Location Data Company Aids Law Enforcement in Monitoring Suspects’ Trips to Healthcare Facilities

Location Data Company Aids Law Enforcement in Monitoring Suspects' Trips to Healthcare Facilities

Location Data Company Aids Law Enforcement in Monitoring Suspects’ Trips to Healthcare Facilities


### How Fog Data Science Assists Law Enforcement in Tracking Suspects via Location Information

In a time when data is often termed the “new oil,” the application of location information for law enforcement has stirred controversy. A recent story by **404 Media** reveals how **Fog Data Science**, a firm focused on location intelligence, aids police agencies in tracking suspects by utilizing smartphone geolocation data. The report brings forth notable concerns regarding privacy, civil liberties, and the ethical ramifications of such surveillance activities.

#### What is Fog Data Science?

Fog Data Science is a private entity that presents itself as a supplier of actionable intelligence for law enforcement and national security organizations. The firm runs a service called **Fog Reveal**, which permits police to tap into an extensive database of geolocation information amassed from smartphones. This data is acquired from commonly used mobile applications that monitor users’ locations, frequently for advertising reasons. Fog Data Science procures this data from brokers and structures it into a searchable format, granting law enforcement the capacity to trace people’s movements over periods.

The **Electronic Frontier Foundation (EFF)** reports that Fog Reveal has access to billions of data points from about 250 million devices in the United States. This information originates from numerous mobile apps, including weather and fitness applications, which usually incorporate location tracking components.

#### The Importance of the “Project Intake Form”

An essential feature of Fog Data Science’s cooperation with law enforcement is its **Project Intake Form**, which was recently disclosed to the public. This document is utilized by police to input specific information about suspects, such as their names, aliases, and affiliations with criminal activity. The form also instructs officers to enumerate locations where the suspect might be found, including doctors’ offices, legal offices, friends’ and family members’ residences, and workplaces. These specifics assist Fog Data in fine-tuning its searches and delivering more relevant results.

The form emphasizes the significance of “known locations” in tracking suspects, even in the absence of exact times and dates. It notes that a suspect’s patterns of behavior—like visits to gyms, cafés, or places of worship—can be particularly advantageous. Law enforcement personnel are encouraged to provide either street addresses or geographic coordinates to enhance the search process.

#### How the Data is Utilized

Fog Data Science’s repository allows law enforcement agencies to perform geofencing searches, which entail establishing virtual boundaries around particular locations to detect all devices that were located in the vicinity during specified time frames. This ability can be leveraged to monitor suspects’ movements, recognize trends, and even produce leads in criminal inquiries.

For instance, police could deploy Fog Reveal to observe the vicinity surrounding a crime scene, an abortion clinic, or a demonstration site. By examining the data, they can pinpoint devices that were physically there and potentially connect them to individuals of interest. This raises alarms regarding the possible misapplication of such technology, especially in sensitive situations concerning reproductive rights, religious beliefs, or political demonstrations.

#### Privacy Issues and Ethical Considerations

The utilization of location data by law enforcement has ignited widespread discussions about privacy and civil liberties. Detractors contend that services like Fog Reveal facilitate expansive surveillance without appropriate regulatory oversight. Unlike traditional methods for retrieving location data—such as safeguarding a warrant from a judge—Fog Data Science allows police to sidestep these legal protections by acquiring data directly from brokers.

The **Federal Trade Commission (FTC)** has also expressed apprehensions regarding the actions of data brokers like **Venntel**, a firm that supplies data to Fog Data Science. In a recent resolution, the FTC charged Venntel and its parent organization, **Gravy Analytics**, with infringing upon consumer privacy by selling sensitive location information without acquiring appropriate consent. If finalized, the settlement would restrict these companies from marketing or utilizing sensitive location data in their offerings.

#### Risks of Misuse

An especially concerning element of location tracking technology is its potential for misuse. Critics have cautioned that geofencing tools could be weaponized against individuals pursuing abortions in states where the procedure faces restrictions. By monitoring the vicinity of abortion clinics, law enforcement could pinpoint and target those who frequent these establishments.

Likewise, the application of location data to monitor attendance at religious gatherings, protests, or union assemblies could impose a chilling effect on free expression and assembly. The absence of transparency and oversight in how this data is handled intensifies these worries.

#### Advocacy for Regulation

The exposure of Fog Data Science and similar entities has prompted renewed demands for tighter regulation in the data brokerage sector. Privacy champions assert that individuals should have heightened authority regarding how their location data is amassed, shared, and utilized. They underscore the necessity for legal protections to avert the misuse of such data by law enforcement and other organizations.

The FTC’s recent initiatives against Gravy Analytics and Venntel mark progress, yet more extensive measures may be essential to tackle the broader challenges at hand. This includes establishing federal privacy laws that delineate explicit standards for data acquisition and usage, as well as assuring that