惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

博客园 - 司徒正美
aimingoo的专栏
aimingoo的专栏
MongoDB | Blog
MongoDB | Blog
云风的 BLOG
云风的 BLOG
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
酷 壳 – CoolShell
酷 壳 – CoolShell
博客园 - 聂微东
Y
Y Combinator Blog
T
Tailwind CSS Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
S
SegmentFault 最新的问题
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
博客园 - 【当耐特】
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
J
Java Code Geeks
美团技术团队
Google DeepMind News
Google DeepMind News
博客园_首页
Apple Machine Learning Research
Apple Machine Learning Research
T
The Blog of Author Tim Ferriss

The Record from Recorded Future News

CISA to allow researchers to report vulnerabilities to exploited bugs catalog Canadian man arrested, charged for running KimWolf DDos botnet Belarus-linked hackers use fake training certificates to target Ukrainian officials Hackers steal patient and billing data from German hospitals via third-party provider Tech giants promise British regulator they will tweak platforms to protect kids online Two Americans plead guilty to assisting India-based tech support scam centers UK plans for cybercrime law reform would protect almost no one, experts warn Xi and Putin pledge closer cooperation on AI, cyberspace and satellite systems Europe dismantles VPN service used by cybercriminals to hide ransomware attacks FTC warns 12 major tech firms of violating Take It Down Act Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers Discord migrates all users to end-to-end encryption by default 7-Eleven confirms breach after ShinyHunters claims Texas, Florida top list of states reporting millions of dollars lost through crypto ATMs GitHub confirms being hacked by TeamPCP, says customer data unaffected Senator presses CISA for answers about alleged GitHub repository leak Ukraine says Russia is deploying AI-powered malware on the battlefield Huawei zero-day attack behind last year’s crash of Luxembourg's entire telecoms network UK regulator to require tech firms to tackle deepfakes, non-consensual intimate images Microsoft disrupts Fox Tempest malware-signing-as-a-service platform tied to ransomware gangs More than 200 arrested in cyber raids aimed at Middle East scam networks Grafana refuses to pay ransom after codebase theft Experts warn of privacy risks as AI firms looks to connect to financial accounts Experts warn of privacy risks as AI firms looks to connect to financial accounts More than $10 million stolen from crypto platform THORChain CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday OpenAI asks macOS users to update after TanStack npm supply chain attack ODNI taps officials to coordinate response to foreign election threats Alleged Dream Market admin arrested in Germany after US indictment European Commission head pushes creation of new law delaying teens’ social media access UK moves to shield security researchers in cybercrime law overhaul Microsoft on pace to break annual vulnerability record as AI-driven patch wave takes hold Foxconn confirms cyberattack impacting North American factories Congressman launches inquiry into how food retailers use surveillance pricing West Pharmaceutical warns of ransomware attack impacting business operations European countries are exporting surveillance tech to countries with poor human rights records, report says Instructure pays ransom after Canvas incident as Congress announces investigation Texas sues Netflix over alleged data practices that create ‘surveillance machinery’ without user consent FCC pushes ban on security updates for foreign-made routers, drones to 2029 UK water company allowed hackers to lurk undetected for nearly two years, regulator finds Dirty Frag: Linux kernel hit by second major security flaw in two weeks GM to pay over $12 million in California privacy settlement involving driver data Kingdom Market administrator given 16-year sentence Virginia man found guilty of deleting 96 government databases Multiple universities forced to reschedule final exams after Canvas cyber incident Pro-Ukraine BO Team and Head Mare hackers appear to team up in attacks against Russia Iranian government hackers using Chaos ransomware as cover, researchers say North Carolina man pleads guilty to doxxing Supreme Court justices Polish intelligence warns hackers attacked water treatment control systems European leaders unveil tentative deal for AI Act simplification, including a ban on nudification tools North Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malware Palo Alto warns of critical software bug used in firewall attacks New CISA initiative aims for critical infrastructure to operate offline during cyberattacks Hackers compromise Daemon Tools in global supply-chain attack, researchers say FTC bans data broker Kochava from selling sensitive location info Conti, Akira ransomware affiliate given 8-year sentence Australia launches cyber review board modeled on version disbanded in US German officials advance legislation that would expand law enforcement use of surveillance technology Educational company Infrastructure reports cyber incident Forbes preliminarily agrees to pay $10 million to settle California wiretapping lawsuit Ransomware group claims breach of pro-Orbán Hungarian media firm Senate Judiciary advances bill that would bar minors from interacting with AI companions Federal agencies must patch cPanel bug by Sunday, CISA says Cyber incident responders who carried out ransomware attacks given 4-year sentences British cyber agency warns of looming ‘patch wave’ as AI speeds flaw discovery Cyber spies target Russian aviation firms to steal satellite and GPS data Nearly every Linux system built since 2017 vulnerable to ‘Copy Fail’ flaw Congress punts FISA renewal to June Hackers earning millions from hijacked cargo, FBI says Zambia cancels global digital freedoms conference days before start Trump’s cyber ambassador nominee advances to full Senate vote France investigates 15-year-old over alleged hack of national ID agency Moldova’s health insurance agency reports possible data leak after cyberattack House approves spy program on second attempt, Senate fate murky US, China partner on scam center takedown in Dubai European Commission accuses Meta of breaching child safety rules Swiss police arrest 10 suspected members of Nigeria-linked crime group Black Axe Cyber Command, NSA chief warns foreign adversaries likely to target midterms Video site Vimeo blames security incident on Anodot breach Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale China-linked hackers led phishing campaigns targeting journalists and activists, researchers say Supreme Court signals location data searches should require a warrant Tennessee becomes second state to ban cryptocurrency ATMs over scam concerns Money launderer for crypto thieves given 5-year sentence Disinformation campaign targeted Tibetan parliament-in-exile elections Italy extradites alleged Chinese state hacker to US Hackers impersonate Microsoft Teams help desk to breach corporate networks Iran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say ADT says customer data stolen in cyber intrusion Pentagon grapples with securing AI as it moves toward autonomous warfare Norway's prime minister proposes ban on social media access for young teens Toronto police arrest three in Canada’s first mobile SMS blaster case US sanctions Cambodian senator for millions earned through scam compounds CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March Surveillance companies exploiting telecom system to spy on targets’ locations, research shows China-linked hackers targeted Mongolian government using Slack, Discord for covert communications Trump’s pick for CISA director withdraws from consideration House Republicans unveil data privacy law that would override state protections Medical data of 500,000 Britons put up for sale on Chinese website North Korean hackers siphon more than $12 million from crypto users in sprawling campaign
Why the Supreme Court's Chatrie case could change the meaning of privacy in America
2026-05-22 · via The Record from Recorded Future News

The Supreme Court is currently weighing a case that could reshape how law enforcement works with technology firms to identify potential suspects. In the next few weeks, the court is expected to rule on whether or not so-called geofence warrants are legal under the Fourth Amendment, which prohibits unreasonable searches and seizures and sets requirements for issuing warrants.

Lawyer Adam Unikowsky argued the case last month on behalf of petitioner Okello Chatrie, who was charged with robbery after law enforcement obtained a geofence warrant directed at Google. Under such warrants, tech companies are asked to give law enforcement the location history of people in a certain area so they can identify unknown suspects, and Google has said it has been served with geofence warrants covering exceptionally large areas across multiple days.

The case is the first involving digital privacy to hit the Supreme Court since 2018 and could have major implications for other types of police tools that involve large amounts of data. Unikowsky spoke with Recorded Future News about why he believes geofence searches are problematic, how people do not understand what they are consenting to and why the way the court rules could have a dramatic impact on Americans’ right to privacy.

This interview has been edited for length and clarity. 

Recorded Future News: The Chatrie case is the first digital privacy case, as well as the first Fourth Amendment case, to hit the Supreme Court since a decision in 2018 that limited police use of historical cell-site location data. Why do you see the Chatrie case as important?

Adam Unikowsky: The Supreme Court hasn't heard a case about digital privacy in several years, and the Carpenter case — which you referred to from 2018 — left a lot of questions unanswered. It left questions about what constitutes a search that requires a warrant unanswered and it also left questions unanswered about exactly what types of warrants could be issued. 

The Chatrie case involves a novel type of warrant called the geofence warrant, which is a type of so-called reverse warrant. It started out in a situation where the police did not have any suspects and used the warrant in order to find the suspect as opposed to a traditional warrant which focuses on searching a particular suspect. The case presents a lot of issues that prior Supreme Court cases haven't addressed, but which are important to modern law enforcement techniques. 

RFN: Some legal scholars believe that depending on how the court rules, it could end up leading to a surge in reverse searches — for example, reverse keyword searches where police can see everyone who has searched web browsers for specific keywords. 

AU: The court's ruling could address the constitutionality of reverse keyword searches as well as reverse AI searches. In other words, searches in which the police check every single person's Google account as to which people search for a particular search term that seems relevant to a crime that they're investigating or search everyone's AI chats for questions that are probative of whether a person has committed a particular crime. One of the issues in the case is whether this type of warrant — which allows everyone's accounts to be searched — is consistent with the Fourth Amendment, and if so, exactly how broadly or how narrowly do such warrants have to be drawn.

RFN: The Fourth Amendment and digital privacy legal scholar Orin Kerr said he believes the justices will likely conclude that geofence warrants can be drafted constitutionally, but also will say that they have to be limited in time and space. Do you agree with that? 

AU: I'm not going to speculate on how the court will rule on the oral argument. I will say that we put a number of arguments on the table. One of those arguments was that the geofence warrant was a general warrant because it impermissibly authorized the police to search every person's account. We've also put narrower arguments on the table, such as the fact that the geofence was overly broad because it encompassed a bank and the church for a one hour stretch and there wasn't probable cause to search what we understand to be the virtual private papers of every single person in the church and every single person in the bank merely because of their proximity to the crime. 

RFN: If the justices set up strict parameters for how specific geofence warrants need to be in the future, is that a victory? The geofence warrant in this case covered a 150-meter radius and roughly 17.5 acres. In its amicus brief, Google pointed out that it has gotten geofence warrants for areas as big as one that covered 2.5 square miles of San Francisco for more than 48 hours of time. 

AU: Ultimately, our goal is for the court to hold that there was a Fourth Amendment violation. We have several arguments. I do think that those sorts of very broad warrants are very troubling. So if it were the case that the court were to hold that geofence warrants are, in some cases, constitutional — and I'm not going to speculate as to whether they will or will not reach that conclusion — I would favor a rule under which any geofence warrants would have to be drawn narrowly and not so broadly as to encompass potentially thousands of people.

RFN: Justice Alito pointed out that Google no longer stores location history and can no longer comply with these warrants. But several other websites and apps do collect and store location history. Is it moot that Google no longer stores it because this ruling would apply to all sorts of other online services?

AU: The opinion would have wider implications than just Google. This particular case involved the search of Google servers, but the collection of location information is a ubiquitous practice. This case attracted a lot of attention from the tech community. There were nearly 30 amicus briefs filed, so obviously a lot of people think that this is an important and live issue, regardless of Google's own business practices. 

RFN: You argued that the geofence warrant in this case qualifies as a general warrant, and those are unconstitutional. But Justice Sotomayor said she disagrees because it identified a place, a crime and a limited timeframe. Why do you believe it is a general warrant and why are general warrants unconstitutional?

AU: I'm not going to speculate on Justice Sotomayor’s view on the case, but I'll just explain the argument that we were making. A general warrant is a warrant that allows the police to search everybody for evidence of a crime, even people who aren't suspected of committing a crime. 

This is a practice that existed before the Declaration of Independence that was truly loathed by the colonists. The police would develop suspicion that people weren't paying taxes and they would just come into every single person's house and try to find goods on which taxes weren't paid or they would rummage through every person's papers without individualized suspicion. A general warrant is a term for a warrant that is not particularized, that doesn't name the place to be searched and the things to be seized. It just allows general authority to the police to rummage through people's possessions. 

In this case, one of the arguments we advanced is that the police are effectively searching every single person's Google account to figure out who was within the particular area. The way these searches work is that the police go to Google and tell Google, ‘Hey, we want you to figure out all the people who were within the geofence,’ which is a search near the time and place of the crime. Everyone has a Google account that stores their location data in their own account so there's no way for Google to identify the people who are near the scene of the crime unless they search every single person's account to find location history that's within the geofence. 

We understand the warrant to search every single person’s Google account, and we're talking about tens of millions here, is akin to a general warrant, which authorized the search of thousands of houses for evidence. This argument hinges on two points. One is that Google, when it does the search, is acting as an agent of the government, which we think it is because it's carrying out a search warrant. Second, peering inside someone's account is equivalent to a search of the account. 

RFN: It seemed like some of the justices agree with your argument that if location history searches are allowed, then searches of all kinds of things stored in the cloud, like photos, emails and documents, could be allowed. Why do you think that if the court allows geofence warrants, it could extend to other content, like photos, documents and emails?

AU: Several of the arguments the government was making would have applied with identical force to emails and documents. The government relied on language in Google's privacy policy, for example, saying that Google reserves the right to respond to search warrants, and that Google, in some cases, could disclose [user data] for public safety purposes. The government interpreted some of those statements in the privacy policy to imply that people had essentially waived any interest in the data, and therefore the government's accessing the data on Google servers just wasn't a search at all. 

But those privacy policy statements apply to all data stored in Google, not just location history, It applies to email as well and documents and photos and calendar entries so, as a result, many of the government's arguments really would imply that there's no protection to data in the cloud at all.

RFN: The government has said the millions of people searched remain anonymous, but you argued that's somewhat illusory because one's movements within the geofence often function as a kind of fingerprint. 

AU: One of the arguments the government made was that people aren't really being searched unless the police know subjectively who they are. So if the police get a list of people's movements in the geofence — like the person who was in the bank, the person who went to the church or the person who entered the bank and left the bank — but they don't know who those people are yet, they haven't really been searched because there's no privacy interest in [police] just seeing anonymous movements. 

We argued that it doesn't matter if they're anonymous — the police still can't look at their possessions. For example, if the police go into your house and read your diary that's a search of your house. Even if the police don't know who owns the house, they still read your diary. We understand that viewing people's movements is the same thing. 

The second argument we advanced is that anonymity is quite illusory. Our expert witness in this case inferred the actual identity of three of the people within the geofence from their movements over a two hour stretch based solely on their movements and public records. It’s often very possible for police to take just one or two hours worth of someone's movements, look at them carefully, compare those to public records and figure out who they are. The idea that anonymity really protects people's privacy is not realistic.

RFN: The government argues that people give this data to Google voluntarily and that if they read the privacy policy, they'll know that they're consenting. 

AU: When you're setting up your phone, you'll just get some vague message saying ‘we might share your location.’ You click yes and you may not realize what you're doing. In this case, Mr. Chatrie used an Android phone. Turns out, when you're setting up Google Assistant on your Android phone, there's language that says that the Google Assistant might not work correctly unless you enable a bunch of services, one of which is location history. People set up their phones and get these messages that their phone won't work unless they click yes, so they click yes. 

People may not have a full understanding of what they're doing and they certainly don't understand that they've suddenly consented to all of their movements being shared with the government. It's true that very general descriptions of location history are provided like we'll keep a record of where you go, but people are not told that every two minutes Google will know their location within three meters and keep it potentially forever and give it to the government if the government asks for it. That level of granularity is not disclosed. It's just not realistic that people understand that when they click yes at 2 a.m. when they're trying to get their phone to work.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering digital privacy, surveillance technologies and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.