The LAPD Is Using Controversial Mass Surveillance Tracking Software

bnew

Veteran
Joined
Nov 1, 2015
Messages
57,337
Reputation
8,496
Daps
160,017

The LAPD Is Using Controversial Mass Surveillance Tracking Software​

Cobwebs Technologies' WebLoc software allows police to track individuals using geolocation signals displayed on a map interface.

By Jules Roscoe
November 29, 2023, 2:17pm


1701285415065-gettyimages-1246615505.jpeg

IMAGE CREDIT: GINA FERAZZI / CONTRIBUTOR VIA GETTY IMAGES

The LAPD has purchased controversial mass surveillance software that allows police to track individuals using geolocation data.

The company that provides the software, called WebLoc, is Cobwebs Technologies. The Israeli company was founded by three IDF veterans in 2015 and has previously sold contracts to the IRS and the Texas State Police. Each contract costs around $200,000 per year.

The LAPD's contract with Cobwebs Technology was revealed in a report from Knock LA, which obtained documents via freedom of information requests. According to the outlet, the LAPD contracted with the Israeli firm in October 2022 and plans to use its technology for a full year before auditing its use and compiling a report.

Cobwebs’ system has two main platforms. The first is Tangles, which the company previously described in a now-deleted press release as a web intelligence platform that allows users to search the open web, social media, dark web, and deep web. Tangles can be AI-enabled with “image recognition, face recognition, OCR [optical character recognition] capabilities, NLP [natural language processing] and more,” the press release stated.

The second is WebLoc, which another now-deleted webpage on Cobwebs’ site described as a location intelligence system. WebLoc “provides access to vast amounts of location-based data in any specified geographic location.” This allows users—law enforcement, in the case of the Texas State Police or the LAPD—to track individuals’ geolocation data. WebLoc offers “deep analysis of geofences and threat actors, location history and detailed data discovery,” as well as “live data updates” and “real-time alerts” about changes in an individual’s location.

According to Cobwebs' website copy, WebLoc “compiles and enriches different types of large datasets of location-based data points, to be used for deep geolocation analysis. The information is displayed “on a simple and map-centric interface which allows users to conduct a map-based and visual investigation, integrated with our industry-leading web intelligence solution.”

Previous reporting has indicated that WebLoc’s vast troves of information were likely obtained from mobile data brokers, companies that gather information on an individual’s online footprint to be sold to businesses, often for advertising purposes. The use of information from data brokers has allowed law enforcement to bypass the requirement to obtain a warrant.

The Intercept reported that the Texas State Police’s contract with Cobwebs referenced an individual’s “ad ID,” the string of text used to track all online activity of a particular mobile device, as a main source of information. Knock LA reported that a U.S. Navy bid request for WebLoc listed a person's device type, gender, age, interests, geolocated IP address, and mobile advertising IDs as available information to “enhance target identification and tracking.”

WebLoc and Tangles are no longer described anywhere on Cobwebs’ site, nor is there any public information about them listed on the LAPD website. Cobwebs has since joined data analysis firm Penlink, which also does not list information about WebLoc on its site.

The Brennan Center for Justice published a series of communications between the LAPD and Cobwebs dated between 2019 and 2020, including a quote for the company’s WEBINT Gold program, which includes both Tangles and WebLoc functionality. The communications reference a document supposedly containing more information about WebLoc, but this document was not made publicly available.

The U.S. Constitution’s Fourth Amendment protects citizens from unreasonable searches and seizures, and sets warrant requirements for law enforcement. However, multiple court cases have proposed an exception to these requirements with regards to foreign surveillance and national security. The communications published by the Brennan Center suggest that the LAPD initially could not afford the subscription price, but that it planned to obtain the necessary funding through a grant from the Department of Homeland Security dedicated to increasing urban security.

The LAPD’s public information office told Motherboard in an emailed statement, “The Los Angeles Police Department utilizes the Cobwebs Technologies platform to consolidate open-source, publicly available information and commercially available anonymized data in relation to criminal investigations. These investigations include serious felony crimes (i.e., murders, robberies, etc.), along with threats to public safety (i.e., mass shootings) and critical infrastructure.”

“Cobwebs Technologies greatly aids the LAPD in these investigations and acts as a force multiplier in the processing of this pertinent and lawfully obtained data,” the LAPD statement continued. “This technology is extremely limited in its deployment and usage. The LAPD has implemented an oversight, audit and review process with its usage of the Cobwebs Technologies platform.”

Cobwebs and PenLink did not respond to requests for comment.

Update: This article has been updated with comment from the LAPD.
 

null

...
Joined
Nov 12, 2014
Messages
29,351
Reputation
4,925
Daps
46,515
Reppin
UK, DE, GY, DMV
In laymen’s terms, smart phone access?

the data is supposed to be anonymous but still accurate.

the problem is that it's possible to figure out who people are without privileged access to their device.

"In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.

The Pillar says it obtained 24 months' worth of “commercially available records of app signal data” covering portions of 2018, 2019, and 2020, which included records of Grindr usage and locations where the app was used. The publication zeroed in on addresses where Burrill was known to frequent and singled out a device identifier that appeared at those locations. Key locations included Burrill's office at the USCCB, his USCCB-owned residence, and USCCB meetings and events in other cities where he was in attendance. The analysis also looked at other locations farther afield, including his family lake house, his family members’ residences, and an apartment in his Wisconsin hometown where he reportedly has lived.

The de-anonymized data revealed that a mobile device that appeared at those locations—likely Burrill’s phone, The Pillar says—used Grindr almost daily. It also says that data “correlated” with the priest’s phone suggests that he visited gay bars, including while traveling for work. The Pillar presented this information to the USCCB in advance of publication, and yesterday, the conference announced Burrill’s resignation."


to help them they have companies like palantir



and technologies like this (which circumvent locaiton privacy)



and then imagine what will happen when they unleash future quantum AI computers on these data sets.



it will be like DNA testing for historic crimes on steroids ...

:hubie:

unleash facial recognition software on something like onlyfans

:picard:

and we are sleep walking right into it
 

TRUEST

Superstar
Joined
May 17, 2012
Messages
14,433
Reputation
2,694
Daps
54,953
Reppin
NULL
This is easy to fight against. An app can be created to deal with this several ways. block external transmission. Generate false data and have that sent out. If unable to initiate a block of a transmission generate several notifications to the user letting them know there’s been a fucckboy activity detected. Immediately turn off ur phone or burn it and get a new one. So long as the phones allow you to install apps on your phone, this can be dealt with.
 

null

...
Joined
Nov 12, 2014
Messages
29,351
Reputation
4,925
Daps
46,515
Reppin
UK, DE, GY, DMV
This is easy to fight against. An app can be created to deal with this several ways. block external transmission. Generate false data and have that sent out. If unable to initiate a block of a transmission generate several notifications to the user letting them know there’s been a fucckboy activity detected. Immediately turn off ur phone or burn it and get a new one. So long as the phones allow you to install apps on your phone, this can be dealt with.

lower OS layers can ignore the app layer (and tell your app whatever they want) thereby spoofing that messages are not being sent while sending them or storing them for later dispatch.

the locations of your transmissions are being recorded i.e. physics not the content of your messages (which should be mostly end to end encrypted).

turning your phone off might not even work https://www.washingtonpost.com/worl...c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html .

only hardware switches to turn disable phone interfaces will do it but even then software can store and send later. you need hardware plus clean open source software.

pure phones and degoogled phones are some projects trying to do these things but they don't have the backing.

tor tries to re-anonymises everyone by de-distinguishing activity and on the hardware side we could do the same if people kept switching phones/accounts with other people.

like how if we here all shared accounts and used a different account to post each time.

by providers forcing us to build single distinct online identities to use their products they inherently make us trackable.

-

add to the above cookies, 3rd party cookies (/more recently device ID), ultrasound beacons which enable tracking.



in the USA companies can buy credit card usage records. probably anonymised but ...

 
Top