US Customs and Border Protection Admits to Using Ad Data for Phone Tracking

Technology Source: www.wired.com

Iran is currently experiencing a nationwide internet shutdown, limiting access to only the regime-controlled intranet. This has created significant challenges for humanitarian workers, journalists, and others trying to communicate within and outside the country. Amid this digital blackout, a hacked prayer app reportedly sent messages urging Iranians to "surrender" and promising "help is on the way." Concurrently, GPS jamming and physical threats are increasing in the Strait of Hormuz, posing risks to shipping vessels. Hacking of security cameras has become a tactic in warfare, and missile-intercept systems in the Middle East are under severe strain, with some being destroyed in attacks.

In the United States, former Department of Homeland Security Secretary Kristi Noem was dismissed, marking the end of a tenure characterized by stringent anti-immigration policies and incidents involving ICE and CBP resulting in the deaths of two protesters. Additionally, a sophisticated iPhone hacking toolkit, initially developed for the US government, has reportedly fallen into the hands of other nations and scammers, potentially affecting tens of thousands of phones. Some US lawmakers are advocating for an investigation into this security threat.

In a significant revelation, the United States Customs and Border Protection (CBP) has acknowledged purchasing phone location data from the online advertising industry. This admission was made in a Privacy Threshold Analysis document obtained by 404 Media through a Freedom of Information Act request. The document pertains to a trial conducted by CBP between 2019 and 2021, where data from real-time bidding processes was acquired. This data, often collected during online ad auctions, includes phone identifying details and location information, which can be used to track individuals' movements. Although CBP did not comment on whether it continues to purchase such data, it is reported that ICE plans to access a system called Webloc for monitoring mobile phone movements across neighborhoods.

In another development, court documents revealed that the FBI identified a protester in Atlanta with the help of Swiss encrypted email service Proton Mail. The identification was made possible after Swiss authorities, under a Mutual Legal Assistance Treaty (MLAT), provided payment information linked to a Proton email address to US law enforcement. This incident highlights the distinction between privacy and anonymity, as encrypted services may still provide customer information under legal obligations.

Meanwhile, the FBI is investigating a cybersecurity incident involving its network segment that handles wiretaps and surveillance warrants. Although details are scarce, the incident has prompted a response from senior FBI and Justice Department officials. This situation evokes memories of past breaches, such as the 2024 intrusions by China's Salt Typhoon hacker group.

In a multinational operation, the FBI, Europol, and European law enforcement dismantled Leakbase, a cybercrime forum with 142,000 members. The operation resulted in 13 arrests and the seizure of the site's infrastructure. Leakbase was known for distributing stolen data and user credentials.

Lastly, contractors working for Meta have reported reviewing sensitive footage from the company's AI-powered smart glasses. This footage includes videos of users in private settings, such as bathrooms and during intimate moments. The recordings are used to train Meta's AI systems, but many users seem unaware that human reviewers, not just AI, can access their content. This issue was reported by Swedish newspapers after interviewing workers involved in annotating the footage.

Read original article →

Related Articles