/interactive

  • Two States. Eight Textbooks. Two American Stories. - The New York Times
    https://www.nytimes.com/interactive/2020/01/12/us/texas-vs-california-history-textbooks.html

    The books have the same publisher. They credit the same authors. But they are customized for students in different states, and their contents sometimes diverge in ways that reflect the nation’s deepest partisan divides.

    Article-comparaison entre des manuels d’histoire de collégiens californiens et texans. C’est révélateur : en apparence, les 2 manuels sont identiques (même éditeur, même auteur), mais les quelques différences (une phrase par ci, par là) révèlent des versions très politisées.

  • Tell Me Everything By Gish Jen
    https://www.nytimes.com/interactive/2020/01/03/opinion/gish-jen-privacy-surveillance.html

    This wasn’t “1984” ; Aunt Nettie wasn’t Big Brother. Indeed, some called her Big Mother. She was congenial, user-friendly, consumer-tested. Aunt Nettie knew you better than you knew yourself. Still, Gwen did not want to go to AskAuntNettie for advice. Never mind that she needed it. She was an 18-year-old pitcher who’d left her boyfriend, her team and her school all in one fell swoop, after all, and though she knew it was solipsistic to feel there could be no greater pain than her own, she’d (...)

    #algorithme #data #profiling #sport

  • Where Even the Children Are Being Tracked
    https://www.nytimes.com/interactive/2019/12/21/opinion/pasadena-smartphone-spying.html

    On Nov. 19, 2016, kids in tow, Margie Homer drove from her home. She pulled into the lot of the Pasadena Waldorf School in Altadena, Calif., at 10:26 a.m. It was a gorgeous, clear morning, and she and hundreds of others walked among the bales of hay and suits of armor decorating the grounds for the annual holiday Elves’ Faire. At 12:49 p.m. she pulled out of the lot, heading back down East Mariposa Street the way she came. All afternoon the city hummed in every direction. Across town, K. (...)

    #algorithme #smartphone #GPS #géolocalisation #conditions #enfants #surveillance

  • Opinion | Twelve Million Phones, One Dataset, Zero Privacy - The New York Times
    https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html

    Every minute of every day, everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times Privacy Project obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles.

    Each piece of information in this file represents the precise location of a single smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers.

    [Related: How to Track President Trump — Read more about the national security risks found in the data.]

    After spending months sifting through the data, tracking the movements of people across the country and speaking with dozens of data companies, technologists, lawyers and academics who study this field, we feel the same sense of alarm. In the cities that the data file covers, it tracks people from nearly every neighborhood and block, whether they live in mobile homes in Alexandria, Va., or luxury towers in Manhattan.

    One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices’ owners to the residences indefinitely.

    If you lived in one of the cities the dataset covers and use apps that share your location — anything from weather apps to local news apps to coupon savers — you could be in there, too.

    If you could see the full trove, you might never use your phone the same way again.

    “The seduction of these consumer products is so powerful that it blinds us to the possibility that there is another way to get the benefits of the technology without the invasion of privacy. But there is,” said William Staples, founding director of the Surveillance Studies Research Center at the University of Kansas. “All the companies collecting this location information act as what I have called Tiny Brothers, using a variety of data sponges to engage in everyday surveillance.”

    In this and subsequent articles we’ll reveal what we’ve found and why it has so shaken us. We’ll ask you to consider the national security risks the existence of this kind of data creates and the specter of what such precise, always-on human tracking might mean in the hands of corporations and the government. We’ll also look at legal and ethical justifications that companies rely on to collect our precise locations and the deceptive techniques they use to lull us into sharing it.

    Today, it’s perfectly legal to collect and sell all this information. In the United States, as in most of the world, no federal law limits what has become a vast and lucrative trade in human tracking. Only internal company policies and the decency of individual employees prevent those with access to the data from, say, stalking an estranged spouse or selling the evening commute of an intelligence officer to a hostile foreign power.

    Companies say the data is shared only with vetted partners. As a society, we’re choosing simply to take their word for that, displaying a blithe faith in corporate beneficence that we don’t extend to far less intrusive yet more heavily regulated industries. Even if these companies are acting with the soundest moral code imaginable, there’s ultimately no foolproof way they can secure the data from falling into the hands of a foreign security service. Closer to home, on a smaller yet no less troubling scale, there are often few protections to stop an individual analyst with access to such data from tracking an ex-lover or a victim of abuse.

    #Surveillance #Géolocalisation #Régulation

  • Opinion | Total Surveillance Is Not What America Signed Up For - The New York Times
    https://www.nytimes.com/interactive/2019/12/21/opinion/location-data-privacy-rights.html

    Un éditorial au vitriol du New York Times. Extraits... mais il faut tout lire tant le raisonnement et la progression du texte sont implacables.

    It is a federal crime to open a piece of junk mail that’s addressed to someone else. Listening to someone else’s phone call without a court order can also be a federal crime.

    The Supreme Court has ruled that the location data served up by mobile phones is also covered by constitutional protections. The government can’t request it without a warrant.

    But the private sector doesn’t need a warrant to get hold of your data. There’s little to prevent companies from tracking the precise movements of hundreds of millions of Americans and selling copies of that dataset to anyone who can pay the price.

    The incongruity between the robust legal regime around legacy methods of privacy invasion and the paucity of regulation around more comprehensive and intrusive modern technologies has come into sharp relief in an investigation into the location data industry by Times Opinion. The investigation, which builds on work last year by The Times’s newsroom, was based on a dataset provided to Times Opinion by sources alarmed by the power of the tracking industry. The largest such file known to have been examined by journalists, it reveals more than 50 billion location pings from the phones of more than 12 million Americans across several major cities.

    That’s not a glitch in the system. It is the system.

    If the government ordered Americans to continuously provide such precise, real-time information about themselves, there would be a revolt. Members of Congress would trample one another to be first in front of the cable news cameras to quote the founders and insist on our rights to be free of such pervasive surveillance.

    Yet, as a society, without ever focusing on this profound choice, we’ve reached a tacit consensus to hand this data over voluntarily, even though we don’t really know who’s getting it or what they’re doing with it. As the close of 2019 approaches, everybody is searching for the meaning of the decade. Here’s a thought: This is the decade — the period since the founding of the App Store, in 2008 — in which we were brainwashed into surveilling ourselves.

    To be clear: The fact that Americans are tracked by the millions is not consumers’ fault. There is no good-faith “opt out” when it comes to smartphone tracking. While there are steps that smartphone users can take to minimize the information gathered about their behavior, Americans who use surveillance devices like smartphones have only the illusion of control when it comes to protecting their privacy.

    Location data collection is only one aspect of a surveillance economy that has sneaked into every corner of modern life. Tech companies have fostered a grass-roots surveillance culture that has convinced millions of Americans that they live better when they buy smart speakers, carry smart phones, watch smart televisions, turn their doorbells into unblinking video cameras.

    If the industry believes that data is a gold mine, Congress ought to force it to adopt practices to treat data in a manner commensurate with its value. That means increased security. It means rules clear and understandable to consumers about how it will be used. It means strict oversight of data collection, with penalties for deceiving consumers. It means further restrictions on collecting and monetizing the data of minors. It also means regulations that allow Americans to see where their data goes.

    But even the notion of personally identifiable information is becoming outdated since, as the Times Opinion investigation shows, so much can now be inferred from supposedly anonymous data.

    So, as Congress considers federal privacy legislation, lawmakers could include measures to prevent the acquisition of location data if such collection isn’t central to the function of the service. For instance, flashlight apps wouldn’t be able to track location. A central principle of the General Data Protection Regulation, which governs privacy across the European Union, is “purpose limitation,” meaning that data collected for one purpose cannot be used for another. The United States lacks such a protection — even California’s new privacy law, which comes into force next year, doesn’t have a purpose limitation provision.

    Though studies show Americans are pleased by the convenience afforded by technological progress, many are either unsure or overwhelmed by the trade-off. If lawmakers don’t act, we risk the further entrenchment of corporate surveillance in our lives.

    It is time for Congress to hold technology and advertising companies accountable and make opting out of tracking a meaningful choice, if not the default setting. In a Capitol split by impeachment, the subject of privacy is a rare point of bipartisan concern, if not consensus.

    The price of participating in modern society cannot be turning our lives into open books, diaries of all travels and relationships and wants and desires to be read and passed along by corporations — corporations that are themselves not monitored or tracked in any meaningful way. Americans need to know how their information is being gathered, and whether it is being used to manipulate them. They deserve the freedom to choose a life without surveillance.

    #Surveillance #Géolocalisation #Régulation

  • Opinion | How Your Phone Betrays Democracy - The New York Times
    https://www.nytimes.com/interactive/2019/12/21/opinion/location-data-democracy-protests.html

    In footage from drones hovering above, the nighttime streets of Hong Kong look almost incandescent, a constellation of tens of thousands of cellphone flashlights, swaying in unison. Each twinkle is a marker of attendance and a plea for freedom. The demonstrators, some clad in masks to thwart the government’s network of facial recognition cameras, find safety in numbers.

    But in addition to the bright lights, each phone is also emitting another beacon in the darkness — one that’s invisible to the human eye. This signal is captured and collected, sometimes many times per minute, not by a drone but by smartphone apps. The signal keeps broadcasting, long after the protesters turn off their camera lights, head to their homes and take off their masks.

    In the United States, and across the world, any protester who brings a phone to a public demonstration is tracked and that person’s presence at the event is duly recorded in commercial datasets. At the same time, political parties are beginning to collect and purchase phone location for voter persuasion.

    “Without question it’s sinister,” said Todd Gitlin, professor of journalism at Columbia University and former president of Students for a Democratic Society, a prominent activist group in the 1960s. “It will chill certain constitutionally permitted expressions. If people know they’ll be tracked, it will certainly make them think twice before linking themselves to a movement.”

    Within minutes, with no special training and a little bit of Google searching, Times Opinion was able to single out and identify individuals at public demonstrations large and small from coast to coast.

    By tracking specific devices, we followed demonstrators from the 2017 Women’s March back to their homes. We were able to identify individuals at the 2017 Inauguration Day Black Bloc protests. It was easy to follow them to their workplaces. In some instances — for example, a February clash between antifascists and far-right supporters of Milo Yiannopolous in Berkeley, Calif. — it took little effort to identify the homes of protesters and then their family members.

    Imagine the following nightmare scenarios: Governments using location data to identify political enemies at major protests. Prosecutors or the police using location information to intimidate criminal defendants into taking plea deals. A rogue employee at an ad-tech location company sharing raw data with a politically motivated group. A megadonor purchasing a location company to help bolster political targeting abilities for his party and using the information to dox protesters. A white supremacist group breaching the insecure servers of a small location startup and learning the home addresses of potential targets.

    Mr. Tsui, at the Chinese University of Hong Kong, argued that there are three current competing visions for the internet built by China, the United States and the European Union. China is moving fast and breaking things, including civil rights. The E.U., with its focus on privacy, is making a moral point around surveillance and consent. And the United States, with its powerful tech companies, is caught in the middle, trying to weigh ethical concerns while still pushing forward on innovation for fear of being left behind by China. If China pushes forward, skirting human rights via technology, and the United States follows, Mr. Tsui argued that America could see an uptick in using surveillance, data and artificial intelligence to manipulate and change behavior and direct outcomes. “I hope we don’t end up there,” he said.

    These are, of course, just the early days. Much of the political manipulation happening now looks no different from serving up a standard political ad at the right moment. The future, however, could get dark quickly. Political candidates rich in location data could combine it with financial information and other personally identifiable details to build deep psychographic profiles designed to manipulate and push voters in unseen directions. Would-be autocrats or despots could leverage this information to misinform or divide voters and keep political enemies from showing up to the polls on election day.

    Then, once in power, they could leverage their troves of data to intimidate activists and squash protests. Those brave enough to rebel might be tracked and followed to their homes. At the very least, their names could be put into registries.

    Public dissent could quickly become too risky a proposition, given that the record of one’s attendance at a rally could be held against them at a later date. Big Data, once the domain of marketers, could become a means to elevate dictators to power and then frustrate attempts to remove them.

    “It’s technologically possible to be anonymous, but it’s hard,” Mr. Tsui told us. “You can only protect privacy with tech right now, and so only those who have money and knowledge can do it. But privacy is not just for the rich or geeks. Privacy is for everyone.”

    The future for the world’s activists may look increasingly like Hong Kong. The leaderless protest movement of the past six months has been made possible by technology. The messageboard LIHKG and encrypted chat apps like Telegram have allowed for the kind of organization that has kept the protests going. But the movement has also been undermined by the very same technology. Protesters and journalists and even law enforcement have been doxxed (had their private information published) by the thousands. A real-time location tracking app used by protesters to identify the positions of law enforcement was taken down by Apple’s App Store — suggesting that governments will have a competitive advantage when it comes to the resource.

    #Géolocalisation #Surveillance #Démocratie

  • Opinion | How to Track President Trump - The New York Times
    https://www.nytimes.com/interactive/2019/12/20/opinion/location-data-national-security.html

    The meticulous movements — down to a few feet — of the president’s entourage were recorded by a smartphone we believe belonged to a Secret Service agent, whose home was also clearly identifiable in the data. Connecting the home to public deeds revealed the person’s name, along with the name of the person’s spouse, exposing even more details about both families. We could also see other stops this person made, apparently more connected with his private life than his public duties. The Secret Service declined to comment on our findings or describe its policies regarding location data.

    The vulnerability of the person we tracked in Mr. Trump’s entourage is one that many if not all of us share: the apps (weather services, maps, perhaps even something as mundane as a coupon saver) collecting and sharing his location on his phone.

    Americans have grown eerily accustomed to being tracked throughout their digital lives. But it’s far from their fault. It’s a result of a system in which data surveillance practices are hidden from consumers and in which much of the collection of information is done without the full knowledge of the device holders.

    As a senior Defense Department official told Times Opinion, even the Pentagon has told employees to expect that their privacy is compromised:

    “We want our people to understand: They should make no assumptions about anonymity. You are not anonymous on this planet at this point in our existence. Everyone is trackable, traceable, discoverable to some degree.”

    We were able to track smartphones in nearly every major government building and facility in Washington. We could follow them back to homes and, ultimately, their owners’ true identities. Even a prominent senator’s national security adviser — someone for whom privacy and security are core to their every working day — was identified and tracked in the data.

    “Tech companies are profiting by spying on Americans — trampling on the right to privacy and risking our national security,” Senator Elizabeth Warren, a Democrat running for president, told us. “They are throwing around their power to undermine our democracy with zero consequences. This report is another alarming case for why we need to break up big tech, adopt serious privacy regulations and hold top executives of these companies personally responsible.”

    Despite the sensitivity of this information, it is put to everyday use. Packaged with millions of other data points, location information is turned into marketing analysis and sold to financial institutions, real estate investors, advertising companies and others. Companies say they vet partners carefully and tend to work with larger players that have a clear business case for receiving the data.

    Like all data, the vast location files are vulnerable to hacks, leaks or sale at any point along that process. The data we reviewed was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so.

    Multiple experts with ties to the United States’ national security agencies warned in interviews that foreign actors like Russia, North Korea, China and other adversaries may be working to steal, buy or otherwise obtain this kind of data. Only months ago, hackers working for the Chinese government allegedly targeted location data for people moving throughout Asia by breaking into telecom networks, according to a report by Reuters.

    “People literally go to work every day, sit down at a desk, check the sports, send an email or two to their girlfriend and then start looking for databases they can steal,” said James Dempsey, the executive director of the Berkeley Center for Law and Technology. “They just do that 9 to 5, every day.”

    The American government may conduct similar intelligence operations against its adversaries, experts said, though under stricter legal frameworks.

    he possibilities for blackmail are endless. Once stolen, details on sexual interests and extramarital affairs can provide opportunities for extortion. Targets could be coerced in ways large and small, compelled to make decisions or take actions for a foreign government. Or the locations themselves could provide valuable intelligence about security practices, contacts, schedules and the identities of people in prominent and sensitive posts, with access to state secrets or critical infrastructure.

    With no training and far more limited technical tools than those of a state intelligence service, we were able to use the location data — date, time and length of stay — to make basic inferences. By determining whether two people were in the same place at the same time, it was easy to zero in on spouses, co-workers or friends. Cataloguing their movements revealed even more associations, creating the map of a robust social network that would be nearly impossible to determine through traditional surveillance. In cases where it was difficult to identify an individual, associations offered more clues about workplaces and interests.

    Even just commuting to work can be risky for people in prominent positions. “The easiest way to figure out how to get to you is know you always have the same routine,” said Mr. Rasser, the former Central Intelligence Agency officer. He said he mixes up his own routine, partly because the C.I.A. emphasized such methods when he joined.

    Even areas once thought to be secure showed up in the data. Personal phones aren’t generally allowed inside the C.I.A. or the National Security Agency. But while no pings registered inside the C.I.A. headquarters, we found thousands of pings in the parking lots outside, with trails that led to the homes of likely employees.

    Agencies with a need for heightened security are left in a vulnerable position. Phones are ubiquitous, and so long as granular location tracking remains legal, even the Defense Department must play along. “We cannot stop our workforce of 3.6 million people from living their everyday lives,” a senior department official told us.

    Leaked location data may open the door to other cyber vulnerabilities. Foreign actors could learn movement details and infer meeting locations, which could be used to conduct a type of scam where targets receive fake emails — posing as a friend you just met with or a business you just visited — including a phony link meant to steal your password or install malware.

    “Location tracking data of individuals can be used to facilitate reconnaissance, recruitment, social engineering, extortion and in worst-case scenarios, things like kidnapping and assassination,” warned Kelli Vanderlee, manager of intelligence analysis at the cybersecurity company FireEye.

    Those are not theoretical threats. The phone of the Washington Post journalist Jamal Khashoggi, who was assassinated in 2018, was allegedly compromised, possibly allowing his location data to be used to follow him.

    Last year, Strava, a company that makes a fitness app, released a global map showing 700 million activities that clearly revealed American military bases abroad. The Department of Defense issued its recent guidance after discovering the problem. The data reviewed by Times Opinion revealed several points on domestic military bases as well, showing how some of the nation’s most secure armed sites can be exposed.

    The sources who provided the trove of location information to Times Opinion did so to press for regulation and increased scrutiny of the location data market. Some solutions exist that could help improve privacy while ensuring businesses can still perform some of the analysis they do today, like limiting the ability to identify individual paths, changing how long the information is stored and limiting how it’s sold.

    So far, Washington has done virtually nothing to address the threats, and location data companies have every reason to keep refining their tracking, sucking up more data and selling it to the highest bidders.

    #Géolocalisation #Sécurité #Surveillance #Démocratie_en_danger

  • Opinion | Twelve Million Phones, One Dataset, Zero Privacy - The New York Times
    https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html

    very minute of every day, everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times Privacy Project obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles.

    Each piece of information in this file represents the precise location of a single smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers.

    If you lived in one of the cities the dataset covers and use apps that share your location — anything from weather apps to local news apps to coupon savers — you could be in there, too.

    If you could see the full trove, you might never use your phone the same way again.

    The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid.

    It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies.

    Today, it’s perfectly legal to collect and sell all this information. In the United States, as in most of the world, no federal law limits what has become a vast and lucrative trade in human tracking.

    he companies that collect all this information on your movements justify their business on the basis of three claims: People consent to be tracked, the data is anonymous and the data is secure.

    None of those claims hold up, based on the file we’ve obtained and our review of company practices.

    Yes, the location data contains billions of data points with no identifiable information like names or email addresses. But it’s child’s play to connect real names to the dots that appear on the maps.

    n most cases, ascertaining a home location and an office location was enough to identify a person. Consider your daily commute: Would any other smartphone travel directly between your house and your office every day?

    Describing location data as anonymous is “a completely false claim” that has been debunked in multiple studies, Paul Ohm, a law professor and privacy researcher at the Georgetown University Law Center, told us. “Really precise, longitudinal geolocation information is absolutely impossible to anonymize.”

    “D.N.A.,” he added, “is probably the only thing that’s harder to anonymize than precise geolocation information.”

    Yet companies continue to claim that the data are anonymous. In marketing materials and at trade conferences, anonymity is a major selling point — key to allaying concerns over such invasive monitoring.

    The data set is large enough that it surely points to scandal and crime but our purpose wasn’t to dig up dirt. We wanted to document the risk of underregulated surveillance.

    Watching dots move across a map sometimes revealed hints of faltering marriages, evidence of drug addiction, records of visits to psychological facilities.

    Connecting a sanitized ping to an actual human in time and place could feel like reading someone else’s diary.

    Like many people we identified in the data, Ms. Millben said she was careful about limiting how she shared her location. Yet like many of them, she also couldn’t name the app that might have collected it. Our privacy is only as secure as the least secure app on our device.

    The inauguration weekend yielded a trove of personal stories and experiences: elite attendees at presidential ceremonies, religious observers at church services, supporters assembling across the National Mall — all surveilled and recorded permanently in rigorous detail.

    Protesters were tracked just as rigorously. After the pings of Trump supporters, basking in victory, vanished from the National Mall on Friday evening, they were replaced hours later by those of participants in the Women’s March, as a crowd of nearly half a million descended on the capital. Examining just a photo from the event, you might be hard-pressed to tie a face to a name. But in our data, pings at the protest connected to clear trails through the data, documenting the lives of protesters in the months before and after the protest, including where they lived and worked.

    Inauguration Day weekend was marked by other protests — and riots. Hundreds of protesters, some in black hoods and masks, gathered north of the National Mall that Friday, eventually setting fire to a limousine near Franklin Square. The data documented those rioters, too. Filtering the data to that precise time and location led us to the doorsteps of some who were there. Police were present as well, many with faces obscured by riot gear. The data led us to the homes of at least two police officers who had been at the scene.

    As revealing as our searches of Washington were, we were relying on just one slice of data, sourced from one company, focused on one city, covering less than one year. Location data companies collect orders of magnitude more information every day than the totality of what Times Opinion received.

    The companies are required to disclose very little about their data collection. By law, companies need only describe their practices in their privacy policies, which tend to be dense legal documents that few people read and even fewer can truly understand.

    We’re constantly shedding data, for example, by surfing the internet or making credit card purchases. But location data is different. Our precise locations are used fleetingly in the moment for a targeted ad or notification, but then repurposed indefinitely for much more profitable ends, like tying your purchases to billboard ads you drove past on the freeway. Many apps that use your location, like weather services, work perfectly well without your precise location — but collecting your location feeds a lucrative secondary business of analyzing, licensing and transferring that information to third parties.

    For many Americans, the only real risk they face from having their information exposed would be embarrassment or inconvenience. But for others, like survivors of abuse, the risks could be substantial. And who can say what practices or relationships any given individual might want to keep private, to withhold from friends, family, employers or the government? We found hundreds of pings in mosques and churches, abortion clinics, queer spaces and other sensitive areas.

    Large data companies like Foursquare — perhaps the most familiar name in the location data business — say they don’t sell detailed location data like the kind reviewed for this story but rather use it to inform analysis, such as measuring whether you entered a store after seeing an ad on your mobile phone.

    But a number of companies do sell the detailed data. Buyers are typically data brokers and advertising companies. But some of them have little to do with consumer advertising, including financial institutions, geospatial analysis companies and real estate investment firms that can process and analyze such large quantities of information. They might pay more than $1 million for a tranche of data, according to a former location data company employee who agreed to speak anonymously.

    f this information is so sensitive, why is it collected in the first place?

    For brands, following someone’s precise movements is key to understanding the “customer journey” — every step of the process from seeing an ad to buying a product. It’s the Holy Grail of advertising, one marketer said, the complete picture that connects all of our interests and online activity with our real-world actions.

    For individual consumers, the value of constant tracking is less tangible. And the lack of transparency from the advertising and tech industries raises still more concerns.

    Does a coupon app need to sell second-by-second location data to other companies to be profitable? Does that really justify allowing companies to track millions and potentially expose our private lives?

    Data companies say users consent to tracking when they agree to share their location. But those consent screens rarely make clear how the data is being packaged and sold. If companies were clearer about what they were doing with the data, would anyone agree to share it?

    #Surveillance #Géolocation #Vie_privée #Démocratie

  • Smartphones Are Spies. Here’s Whom They Report To.
    https://www.nytimes.com/interactive/2019/12/20/opinion/location-tracking-smartphone-marketing.html

    OUR SMARTPHONE is probably sending your precise location to companies right now. Their job is to turn your shopping trip or doctor’s visit into “Big Data” — another term for corporate intelligence. So far, the companies and individuals profiting from your everyday movements have mostly evaded scrutiny. As Times Opinion continues reporting on a giant trove of mobile phone location data, the companies and people profiting from the privacy invasion are coming into focus. So who, exactly, is (...)

    #Google #Facebook #Foursquare #GoogleMaps #Bluetooth #smartphone #GPS #géolocalisation #BigData #data #algorithme #marketing #profiling (...)

    ##publicité

  • Freaked Out ? 3 Steps to Protect Your Phone
    https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-privacy-tips.html

    YOUR SMARTPHONE is one of the world’s most advanced surveillance tools. This week, Times Opinion is reporting on a huge trove of location data showing the precise location movements for millions of Americans. Once your location is shared with the companies, there’s no way to delete that information or get it back. Your best bet is to avoid sharing your location in the first place — at least until the government bestirs itself to begin regulating how that information is collected, used and (...)

    #smartphone #GPS #géolocalisation #BigData #data #écoutes #publicité #profiling

    ##publicité

  • How to Track President Trump
    https://www.nytimes.com/interactive/2019/12/20/opinion/location-data-national-security.html

    IF YOU OWN A MOBILE PHONE, its every move is logged and tracked by dozens of companies. No one is beyond the reach of this constant digital surveillance. Not even the president of the United States. The Times Privacy Project obtained a dataset with more than 50 billion location pings from the phones of more than 12 million people in this country. It was a random sample from 2016 and 2017, but it took only minutes — with assistance from publicly available information — for us to deanonymize (...)

    #CIA #FBI #algorithme #smartphone #GPS #géolocalisation #écoutes #surveillance #data #hacking #USDepartmentofDefense-DoD (...)

    ##USDepartmentofHomelandSecurity-DHS

  • Scary reminder of smartphone tracking, revealing home addresses of people at the Pentagon, or whoever visited Arnold Schwarzenegger or Tiger Woods + a lot more. Great investigation and a good reminder to check privacy settings on apps.

    https://seenthis.net/messages/816770
    Opinion | Twelve Million Phones, One Dataset, Zero Privacy - The New York Times
    https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html

    Every minute of every day, everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times Privacy Project obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles.

    Each piece of information in this file represents the precise location of a single smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers.

    After spending months sifting through the data, tracking the movements of people across the country and speaking with dozens of data companies, technologists, lawyers and academics who study this field, we feel the same sense of alarm. In the cities that the data file covers, it tracks people from nearly every neighborhood and block, whether they live in mobile homes in Alexandria, Va., or luxury towers in Manhattan.

    One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices’ own

  • Twelve Million Phones, One Dataset, Zero Privacy
    https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html

    What we learned from the spy in your pocket. These are the actual locations for millions of Americans. At the New York Stock Exchange … VERY MINUTE OF EVERY DAY, everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times Privacy Project obtained one such file, by far the largest and most sensitive ever to be reviewed by (...)

    #algorithme #smartphone #GPS #géolocalisation #data #écoutes #surveillance

  • Video Games and Online Chats Are ‘Hunting Grounds’ for Sexual Predators - The New York Times
    https://www.nytimes.com/interactive/2019/12/07/us/video-games-child-sex-abuse.html?nl=todaysheadlines&emc=edit_th_191208?camp

    Six years ago, a little over 50 reports of the crimes, commonly known as “sextortion,” were referred to the federally designated clearinghouse in suburban Washington that tracks online child sexual abuse. Last year, the center received over 1,500. And the authorities believe that the vast majority of sextortion cases are never reported.

    There has been some success in catching perpetrators. In May, a California man was sentenced to 14 years in prison for coercing an 11-year-old girl “into producing child pornography” after meeting her through the online game Clash of Clans. A man in suburban Seattle got a 15-year sentence in 2015 for soliciting explicit imagery from three boys after posing as a teenager while playing Minecraft and League of Legends. An Illinois man received a 15-year sentence in 2017 after threatening to rape two boys in Massachusetts — adding that he would kill one of them — whom he had met over Xbox Live.

    “The first threat is, ‘If you don’t do it, I’m going to post on social media, and by the way, I’ve got a list of your family members and I’m going to send it all to them,’” said Matt Wright, a special agent with the Department of Homeland Security. “If they don’t send another picture, they’ll say: ‘Here’s your address — I know where you live. I’m going to come kill your family.’”

    The trauma can be overwhelming for the young victims. An F.B.I. study reviewing a sample of sextortion cases found that more than a quarter of them led to suicide or attempted suicide. In 2016, a Justice Department report identified sextortion as “by far the most significantly growing threat to children.”

    It makes sense the gaming world is where many predators would go: It’s where the children are. Almost every single teenage boy in America — 97 percent — plays video games, while about 83 percent of girls do, according to the Pew Research Center.

    One platform frequently used by predators is the video chat site Omegle — users need look no further than the site’s home page to find that out. “Predators have been known to use Omegle, so please be careful,” the site advises under a banner that exclaims, “Talk to strangers!” Omegle did not respond to requests for comment.

    This fall, the F.B.I. rolled out an awareness campaign in middle and high schools to encourage children to seek help when caught in an exploitive sexual situation. “Even if you accepted money or a game credit or something else, you are not the one who is in trouble,” material from the campaign explains.

    The authorities did it again, this time in Bergen County, a suburb close to New York City. They made 17 arrests. And they did it once more, in Somerset County, toward the center of the state, arresting 19. One defendant was sentenced to prison, while the other cases are still being prosecuted.

    After the sting, the officials hoped to uncover a pattern that could help in future investigations. But they found none — those arrested came from all walks of life. Among them were a police officer, a teacher, a minister, a nurse, a bank manager, a mechanic, a waiter, a dental hygienist, a college student and a deliveryman.

    “It cuts across all social and racial lines, across class lines — it cuts across every line,” Ms. Hoffman said. “There is no profile.”

    When announcing the arrests, the authorities highlighted Fortnite, Minecraft and Roblox as platforms where suspects began conversations before moving to chat apps. Nearly all those arrested had made arrangements to meet in person.

    In a separate case in Ohio, the digital abuse of a young boy led to his physical abuse. The offender, Jason Gmoser, would encourage boys to show their genitals while on PlayStation, according to court records. Mr. Gmoser, who was found with over 500 videos recorded while gaming with boys, often offered gift cards that could be used on the network.

    He told detectives in 2014 that he spent years interacting with an 8-year-old who had appeared in several of the videos, including one in which the boy exposed himself and said he would “do anything” for a $20 gift card.

    There are a few seemingly simple protections against online predators, but logistics, gaming culture and financial concerns present obstacles.

    Companies could require identification and parental approvals to ensure games are played by people of the same age. But even as some platforms have experimented with programs like Real ID, a verification effort, gamers have resisted giving up anonymity.

    “There’s been community-layer rejection of those systems because people like to be able to be anybody,” said Todd Harris, who co-founded Hi-Rez, a game development studio based in Atlanta.

    While Facebook has algorithms that can detect some text-based grooming, many gamers use audio and video chat. And eliminating audio and video interactions would be a death sentence for a gaming company fighting for customers. “You can’t seriously compete without talking,” Mr. Harris said. “The team with the best communication will win.”

    Instagram, owned by Facebook, does not have the same restrictions. Until this past week, it had allowed users to send private messages to anyone, and a Times reporter was able to contact and video-chat with a 13-year-old girl who had a private account (the girl and her parents gave permission to conduct the test). After The Times asked about the policy, Instagram announced new features on Wednesday that allow users to block messages from people they do not follow. The company said it would also require users to enter their age when signing up.

    #Cyberharcèlement #Sextorsion #Prédateurs

  • The Who’s Pete Townshend on Rock’s Legacy, and His Own Dark Past - The New York Times
    https://www.nytimes.com/interactive/2019/11/25/magazine/pete-townshend-the-who-interview.html?action=click&module=Editors%20Picks&p

    But what is rock? Rock is hip-hop. Rock is probably Taylor Swift. Rock is, dare I say it, Adele and Ed Sheeran. They’ve dared to take on that mantle, and they have to deliver. They’ve got to do something spectacular as performers. Not just as recording artists. They’ve got to do something amazing, and if it includes dancers, if it includes too much video, then they’re cheating. They know that, we know that and the audiences know that. That’s why audiences will come to something like a Who concert or a Stones concert, where there might be some video, there might be a symphony orchestra, but at the end of the day it’s about: “Can you dance for two and a half hours without dropping dead? Can you sing without lip syncing for two and a half hours?” It’s about sport. It’s about entertainment as a physicality. It’s about an endurance test.

  • ‘Absolutely No Mercy’: Leaked Files Expose How China Organized Mass Detentions of Muslims - The New York Times
    https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html

    More than 400 pages of internal Chinese documents provide an unprecedented inside look at the crackdown on ethnic minorities in the Xinjiang region.