Hacker News new | past | comments | ask | show | jobs | submit login
Feds ordered Google location dragnet to solve Wisconsin bank robbery (theverge.com)
204 points by heshiebee on Aug 28, 2019 | hide | past | favorite | 155 comments



Wonder if someone suspected Feds would do this, they could ask their accomplice to take their phone and walk around with it in a different part of town. They would then have a alibi and be discarded as a potential suspect.


GPS spoofers already exist, so why not a GPS mirroring app. Keep your phone on, but have it reporting the location of your friend's phone. Or maybe a history based AI synthesis of where you supposedly went. The problem is going to be that you supposedly drove down the 405 but none of the scanners saw your car.

(Edit: That and Google wouldn't agree with T-Mobile on your location. Oh well.)


GPS and carrier triangulation will be inconsistent which will be a big red flag, if anyone notices.


Strap your phone to a drone and let it fly around in walking speed so where remote.


... for 20-30 minutes. Plus this requires accomplice, which can already take the phone for a walk (with cap, glasses and generic body-covering clothing to fail facial recognition)


Leave in the backseat of a taxi


> The problem is going to be that you supposedly drove down the 405 but none of the scanners saw your car.

Does it have to be your car?


It is interesting how people think in the context of their own lifes, I highly suspect that 13of40 is American, where you can't live a functioning life without a car.


Half the people in New York City don't own a car.

https://www.nycedc.com/blog-entry/new-yorkers-and-their-cars


A rare exception doesn’t change or invalidate the norm.


For the sake of our European friends, I'm perfectly willing to say, "...you supposedly took the metro, but none of the scanners saw your face."


FYI massively scanning and recording faces this way in a public place is not ok in most of Europe. Recording the raw security footage sure, but no deeper processing.


Not even raw security footage, that includes for private individuals.

https://www.dataprotection.ie/en/guidance-landing/guidance-d...


Or they could just, you know, leave the phone at home...


Or turn it off.

EDIT: Yes, that creates a data point that police could also search for — "give me all the phones in the vicinity that were turned off and then back on surrounding the incident." Okay, how far away? That would be a massively larger search, geographically, wouldn't it? How far before and after is your window for turning off and back on events?

That's still an additional search. It's also probably got a far worse signal:noise ratio than proximity to the incident — assuming the robbers were dumb enough to have their phones on them (and on) in the first place.


Better to use normal behaviour than unusual. Unless of course you turn your phone off often during x time of the robbery.

But most people don't unless it runs out of battery and rarely when they are at home (people just plug it in when they are home).

Not that this is useful in court but it could point detectives in your direction.


Turning it off could leave a trace: "this phone was turned off 15 minutes before the robbery started, and was turned on 15 minutes after the robbery ended, both events in a location which is 15 minutes by car from the bank".

Leaving it at home, without turning it off, leaves no such trace; it's consistent with "this phone's user simply stayed at home today".


"Let's check their car's infotainment data connection."

"We got 'em!"


Maybe a good thing that pre-infotainment cars exist? ;)


And public transport, bicycles, roller skates, stolen vehicles and feet.


And after you've robbed the bank, you have huge duffel bags of cash and the cops are after you, you're gunna roller skate away?



You gotta walk/take busses with masks and hats on. Change clothes in a tunnel.


Is it possible to auto answer a call? In that case you could call the phone and there would be proof not only that you were at home, but that you were having a conversation.


Google could probably detect atypical usage patterns. If you’re always on your phone and suddenly there is no accelerometer delta then you’re likely not at home with your phone but somewhere away from it.


or it is charging


Better to just have the kid play with it all night. And, of course, tell the wife (assuming she's in on it) to watch a lot of Jackie Chan movies on Netflix all night.


Well, who in their right mind would bring a cellphone to a bank robbery? And yes, creating an alibi would be good. But not with a knowing accomplice, because that'd be a vulnerability.


So, one problem here is that the police could look for co-travelers. I.e., two or more people being shown to take the exact same route.

Spies would look for this to see if they are being tailed. If they can see a pattern of people who are co-travelers on their same path, then that’s a pretty bright signal.

It would be more work for the police to look for these kinds of signals in the location data, but not companies like Google.


This was how Paula Broadwell was identified as part of her affair with Gen. Petraeus.

Essentially, they cross referenced list of hotel guests at three different hotels on three different dates and she was the only one at all three.

https://www.businessinsider.com/how-fbi-caught-paula-broadwe...


There are simpler options:

"Employee used crisp packet as 'Faraday cage' to hide his whereabouts during work"

https://www.telegraph.co.uk/news/2017/11/27/australian-sacke...


It is sure enough? Bank robbery is a major felony, up to 20 years...


Just FYI, you would have to have an exceedingly clever accomplice. They would need to walk around in a part of town where there are no cameras, and preferably very few witnesses. (If someone remembers seeing him alone, or cameras verify he was alone, or God forbid, if one of his buddies sees him and strikes up a conversation, the gig is up.)

Your accomplice would have to take possession of the phone at a comfortable distance from the target bank. (Again, in a place that no one, and no camera can observe the arrival of either party.) And the co-conspirator actually robbing the bank would have to make his/her way to said bank without being observed leaving the phone drop site. (And without being observed traveling in a direction inconsistent with his/her phone's location data.)

All of that is not as easy as it sounds. One traffic camera on a stoplight and they got you, in your car, heading towards the bank, in the opposite direction of your phone. Now your co-conspirator is in trouble too. (Aiding and Abetting at minimum.)

We're creeping towards an age of ubiquitous gaze, and only people who are way smarter than I really know if there's any averting it at this point. I think the only real defense against ubiquitous, 24/7 surveillance right now is to live life in a remarkably unremarkable fashion.


The point is to exclude you from suspicion in the first place, not verify your alibi.

You've got it all back to front. They won't check the CCTV outside the robbery area against non-suspects outside the robbery area.

You're basically saying they'll check the whole of the world that they weren't in Wisconsin.


It's possible (especially if you're in a criminal database) that this might actually paint a bigger target on your back - if a traffic camera caught you going toward the bank and facial recognition picked it up in an automated sweep... then the fact that your phone was broadcasting as being in a different location might be a red flag on it's own.

While humans are doing the piecing together this tactic will probably be pretty decent, but it wouldn't be super hard to marry those datasets after you've seen it happen a time or two.


And now everyone who forgets their phone on their way to work gets flagged.

I’m not even disagreeing with you. It makes me sad, however, that this sort of automated surveillance is mostly accepted by wider society. We will force everyone into a Brave New World styled life, where being entirely unremarkable is the only way to avoid suspicion, no matter how innocuous the behaviour.


I bet hardly anyone travels without their phone on them. Even in a large city...maybe tens or hundreds of people.


You forget all the senior citizens.


In addition to your concerns, I don't think there's even anything to be gained by intentionally trying to create a false trail since the warrant only looked for phones in the area of the bank around the time of the robbery. The robbers could just as easily leave their phones at home (or any other place far away from the bank) and they would not be flagged by the reverse location search.


Or they could just leave their phone at home, or at work, where they probably spend most their time.

It's not yet illegal to walk around without phone.

"Show me your papers citizen"


You could also mail your phone via ground. It wouldn't hold up to intense scruitiny because your locations would all coincide with package delivery places but it might help.


So this tactic works best if you're a bank robber that happens to be employed by UPS.


I feel like we're making this far more complicated than it needs to be. Just leave your phone at home and use a 2-way radio for comms.


In that case, you can scan all license plates in an area, and compare with all mobile users in the same area, and investigate all who don’t match.


Obviously don't bring your own car to the robbery! Even just watching Hollywood movies one would know that.


Co-conspirator leaves his phone at home, dresses and puts make up on to look like you, takes your phone to a couple of spots with a digital trace of your phone but only low tech cameras, and builds an alibi for you. Their alibi would be being home sick. Could even meld the two stories by buying yourself some DayQuil.


Go hiking?


Governments serve Google with over-broad search warrants frequently, but there is not information in this article stating or implying that Google responded to this or other similar warrants. Google has a whole department of attorneys dedicated to evaluating search warrants. They claim they won't comply with vague and overbroad warrants.

https://www.youtube.com/watch?v=MeKKHxcJfh0&feature=youtu.be...


TFA says the warrant was executed.

> It was an aggressive technique, scooping up every Android phone in the area and trusting police to find the right suspects in the mess of resulting data. But the court found it entirely legal, and it was returned as executed shortly after.


> They claim they won't comply with vague and overbroad warrants.

Assumably it’s the judge’s opinion on this that matters, right? In the case of a national security letter this fight wouldn’t even be public. Assume the worst.


A judge would review the warrant before issuing it hopefully. I think Google can basically say "Look, this is a bad warrant and you'd be better off narrowing it a bit" and that would work in most cases.

You, as a defendant, can also challenge the warrant as part of your trial if you are caught, potentially getting the results of the search thrown out.


Can you if there's a national security "concern"?


The article states that Google complied. And I don't see how a 30 minute period from a 100-foot radius area is over-broad anyway.


It's unlimited in scope so it's pretty broad. There could have been any number of people passing through that area of space/time. A good standard for such warrants is when the police suspect a particular person and want to search for evidence of their whereabouts. A fishing expedition where the police have no suspects and just want to grind all available data is almost the definition of "vague and broad", if not that of "over-broad". In this case it seems that the police did not even have a concrete reason to believe that the perpetrator carried phones or used Google services.


- Why asking Google? (My GPS is allways off) - Why not ask the phone providers? - Even the dumbest criminal does know today, don't carry your phone with you, if you do something like this.

I switzerland was a murder an rape case close to one of most busy highway. The police asked the phone providers for phones in this area (highway included). The first bill from the providers was 860'000CHF, they reduced it later to 200'000CHF.

https://www.google.com/amp/s/www.nzz.ch/amp/schweiz/teure-ue...


I wonder, is Google even compensated by US feds in the article story?


2010 - 2030 This kind of thing happens with lots of alarming stories in the news. People are kind of worried that they will get dragged in as a crime suspect simple because they were driving by the area when a crime was being committed nearby.

2030 - 2040 This kind of investigation becomes so common that the independent news outlets just stop finding instances of it. People are kind of relaxing about it.

2040 - 2050 It turns out that, like DNA evidence, there's now an entire innocence project started dedicated to getting people out of incarceration for any crime where the totality of evidence was GPS data and some made up stories.

2050 -> Oh sorry that new energy source blew up, earth is gone.


I fear the timeline is way too optimistic. It wont take till 2030 to normalize.

>It turns out that, like DNA evidence, there's now an entire innocence project started dedicated to getting people out of incarceration for any crime where the totality of evidence was GPS data and some made up stories.

Is also already the case. Denmark had such a problem recently.

https://www.nytimes.com/2019/08/20/world/europe/denmark-cell... https://www.theverge.com/2019/8/23/20829490/denmark-cellphon...


You're assuming this will wind up being like DNA.

Given the history of every other technique the cops have ever used to solve crime I'm betting it's gonna wind up somewhere between forensic bite mark analysis and eyewitness testimony (i.e. not worth shit unless you've got a lot of other stuff to corroborate it). Of course a generation of prosecutors will get to make their careers on this kind of crap before it gets debunked.


Well beyond suggesting that, as stated in other threads, as the criminals get smarter they will simply leave the phone at home and yes, innocent people that have a digital footprint near (and when) the crime will be caught instead. Once the police have identified a potential fall guy and they are black, or an immigrant or some other disadvantage, we'll see eyewitnesses come forward to "help" the police officer.


That's why you do crime in airplane mode


Google really needs to release a dedicated "Crime Mode" so we don't need to keep using this airplane mode workaround.


$9.99 a month "identity masking", lets you run your android device in stealth mode. (I'm being sarcastic of course).

One of my SDR projects was to boot a GSM base station if my burglar alarm went off and store copies of every IMEI it can see in the cloud. Seems like it would be a better lead to hand investigators than a fuzzy security camera shot.


It's a great idea but is it legal to operate a personal Stingray?


Yes! Well let me be a bit more clear. The FCC has a process for, and indicated they would likely approve, a special temporary operating license for such a device given that it would only operate for a short time (during the break-in) and not interfere with the thieve's or neighbor's cell phones as it would respond with no compatible roaming network. Also it wouldn't do any sort of interception or monitoring other than the tower ping.

It would also need permission from the licensed spectrum holder, that could be harder to get.

But yes, completely legit with the right paperwork.


Wow, I'm a bit surprised by that. Thank you for answering.


I was a little as well, I happened to be at an SDR conference and one of the attendees was a lawyer working with the FCC on licensing issues[1]. I gave him my use case and he said that if it was constrained the way I said it would be, then if it came through their office they would likely approve it.

[1] The FCC has been pretty engaged in understanding the impacts of SDRs because of their potential for abuse (as one attendee called it, "The Drones of spectrum." As an amateur (AI6ZR) and someone in industry I've been helping as an SME to explain some of this stuff to their less technical staff.


And investigators probably would not care — consider how many identity theft cases have the ID thief on camera (in my case, at a hardware store opening up a line of credit in sight of store cameras, and later using a cloned card at an ATM machine, surely in view of an ATM camera.)...yet despite thousands stolen in ID theft cases, there is hardly ever any action taken.


My thought would be they could track the phone of the person, who would probably still have it on them, and using that and a fuzzy security camera image have enough evidence to arrest them at least.


The whole "jailbreaking the phone" business gets suddenly a completely new meaning...


I feel like, as soon as you enabled this feature, your phone would start broadcasting more.

I suppose we can sorta thank the FEC for their crazy broadcast device requirements when it comes to suspecting whether airplane mode actually stops a device from dialing home.


I can see the mental gymnastics now:

"Criminals deserve just as much privacy and safety as anyone else. If the government violates the criminal's rights to solve, prevent, or preempt crimes, even more crimes have occurred (privacy violations, killing of the criminal, etc.)

There should be explicit modes for phones and browsers available to criminals that allow them to safely commit crimes without risk of their rights being infringed upon."


I know you were being facetious, but a mode somewhere in between "track me" (data enabled) and "remove my phone from the network" (airplane mode) would be nice.

Maybe "for the next hour, don't do the normal location-tracking/biometrics monitoring/reporting". I get that Google has no incentive to make that feature but maybe Apple does?


Basically every normal adult commits at least misdemeanors daily (in the sense that a bored cop could stick you with one and an aggressive prosecutor could nail you for it if you didn't get a decent lawyer) crimes all the time.

Trying to make a black and white distinction between criminals and everyone else is futile.


>Basically every normal adult commits at least misdemeanors daily

This. Drive 5mph over the limit? That's a crime. Buy some stuff off craigslist? I hope you paid sales tax on that, buddy.


Well, who defines what a crime is? The problem starts there, I'd say.


That sounds plausible in the UK


They can't call it that. But they can call it... Incognito. Plus then you can just tell the cops: "i was watching xhamster all night.. see my phone was in porn mode (you know incognito is called porn mode)"


> That's why you do crime in airplane mode

Heh, are you a fed? ;)

>Google is tracking you. Even when you're in Airplane Mode without SIM card

https://www.youtube.com/watch?v=S0G6mUyIgyg


Your locations from the time your phone was in airplane mode are uploaded the moment you switch it back to normal Wi-Fi connection. I guess your only choice is going full-on tinfoil/Faraday cage-style though that might be a bit impractical while doing the deeds...


The entire premise of this is flawed; instead of trying to come up with a way to make the tracking device you're carrying stop tracking, maybe you should just not carry the tracking device in the first place. Leaving your phone at home when go and rob a bank is like Criminal 101.


And how exactly are you supposed to Uber to the bank and back without a phone??


I'm surprised I had to come this far to find the reasonable answer. Opsec 101.


It's not the only reasonable answer. Leaving your phone powered on and at home works too. Powering it off might stick out, actually.


The comment I replied to said nothing about turning your phone off, only leaving it at home.

> you should just not carry the tracking device in the first place


Baseband processor might be running even on a phone that is seemingly turned off. That's why crime bosses discussing breaking bad always removed their batteries. That might also not work 100% if there were large capacitors inside the phone...


You might need Maps to avoid traffic on your way out.


it's conceivable with even the phone powered off that the GPS processor could still be running in an ultra-low power mode doing geolocation fixes every n-seconds and storing them in a cache on the chip.

So I guess a Faraday cage would be the only sure way...


I've done some neuro/ephys related collaborations where I installed stuff inside a room sheathed in all 6 sides in solid, grounded copper. Inside with the door shut, the wifi and LTE were both good enough to stream video!!! Although, they say it did a good job at cutting the 60hz noise. Personally I would learn a little bit more about Faraday cage design before trusting anything to it besides lightning strikes


Interesting! Do you think the signal propagated through the copper or snuck in through some hole or slit?


High-frequency emissions love long thin gaps. Just grounding the parts against each other is not enough, you have to close the longer gaps, eg with copper tape with conductive glue (sold in electronics shops) and the surface below must be blank too. If you do not do this the gaps might even function as an antenna and amplify the signal.

Also, cables coming outside of your box must be shielded too.


Typically there was a 2" conduit carrying DC power cables and the seam around the door might not have been sealed, so probably that. Also had similar results with fridges, and they have rubber seals on the door gap. So probably leaking through cracks.


If we go into questions of what a maximally malicious phone could do, rather than a question of what a normal phone actually does...

The Faraday cage would still leave the accelerometer fully functional. Now you might say "but because of drift it will rapidly diverge". Yes and no. It turns out that it's possible to detect based on "gestures" where you might be. Works better for winding irregular streets than in a gridlike street network.

If we go full Sherlock Holmes, the microphone might also overhear trains and music from stores giving away the location.


Or turn it off. Or leave it at home.


Is that true on Android? On iOS location APIs just don't work in airplane mode.


I just tested this on my iPhone and location works just fine in airplane mode, even with WiFi off.


It's probably using GPS, which AFAIK is not affected by Airplane Mode (probably because it's passive?)


I wonder why. Mine doesn't work, it says location could not be determined. iPhone 7, iOS 12.4.


Android allows the user to turn location on in airplane mode.


Yes, I do this all the time when I'm hiking out backpacking. Without any cell or WiFi nearby I try to save battery by turning them off. When I want to check a location on my map I enable the location long enough to get a GPS fix and turn it off.


I certainly do not trust my phone to turn all radios off on airplane mode or with wifi or bluetooth shut off.

I could pretty easily verify my suspicions but I think others already have.



Airplane mode doesn't turn off GPS. What you want to do is turn off location, or location history at the very least.


I have to wonder why Google removed the ability for apps to put a phone into airplane mode / turn off the GSM antenna. Perhaps it was a legitimate UX consideration or some weird unintended consequence of a regulation about radio transmissions.

Still, it would be nice if the default for phones was to not be connected to the mobile network. Instead, they could listen out for a signal broadcast on an FM frequency (for example), and only connect to the mobile network when a specific unique ID was sent, indicating that you have an incoming call. (The unique ID would be agreed with the radio transmitter in secret before hand, and changed after each call).

When your phone is on a Wi-Fi network, it could instead have all incoming calls directed to it that way, like a softphone, meaning you would only rarely have to reveal your location to the mobile network.

The economics of this could work in some places (based on my rough guesses), but not if users had to root their phone to grant apps this permission to turn airplane mode on and off. I also don't know how much battery life would be required to be constantly processing an incoming FM signal in software (at least whenever the phone was off a Wi-Fi network). I'm also assuming that phones have FM receivers that apps can interact with, or that this could be an external device, connected via BlueTooth, perhaps.


I wish I knew what is apparently so objectionable about my comment above. Is it just that the system I'm proposing is impractical for some reason, or do people object to the goal of preventing governments from tracking the movements of basically all their citizens all the time?

As an example of the sort of society I am hoping to avoid, let me offer this article:

https://www.theregister.co.uk/2018/05/11/top_judge_mulls_com...


Probably an annoyed location data salesman?

In all seriousness though, I'm pretty sure your system fails in the deliverability department.

Mobile phones are meant to be...well... mobile, and that functionality basically requires that when a call intended for you is started from somewhere else, there has to be a way for the signal to get correctly switched to where you are.

If you treat cell towers as switches, that then means that each tower maintains a routing table of handsets within it's area which allows the signal to eventually find it's way to you. This is the fundamental operating principle behind packet switching and the Internet in general.

Let's say there's 4 cells. A, B, C, and D.

I call you from A. You're in D's coverage area. A can connect to B and C, and C can connect to A, B, and D, B cannot see D.

My handset tells the switch behind cell tower A I'm looking for you. It checks it's routing table to see if it's serving you, and finds it can't, so it pings the next switch that has announced a possible route (C). C checks it's routing table, to find you and doesn't, but it sees D knows of you, so forwards to D. D knows you're there, so it finally connects the call. The circuit is made. This works because information about what handsets are in range, and which cell knows routes to what is constantly updated and propagated through the network. So if you took a trip out of D to B while on a call, the call would not have to terminate since the towers hand you off from tower to tower as your handset's location changes.

The system you propose though, breaks that paradigm. Since the cell tower has no way of tracking the handsets in its service area, every possible tower has to chirp to see if your phone will respond. Once your session is established, some of the normal routing protocols can still be reused, however, the initial connection stage is where it gets problematic.

Routing tables clean themselves up over time, so if you don't use your phone for long enough, you essentially cause the system to attempt a network-wide chirp just for you.

Now multiply that by everyone, times the timeout to voicemail, on every tower on the network. Not ideal. You have no way of telling whether the call connected with the handset until the handset actually answers, or every switch gives up and returns cannot connect as dialed. You're a walking DoS attack because someone wants to call you, and you won't pick up your damn phone.

Furthermore, your scheme degenerates to the current arrangement if an always available mobile data connection is assumed, as your phone will just establish a session every time it sends data.

Basically, it's not the telephone part that makes you traceable. It's the "I can guarantee synchronous delivery part". And hell, even if you throw out the mobile bit, phone records still the you to a location; it just takes a bit more footwork and a cooperative witness/wiretap to prove it's you.

It's a pretty in depth problem, with a lot of nuances to be squirreled out. It takes a long time to explain, and even if someone could get most of the way there, that's only the start of the issue. I've got friends who have tried making ISP's before, and the amount of friction created by monolithic telco's is absolutely insane even when you aren't doing anything exotic.

You have to remember as well, telephony isn't magic. You're eating up bandwidth all the time. Stuff is incredibly fast nowadays, but everyone is using it too. Also, all successful networking suffers from tracibility problems. Things just get mitigated slightly by jurisdictional boundaries and the impracticalities of being able to trace through sufficient levels of proxy links. So it's not surprising you got a few "you really don't get it" downvotes.

Anyway... Hope that explains things, and I'm sure there's a bunch of detail I'm missing.

EDIT: Additional thinking: there's other reasons why a telco/mobile provider would want all handsets connected at all times even when not doing calls. It gives them an idea of where they need to install or upgrade infrastructure based on metrics w.r.t how many handsets are in the cell.

Basically, from a business standpoint, there is little reason to not go the direction that we have. The privacy concern does change things a bit. Not sure whether it would be enough to drive a push to abandon/change things so drastically. It's an interesting thought experiment though that I will happily cogitate on for weeks in my idle time. I like devising new protocols.


"If you do the crime, leave the phone behind."

Criminals will adapt, they always do.

Because this was a bank robbery, it's a Federal warrant which is harder for Google to fight or procrastinate on (if for some reason they chose to).


Most criminals I knew over a decade ago knew this already. Phones were left behind as much as possible, batteries pulled out when discussions happened, and so on. I’m long away from that world (been clean for 7 years), but I would be surprised if they’ve not adapted even further


Can't Feds ask mobile phone servers providers(there are only couple of them in US) for phones registered at specific base station? I think police have been doing this for ages.


They can but that could pick up way more people and not be accurate enough for location tracking. Cell sites can have a range of multiple miles.

Phones have a much more accurate location history since they can localize using AGPS. And with google location history turned on it stores that location to googles cloud.


I thought the cell sites triangulate the location of customers for better analytics. It's not AGPS level, but it isn't single cell site range either.


Multilateration. And yeah, it gets down to ~100 meters with good clocks. And this data is stored by all US telcos for 2-5 years.


If you were a cop, would you want the AGPS range data? or some triangulated range of phones?

Cops are only doing what makes sense. You can't really blame them. There needs to be a law that prevents them from doing it. Absent that, people need to stop being so liberal with their information.

This was a bank robbery, but the principle certainly applies to other activities as well. I mean really, do you really need your phone on you if you're going to see your mistress? I don't think you do.


Not receiving/responding to messages from family and/or friends can be a signal in itself.


There’s probably a market for bank cameras with image recognition that automatically set a silent alarm if they spot a gun. Several cameras inside and out could track the individuals.


I don't think you understand the problem scope. Guns are hidden behind clothing and you're going to have a lot of false positives.


In this instance, it certainly would have worked.

“One man jumped onto the teller counter and pulled out a handgun, throwing down a garbage bag for the tellers to fill with money”

Outside cameras could have tracked them into a car, if it was reasonably close.

A security firm can monitor for false positive.

This would probably work for your average convenience store robbery too. In the US, we have a large market for security.


Perhaps you would be suprused by the number of people who carry guns 24/7. This would be very hard to implement.


Perhaps you'd be surprised that some countries with banks have very few guns in private possession.


In countries that aren't the USA, that number is functionally close to zero.


Private businesses, especially banks, are free to ban guns (and may be required to do so). So while this might not work for the gas station next to the hunting club, it should be fine for the bank.


I didn’t say it would be easy. I said there’s probably a market for it.

As with any real world problem, there are lots of obstacles. Sure, your AI will need to figure out if the gun is being pointed at someone, etc.


Most are concealed, and the rest are usually holstered and pointing down. Doesn't seem that hard to exclude almost all of those, leaving just a few for manual review.


Not only recognition, but also video quality adjustments. A bank surveillance system often has to archive months of video so police can go back to try to find out if the robbers had been there before to plan their crime.

A smart AI surveillance system might have 4k cameras, but not save the video in 4k format.

Instead, everytime a new face appears, it can use the maximum resolution to take a profile photo of the face for archival purposes and to calculate facial recognition.

If integrated into the banks software, it could match the faces to associated accounts by noting what account was looked up while the new face was at a tellers window.

If a robbery is detected through behavioral analysis or gun recognition, then the recording system would switch from 720p @ 15 fps (for example) to 4k @ 60 fps. It could also not just alert the police automatically, but could quickly pull up the associated account information, clips of previous visits discovered through the facial recognition, and send that to the police or have it ready for their viewing.


How exactly does that help? A silent alarm button was probably pushed by an employee anyway.

And whatever cameras the bank had, they were already recording.


How long did it take for the employee take to push the silent alarm? Seconds count. (I realize you have no idea and simply made that up anyway. We don't know if someone did push the alarm.)

Look at the grainy pictures.

https://fox6now.com/2018/10/16/recognize-them-hartland-polic...

"Our system zooms in on people who carry firearms. In addition, our network of cameras coordinate and will take several pictures from different angles and zoom levels. Furthermore, our AI looks for identifying features (e.g. moles) on the suspect's face, arms, etc"

How many bank robberies and convenience store robberies are there every year in the US? Why stop there? There's lots of gun violence in the US that lends itself to AI based security.


Who cares about bank and store robberies? Employees hand over the money and clock out; customers continue on with their lives. Very few humans suffer, and the ones that do suffer can afford a haircut.

A better use of AI based law enforcement might be targeted against corporate+government institutions which actually harm people at scale.


Bank and store owners, for one.

Build whatever business you want. Thousands of companies are started every year.

Who are your customers?


Obviously it's not as simple as just spotting a gun. Some people carry openly.


Isn't this a blatant constitutional violation? Maybe while they are at it they can search through everyone's house as they "might be there".

Granted the fusion center already have access to this information - alot of times they have to make it official to be admissible in court. So there might be something foul in play here(besides the blatant 4th amendment violation).


Why does the article say they got "every Android phone in the area" - are iPhones using Google Maps not going to get picked up as well?


There's a difference between always on location data/telemetry baked into android and using google msps.


Google maps is not on all the time.


IIRC, Google Maps is still opt-in (opposed to "Maps"), at least it was when I got my phone ~3 years ago


> With nearly a year elapsed since the warrant was served, that suggests this particular reverse location search may not have been as fruitful as investigators hoped.

They did not find anything. But God help you if you have a prior record and happen to be black or match the description of the assailants... and just happened to be around the bank at the time.


>But God help you if you have a prior record and happen to be black or match the description of the assailants... and just happened to be around the bank at the time

Seems reasonable that you would be approached by investigators if you were present at the scene and matched a witness description.


It would be fine if they simply approached people and tried to rule them out, but due to the psychopathy in the justice department they often try to paint the people they find into the perp often hiding evidence that exonerates them.. in other cases photo-shopping their face to cover up tattoos to make them look more like the assailant.

The issue is that prosecutors don't act in good faith... and because of that legitimate exercises maybe used against people in illegitimate ways.


Yes that sort of thing happens, but "often"? How often are we talking here? You make it sound like a common occurrence and I'm not convinced that's the case.


Happened to me, so I can speak about this first hand.

I fit the description: I was between 5'3" and 5'11" and my skin color can be described as "coffee with a touch of milk."

Video evidence that showed, fifteen minutes before it happened, that I was 13km away at a wedding having dinner wasn't enough since I could have left immediately after the footage was taken and driven down.

I still have video evidence of the senior detective basically instructing the witness to select me out of a lineup. They also whispered to each other throughout which I only managed to hear thanks to some expensive headphones I had.

I made fake Facebook accounts and befriended all of the "witnesses" and victims. Beat the case on a technicality thanks to a post I found on Facebook by a eye witness.

I'd still be in jail right now 9.5 years later.

I'd say it happens extremely frequently, it's just that the people it happens to aren't as lucky as I am.


Wow. Have you written about this anywhere else? Glad you’re free!


Thank you.

It's not something I'm particularly proud of or something I talk about - outside of my immediate family no one really knows all of the details, and only a handful of people outside of my immediate family know about it. It's the most traumatic experience of my life and had significant consequences on my mental health that still affect me daily.

My blind optimism helped me through it, but it had really hurt my family too.


Understandable, it must've had a big impact.

Good luck and I'm glad the optimism paid off!


You agreed to the ID parade.

The general rule is not to talk to the police at all. Ask for an attorney if you're being detained; leave if not.


I didn’t agree to anything unless it was an order. This had the benefit of them requiring to have a senior officer review the request to make sure it’s actually necessary and lawful to order (such as when they requested a buccal swab).

The line-up I mentioned was a photo line-up, where they place one of my mugshots among a group of other photoshopped mugshots.

They arrested me in the first instance, then released me, then arrested me again and charged me after they had performed the photo line-up.



Often enough. Like how many times is too many when we are talking about sending people away for years? If they find something that exonerates you, who is looking out for you, do you have the right to find evidence that clears you? Can you ask Google for such information? Anything they find can and will be used against you, and anything that clears you they are under no obligation to disclose. Does that sound like a fair bargain?


of course frequency matters. Yes, it's awful every time, but it's a whole lot worse for society if it happens 10,000 times a day as opposed to once every 5 years


[flagged]


No, that is patently untrue. Please provide sources for your claim.


He did - the source is "a book". Assumedly The Lion, the Witch and the Wardrobe.


It's not like they couldn't do all that without google's help. They would have looked at every camera nearby, talked to every witness, etc. If your name/face came up and you had priors or matched the description you'd get a visit. Google's data is probably more accurate/scoped and more impervious to bias than the other options they had.


Slightly misleading title. "In an attempt to solve" would be better, since the case is still unsolved.


This is particularly relevant with the recent discussion around Amazon's Ring partnership with law enforcement. "We will always ask you for permission" gets a bit thin when warrants like this can be issued.


Well of course. Warrants are warrants, it doesn't matter whether Amazon has a partnership or not.


Like straight out of movie Hell or high water


Most criminals tend to use burner phones of the non-smart variation.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: