Skip to main content

Smartphones help catch a terror suspect

By Gary Kessler, Special to CNN
updated 9:27 AM EDT, Wed April 24, 2013
People take photos at a makeshift memorial for victims of the Boston Marathon bombings.
People take photos at a makeshift memorial for victims of the Boston Marathon bombings.
STORY HIGHLIGHTS
  • Gary Kessler: Boston bombing used public's photos, videos at unprecedented rate
  • Criminal cases will rely more on public as thousands take pictures and videos, he says
  • Unmindful of privacy, he says, a community worked together for a greater good
  • Kessler: Crowdsourcing in criminal investigation will happen more and more

Editor's note: Gary C. Kessler is an associate professor of homeland security at Embry-Riddle Aeronautical University in Daytona Beach, Florida, teaching cybersecurity and digital forensics, and president of Gary Kessler Associates, a mobile device forensics and cybersecurity practice, training and consulting company. Kessler is a member of the North Florida and Vermont Internet Crimes Against Children Task Forces.

(CNN) -- The Boston Marathon bombing investigation made use of crowdsourcing to collect photos and video from cell phones and surveillance cameras at an unprecedented level. These pictures were made public a little more than 72 hours after the explosions and the second suspect was arrested 29 hours later.

Forensics is the use of scientific or technical information to answer questions in a court of law. Digital forensics is the branch that focuses on the identification, acquisition and analysis of information found on digital devices: computers, cell phones, digital cameras or any computer-based system.

The concept of law enforcement posting photos of wanted individuals in a public place and asking for assistance is hardly new; walk into any post office and you will still see the FBI Most Wanted poster. Why the post office? Because it used to be the social center of a town, a place where the government and the people regularly came together.

Gary Kessler
Gary Kessler

Fast forward to 2013 and we have thousands of people taking pictures and videos of what everyone expected to be an every day event. Law enforcement agencies were able to use these images to observe the comings and goings of hundreds of people at a certain site at a certain time in order to detect a pattern of behavior with which to identify the two suspects. And most of this imagery came from private citizens.

Personal computers have been around for nearly 30 years. The Internet has been commercially available for 20 years. Mobile phones have been pervasive for more than 10 years and smartphones, in particular, for more than five. Computers, networks and cell phones have increasingly become the record keeper, instrument or target of criminal activity over the last few decades.

Smartphones are everywhere and offer the equivalent of a portable Internet terminal. Not only do cell phones contain a phone book, call history and text messages, but also Web browser history, email, Global Positioning System and other location information. And surprisingly high-quality pictures and video.

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



All of this information will be of value to investigators. They will want to know who the suspects might have been communicating with in the immediate aftermath of the bombings and, again, in the aftermath of their pictures being posted in the media. The larger investigation will undoubtedly examine their text and email messages, social media postings, Web sites visited and calls made over the last few months and years. This digital forensic evidence will help piece together patterns of behavior that could provide insights into the suspects' thoughts and deeds, and even provide new leads.

What does this mean for privacy rights? Consider that when a municipality wants to put up a new camera at an intersection, or purchase a drone, there is often a public outcry. Is the camera an invasion of privacy? Where will it be looking? How will the government use the data? How long will the data be kept? Will it be used to track my movements? At some level, these are good and important questions because this kind of discourse is necessary to frame our Fourth Amendment protections against unreasonable searches.

Yet, in Boston, a lot of the images came not from public-sector cameras but from private-sector cameras: our fellow citizens. Fellow citizens who voluntarily shared their information so that law enforcement could do its job.

Were these people violating the rights of others by sharing their pictures? Well, no, considering that the Bill of Rights was intended to protect us against a tyrannical government rather than from each other. Indeed, it is not clear that the government could have compelled these citizens to turn over their pictures just in case they might be useful; imagine persuading a judge to sign a search warrant on such pure speculation.

Neighbor photographs Boston shootout
The week that changed Boston forever

Yet, citizens stepped forward to offer their help, a clear sign of a community willing to work together for a greater good and one that does not distrust the government.

Although some might claim that these people were surrendering their rights for an element of security, it was the same instinct that made some people run toward the carnage so that they could provide assistance and comfort to friends, family and strangers. They were not surrendering their rights when they helped law enforcement but were empowering themselves as a community.

The U.S. Constitution does not explicitly offer citizens a right of privacy, although many court decisions certainly support such an ideal. Indeed, U.S. Supreme Court Justice Louis D. Brandeis is well known for his observation, "The right to be left alone -- the most comprehensive of rights, and the right most valued by a free people."

Your personal privacy has more to fear from the likes of Facebook and Google than from the government. Commercial entities such as social media sites offer free services and yet make money. How?

We, our information, have become their commodity. They have more money, motivation and resources to use our collected information for their own purposes than the government does. We, as users of social media, self-exploit; we post our information voluntarily. Yet, once posted, we usually lose exclusive ownership of the information and always lose control over it.

Although the use of the crowdsourcing metaphor may be new as it applies to a criminal investigation, it is almost certain we will see more of this in the future. And it is sure to renew questions about how we all are invading each other's privacy and personal space.

It also points to the incredible resiliency of the U.S. Constitution and its ability to guide us in a modern era, yet why it needs constant interpretation. As technologies evolve that the Founders could not have possibly anticipated -- from fully automatic weapons and thermal imagers to satellites and digital technologies -- we have to figure out how to balance our rights as individuals and needs as a society.

Follow @CNNOpinion on Twitter.

Join us at Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Gary Kessler.

ADVERTISEMENT
Part of complete coverage on
updated 12:50 PM EDT, Tue July 29, 2014
LZ Granderson says the cyber-standing ovation given to Robyn Lawley, an Australian plus-size model who posted unretouched photos, shows how crazy Americans' notions of beauty have become
updated 7:56 AM EDT, Mon July 28, 2014
A crisis like the Gaza conflict or the surge of immigrants can be an opportunity for a lame duck president, writes Julian Zelizer
updated 2:22 PM EDT, Sat July 26, 2014
Carol Costello says the league's light punishment sent the message that it didn't consider domestic violence a serious offense
updated 8:51 AM EDT, Mon July 28, 2014
Danny Cevallos says saggy pants aren't the kind of fashion statement protected by the First Amendment.
updated 2:52 PM EDT, Mon July 28, 2014
Margaret Hoover says some GOP legislators support a state's right to allow same-sex marriage and the right of churches, synagogues and mosques not to perform the sacrament
updated 2:31 PM EDT, Mon July 28, 2014
Megan McCracken and Jennifer Moreno say it's unacceptable for states to experiment with new execution procedures without full disclosure
updated 2:50 PM EDT, Mon July 28, 2014
Priya Satia says today's drones for bombardment and surveillance have their roots in the deadly history of Western aerial control of the Middle East that began in World War One
updated 12:35 PM EDT, Mon July 28, 2014
Jeff Yang says it's great to see the comics make an effort at diversifying the halls of justice
updated 11:55 AM EDT, Sat July 26, 2014
Rick Francona says the reported artillery firing from Russian territory is a sign Vladimir Putin has escalated the Ukraine battle
updated 2:22 PM EDT, Sun July 27, 2014
Paul Callan says the fact that appeals delay the death penalty doesn't make it an unconstitutional punishment, as one judge ruled
updated 6:25 PM EDT, Thu July 24, 2014
Pilot Robert Mark says it's been tough for the airline industry after the plane crashes in Ukraine and Taiwan.
updated 11:10 AM EDT, Fri July 25, 2014
Jennifer DeVoe laments efforts to end subsidies that allow working Americans to finally afford health insurance.
updated 11:33 AM EDT, Sat July 26, 2014
Ruti Teitel says assigning a costly and humiliating "collective guilt" to Germany after WWI would end up teaching the global community hard lessons about who to blame for war crimes
updated 8:45 AM EDT, Fri July 25, 2014
John Sutter responds to criticism of his column on the ethics of eating dog.
updated 9:02 AM EDT, Fri July 25, 2014
Frida Ghitis says it's tempting to ignore North Korea's antics as bluster but the cruel regime is dangerous.
updated 2:50 PM EDT, Fri July 25, 2014
To the question "Is Putin evil?" Alexander Motyl says he is evil enough for condemnation by people of good will.
updated 2:03 PM EDT, Thu July 24, 2014
Laurie Garrett: Poor governance, ignorance, hysteria worsen the Ebola epidemic in Sierra Leone, Guinea, Liberia.
updated 9:49 AM EDT, Thu July 24, 2014
Patrick Cronin and Kelley Sayler say the world is seeing nonstate groups such as Ukraine's rebels wielding more power to do harm than ever before
updated 6:05 PM EDT, Wed July 23, 2014
Ukraine ambassador Olexander Motsyk places blame for the MH17 tragedy squarely at the door of Russia
updated 7:42 AM EDT, Thu July 24, 2014
Mark Kramer says Russia and its proxies have a history of shooting down civilian aircraft, often with few repercussions
updated 2:53 PM EDT, Thu July 24, 2014
Les Abend says, with rockets flying over Tel Aviv and missiles shooting down MH17 over Ukraine, a commercial pilot's pre-flight checklist just got much more complicated
updated 9:17 AM EDT, Thu July 24, 2014
Mark Kramer says Russia and its proxies have a history of shooting down civilian aircraft, often with few repercussions
updated 12:37 PM EDT, Thu July 24, 2014
Gerard Jacobs says grieving families and nations need the comfort of traditional rituals to honor the remains of loved ones, particularly in a mass disaster
updated 10:13 AM EDT, Thu July 24, 2014
The idea is difficult to stomach, but John Sutter writes that eating dog is morally equivalent to eating pig, another intelligent animal. If Americans oppose it, they should question their own eating habits as well.
updated 12:30 PM EDT, Wed July 23, 2014
Bill van Esveld says under the laws of war, civilians who do not join in the fight are always to be protected. An International Criminal Court could rule on whether Israeli airstrikes and Hamas rocketing are war crimes.
updated 10:08 AM EDT, Wed July 23, 2014
Gordon Brown says the kidnapped Nigerian girls have been in captivity for 100 days, but the world has not forgotten them.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT