {
  388. continue
  389. }
  390. } else {
  391. if (cssRule.cssText.startsWith(prefersColorSchemeDark)) {
  392. continue
  393. }
  394. }
  395. mediaRules = mediaRules.concat(Array.from(cssRule.cssRules))
  396. }
  397. // WARNING: do not try to insert a Rule to a styleSheet you are
  398. // currently iterating on, otherwise the browser will be stuck
  399. // in a infinite loop…
  400. for (const mediaRule of mediaRules) {
  401. styleSheet.insertRule(mediaRule.cssText)
  402. hasDarkRules = true
  403. }
  404. }
  405. if (hasDarkRules) {
  406. loadThemeForm('#theme-selector')
  407. }
  408. })
  409. </script>
  410. </body>
  411. </html>