Police can obtain huge quantities of social network data, but must sort out the junk to glean useful information.
“The general number of law enforcement requests of e-mail and social network data has gone up by a wide margin,” resulting in huge stored databases held by police agencies, says Hanni Fakhoury, a staff attorney at the Electronic Frontier Foundation in San Francisco.
In the case of Google, such requests are rising rapidly. In the last six months of 2012, for example, Google reported receiving about 8,400 requests for user data, up from about 6,300 in the last six months of 2011. The company reports these data here.
While security camera footage and public appeals seem to have quickly led to the identification of the suspects, brothers Tamerlan and Dzhokhor Tsarnaev, immigrants of Chechnyan heritage, ”it will be interesting to see how the prevalence of electronic evidence and data all around us on the Web makes it possible for the police to solve all aspects of this crime,” Fakhoury says.
Searches of e-mails are governed by a 1986 law called the Stored Communications Act, which technically allows police access to e-mails older than 180 days without a formal search warrant. Getting a search warrant would require a judicial finding of probable cause that the defendant committed a crime. In order to access messages more than 180 days old, investigators need only a court-issued document similar to a subpoena that says the information is relevant to a criminal investigation.
“Congress assumed if you left things on the server for six months, you’d abandoned it,” Fakhoury says. However, major providers of Web communications services like Google and Facebook won’t release data without a search warrant, he says. Some data—such as the user’s IP address, and date the e-mail account was created—won’t be released without such a warrant. But, of course, other data such tweets and some Facebook posts are publicly available.
As soon as the names surfaced, police would have gone to court to obtain search warrants. The authorities would turn to any number of software tools to sort through huge quantities of data, and visualize links between suspects, locations, and other points of reference.
One such tool is the Sentinel Visualizer from a Virginia company called FMS Advanced Systems Group. “A lot of police departments have thousands, if not tens or hundreds of thousands, of telephone call records. It’s impossible to look at that data and see who is calling whom,” says Dan Wasser, the director of business development at the company, which he said is not involved in the current investigation.
“Let’s say the police have been gathering data for weeks, months, years,” Wasser says. “Now they have the name of these Chechen brothers. Those names may pop up in the records from past databases of phone calls, transactions, and other data they may have collected over the years.”
Some traces of social networking activity have already surfaced. A YouTube profile created last year in the name of the elder suspect, Tamerlan Tsarnav, features videos about terrorism, but verifying that he created it might pose a challenge.
http://www.technologyreview.com/news/513956/building-a-picture-of-the-bomb-suspects-through-social-network-analysis
No comments:
Post a Comment