Web

Using the Internet? You’re open to warrantless monitoring, court says

stealing internet youre open to warrantless monitoring court saysIf you’re accessing the Internet, be warned: You may be surrendering any expectation of privacy protection from authorities and leaving yourself open to being tracked without a search warrant, according to a new legal ruling issued earlier this month.

A federal court in Pittsburgh last week ruled against a request to suppress evidence in a case surrounding the possible downloading of child pornography, explaining that the man making the request “could have no reasonable expectation of privacy in the signal he was sending to or receiving” from the wireless router he had connected to. The man in question is Richard Stanley, who was indicted earlier this month for possessing child pornography after having been tracked down using a program called “Moocherhunter” that allows users to measure physical distances between wireless routers and devices connected to it.

Stanley was apparently connected to the wireless signal of a neighbor (without said neighbor’s knowledge) when he was downloading the pornography; authorities initially tracked the IP address of the account downloading the porn, which led to the identification of the owner of the wireless router in question, who was soon ruled out of the investigation. From there, police used Moocherhunter to locate Stanley’s signal, and then his actual location, leading to his arrest. Post-arrest, Stanley argued that the authorities should have needed a warrant to use Moocherhunter… but the courts, apparently, disagree.

In her ruling, District Judge Joy Flowers Conti explained, “An internet subscriber does not have a reasonable expectation of privacy in his IP address or the information he provides to his Internet Service Provider, such as Comcast, in order to legally establish an internet connection, and likewise, a person connecting to another person’s wireless router does not have an expectation of privacy in that connection.” Conti likened it to a 1979 case where the Supreme Court ruled that no search warrant was needed to use a device that records what telephone numbers are dialed by a suspect; in both cases, the information is being voluntarily surrendered to a third party, she pointed out, and are therefore not being treated as private or secret information by the suspect.

That’s not enough for everyone, however; the distinction may rest upon whether people are actually even aware that they’re surrendering information in the first place. While it’s clear that someone is dialing a phone number, for example, not everyone understands that connecting to a wireless router means that their computers are releasing identifiable information about their location, after all. Orin Kerr, a law professor and Fourth Amendment expert at the George Washington University, puts it like this: “When you’re connecting to the wireless network, you’re broadcasting a signal, even though you might not know it… This gets to the black box problem. Do you assume the user knows how computers work or not?”

Marketa Sims, the assistant federal public defender who worked with Mr. Stanley on the case in question, is thinking along similar lines: “When Stanley connected to the other person’s router, he didn’t [intentionally] reveal his location,” she said. “The question here is whether the government needs a warrant to find your location when you haven’t broadcast it.” Or, perhaps, the question may be, is ignorance of transmission the same thing as not transmitting at all…?

Product Review

Screen snags aside, the Galaxy Fold is an exciting step toward a foldable future

Samsung's Galaxy Fold is the company's first foldable phone, with two screens, six cameras, and a dual-cell battery. The phone may be delayed due to display issues, but that doesn't stop us from asking -- what's it like to use?
Emerging Tech

Japanese taxis will use facial recognition to target you with ads as you ride

A Japanese startup is trying to reinvent in-taxi advertising by using facial recognition technology to identify the key characteristics of riders and then presenting them with appropriate ads.
Computing

Here's everything you need to know about setting up your wireless router

Want to get Wi-Fi working in your home, but don't know where to start? Here's a quick tutorial outlining the four basic steps needed for most routers. You'll be browsing on your laptop from the couch in no time.
Mobile

These are the key settings to change on the LG G8 ThinQ smartphone

The LG G8 ThinQ is finally available. There are a lot of settings turned off by default that may be useful in improving the experience of using the phone. We've rounded up 11 key settings for you to change on the G8.
Social Media

How to protect yourself from GoFundMe scams before donating

Can you spot a GoFundMe scam? While the fundraising platform says scams make up less than a tenth of one percent of campaigns, some do try to take advantages of others' charity -- like a case last year that made national news.
Computing

House votes to restore net neutrality rules, but effort faces long odds

The U.S. House of Representatives has approved the Save the Internet Act, a measure intended to restore net neutrality rules that were repealed in 2017 by the Federal Communications Commission.
Mobile

The FCC and White House want to bring high-speed internet to rural areas

The FCC and the White House unveiled new initiatives to bring high-speed internet to rural areas, including $20.4 billion in incentives to companies to build infrastructure. The FCC also announced ways to speed up the rollout of 5G.
Web

Search all of Craigslist at once with these great tools on web and mobile

Not finding what you need in your local area? Craigslist can be great for finding goods and services from further afield too. All you need do is learn these tips for how to search all of Craigslist at once.
Computing

Internet Explorer zero-day exploit makes files vulnerable to hacks on Windows PCs

Evidence of an Internet Explorer zero-day exploit capable of letting hackers steal files from Windows PCs was published online by a security researcher who also claims Microsoft knew of the vulnerability and opted not to patch it.
Business

Buying airline tickets too early is no longer a costly mistake, study suggests

When you book can play a big role in the cost of airline tickets -- so when is the best time to book flights? Earlier than you'd think, a new study suggests. Data from CheapAir.com suggests the window of time to buy at the best prices is…
Computing

Report says 20% of all 2018 web traffic came from bad bots

Distil Networks published its annual Bad Bot Report this week and announced that 20% of all web traffic in 2018 came from bad bots. The report had other similarly surprising findings regarding the state of bots as well.
Computing

Google Chrome will get a Reader Mode for distraction-free desktop browsing

If Google's testing of Reader Mode on the Chrome Canary desktop browser is successful, soon all Chrome users will gain access to this feature. Reader Mode strips away irrelevant content on a webpage for distraction-free browsing.
Computing

Worried about your online privacy? We tested the best VPN services

Browsing the web can be less secure than most users would hope. If that concerns you, a virtual private network — aka a VPN — is a decent solution. Check out a few of the best VPN services on the market.
Computing

Want to make calls across the internet for less? Try these great VOIP services

Voice over IP services are getting more and more popular, but there are still a few that stand above the pack. In this guide, we'll give you a few options for the best VOIP services for home and business users.