Skip to main content

Smartphones help catch a terror suspect

By Gary Kessler, Special to CNN
April 24, 2013 -- Updated 1327 GMT (2127 HKT)
People take photos at a makeshift memorial for victims of the Boston Marathon bombings.
People take photos at a makeshift memorial for victims of the Boston Marathon bombings.
STORY HIGHLIGHTS
  • Gary Kessler: Boston bombing used public's photos, videos at unprecedented rate
  • Criminal cases will rely more on public as thousands take pictures and videos, he says
  • Unmindful of privacy, he says, a community worked together for a greater good
  • Kessler: Crowdsourcing in criminal investigation will happen more and more

Editor's note: Gary C. Kessler is an associate professor of homeland security at Embry-Riddle Aeronautical University in Daytona Beach, Florida, teaching cybersecurity and digital forensics, and president of Gary Kessler Associates, a mobile device forensics and cybersecurity practice, training and consulting company. Kessler is a member of the North Florida and Vermont Internet Crimes Against Children Task Forces.

(CNN) -- The Boston Marathon bombing investigation made use of crowdsourcing to collect photos and video from cell phones and surveillance cameras at an unprecedented level. These pictures were made public a little more than 72 hours after the explosions and the second suspect was arrested 29 hours later.

Forensics is the use of scientific or technical information to answer questions in a court of law. Digital forensics is the branch that focuses on the identification, acquisition and analysis of information found on digital devices: computers, cell phones, digital cameras or any computer-based system.

The concept of law enforcement posting photos of wanted individuals in a public place and asking for assistance is hardly new; walk into any post office and you will still see the FBI Most Wanted poster. Why the post office? Because it used to be the social center of a town, a place where the government and the people regularly came together.

Gary Kessler
Gary Kessler

Fast forward to 2013 and we have thousands of people taking pictures and videos of what everyone expected to be an every day event. Law enforcement agencies were able to use these images to observe the comings and goings of hundreds of people at a certain site at a certain time in order to detect a pattern of behavior with which to identify the two suspects. And most of this imagery came from private citizens.

Personal computers have been around for nearly 30 years. The Internet has been commercially available for 20 years. Mobile phones have been pervasive for more than 10 years and smartphones, in particular, for more than five. Computers, networks and cell phones have increasingly become the record keeper, instrument or target of criminal activity over the last few decades.

Smartphones are everywhere and offer the equivalent of a portable Internet terminal. Not only do cell phones contain a phone book, call history and text messages, but also Web browser history, email, Global Positioning System and other location information. And surprisingly high-quality pictures and video.

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



All of this information will be of value to investigators. They will want to know who the suspects might have been communicating with in the immediate aftermath of the bombings and, again, in the aftermath of their pictures being posted in the media. The larger investigation will undoubtedly examine their text and email messages, social media postings, Web sites visited and calls made over the last few months and years. This digital forensic evidence will help piece together patterns of behavior that could provide insights into the suspects' thoughts and deeds, and even provide new leads.

What does this mean for privacy rights? Consider that when a municipality wants to put up a new camera at an intersection, or purchase a drone, there is often a public outcry. Is the camera an invasion of privacy? Where will it be looking? How will the government use the data? How long will the data be kept? Will it be used to track my movements? At some level, these are good and important questions because this kind of discourse is necessary to frame our Fourth Amendment protections against unreasonable searches.

Yet, in Boston, a lot of the images came not from public-sector cameras but from private-sector cameras: our fellow citizens. Fellow citizens who voluntarily shared their information so that law enforcement could do its job.

Were these people violating the rights of others by sharing their pictures? Well, no, considering that the Bill of Rights was intended to protect us against a tyrannical government rather than from each other. Indeed, it is not clear that the government could have compelled these citizens to turn over their pictures just in case they might be useful; imagine persuading a judge to sign a search warrant on such pure speculation.

Neighbor photographs Boston shootout
The week that changed Boston forever

Yet, citizens stepped forward to offer their help, a clear sign of a community willing to work together for a greater good and one that does not distrust the government.

Although some might claim that these people were surrendering their rights for an element of security, it was the same instinct that made some people run toward the carnage so that they could provide assistance and comfort to friends, family and strangers. They were not surrendering their rights when they helped law enforcement but were empowering themselves as a community.

The U.S. Constitution does not explicitly offer citizens a right of privacy, although many court decisions certainly support such an ideal. Indeed, U.S. Supreme Court Justice Louis D. Brandeis is well known for his observation, "The right to be left alone -- the most comprehensive of rights, and the right most valued by a free people."

Your personal privacy has more to fear from the likes of Facebook and Google than from the government. Commercial entities such as social media sites offer free services and yet make money. How?

We, our information, have become their commodity. They have more money, motivation and resources to use our collected information for their own purposes than the government does. We, as users of social media, self-exploit; we post our information voluntarily. Yet, once posted, we usually lose exclusive ownership of the information and always lose control over it.

Although the use of the crowdsourcing metaphor may be new as it applies to a criminal investigation, it is almost certain we will see more of this in the future. And it is sure to renew questions about how we all are invading each other's privacy and personal space.

It also points to the incredible resiliency of the U.S. Constitution and its ability to guide us in a modern era, yet why it needs constant interpretation. As technologies evolve that the Founders could not have possibly anticipated -- from fully automatic weapons and thermal imagers to satellites and digital technologies -- we have to figure out how to balance our rights as individuals and needs as a society.

Follow @CNNOpinion on Twitter.

Join us at Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Gary Kessler.

ADVERTISEMENT
Part of complete coverage on
April 15, 2014 -- Updated 1849 GMT (0249 HKT)
Kathleen Blee says the KKK and white power or neo-Nazi groups give haters the purpose and urgency to use violence.
April 15, 2014 -- Updated 1146 GMT (1946 HKT)
Sen. Sheldon Whitehouse and Rep. Henry Waxman say read deep, and you'll see the federal Keystone pipeline report spells out the pipeline is bad news
April 15, 2014 -- Updated 1743 GMT (0143 HKT)
Frida Ghitis says President Obama needs to stop making empty threats against Russia and consider other options
April 15, 2014 -- Updated 2129 GMT (0529 HKT)
Peter Bergen and David Sterman say the Kansas Jewish Center killings are part of a string of lethal violence in the U.S. that outstrips al Qaeda-influenced attacks. Why don't we pay more attention?
April 15, 2014 -- Updated 1641 GMT (0041 HKT)
Danny Cevallos says families of the passengers on Malaysian Airlines Flight 370 need legal counsel
April 14, 2014 -- Updated 1523 GMT (2323 HKT)
David Frum says Russia is on a rampage of mischief while Western leaders and Western alliances charged with keeping the peace hem and haw
April 14, 2014 -- Updated 1156 GMT (1956 HKT)
Most adults make the mistakes of hitting the snooze button and of checking emails first thing in the morning, writes Mel Robbins
April 14, 2014 -- Updated 1754 GMT (0154 HKT)
David Wheeler says as middle-class careers continue to disappear, we need a monthly cash payment to everyone
April 14, 2014 -- Updated 1155 GMT (1955 HKT)
Democrats need to show more political spine when it comes to the issue of taxes.
April 14, 2014 -- Updated 1555 GMT (2355 HKT)
Donna Brazile recalls the 50th Anniversary of the Civil Rights Act as four presidents honored the heroes of the movement and Lyndon Johnson, who signed the law
April 14, 2014 -- Updated 1317 GMT (2117 HKT)
Elmer Smith remembers Chuck Stone, the legendary journalist from Philadelphia who was known as a thorn in the side of police and an advocate for the little guy
April 13, 2014 -- Updated 1856 GMT (0256 HKT)
Al Franken says Comcast, the nation's largest cable provider, wants to acquire Time Warner Cable, the nation's second-largest cable provider. Should we be concerned?
April 11, 2014 -- Updated 1522 GMT (2322 HKT)
Philip Cook and Kristin Goss says the Pennsylvania stabbing attack, which caused grave injury -- but not death, carries a lesson on guns for policymakers
April 11, 2014 -- Updated 1906 GMT (0306 HKT)
Wikipedia lists 105 football movies, but all too many of them are forgettable, writes Mike Downey
April 11, 2014 -- Updated 1432 GMT (2232 HKT)
John Sutter and hundreds of iReporters set out to run marathons after the bombings -- and learned a lot about the culture of running
April 11, 2014 -- Updated 1649 GMT (0049 HKT)
Timothy Stanley says it was cowardly to withdraw the offer of an honorary degree to Ayaan Hirsi Ali. The university should have done its homework on her narrow views and not made the offer
April 11, 2014 -- Updated 1416 GMT (2216 HKT)
Al Awlaki
Almost three years after his death in a 2011 CIA drone strike in Yemen, Anwar al-Awlaki continues to inspire violent jihadist extremists in the U.S, writes Peter Bergen
April 12, 2014 -- Updated 0121 GMT (0921 HKT)
David Bianculli says Colbert is a smart, funny interviewer, but ditching his blowhard persona to take over the mainstream late-night role may cost him fans
April 10, 2014 -- Updated 1731 GMT (0131 HKT)
Rep. Paul Ryan says the Republican budget places its trust in the people, not in Washington
April 10, 2014 -- Updated 2128 GMT (0528 HKT)
Aaron David Miller says Obama isn't to blame for Kerry's lack of progress in resolving Mideast talks
April 14, 2014 -- Updated 1522 GMT (2322 HKT)
David Weinberger says beyond focusing on the horrors of the attack a year ago, it's worth remembering the lessons it taught about strength, the dangers of idle speculation and Boston's solidarity
April 10, 2014 -- Updated 1632 GMT (0032 HKT)
Katherine Newman says the motive for the school stabbing attack in Pennsylvania is not yet known, but research on such rampages turns up similarities in suspects and circumstances
April 11, 2014 -- Updated 1103 GMT (1903 HKT)
Simon Tisdall: Has John Kerry's recent track record left Russia's wily leader ever more convinced of U.S. weakness?
April 10, 2014 -- Updated 1640 GMT (0040 HKT)
Mel Robbins says Nate Scimio deserves credit for acting bravely in a frightening attack and shouldn't be criticized for posting a selfie afterward
April 9, 2014 -- Updated 1839 GMT (0239 HKT)
Wendy Townsend says the Rattlesnake Roundup -- where thousands of pounds of snakes are killed and tormented -- is barbaric
April 10, 2014 -- Updated 1345 GMT (2145 HKT)
Dr. Mary Mulcahy says doctors who tell their patients the truth risk getting bad ratings from them
April 9, 2014 -- Updated 1328 GMT (2128 HKT)
Peggy Drexler says the married Rep. McAllister, caught on video making out with a staffer, won't get a pass from voters who elected him as a Christian conservative with family values
April 9, 2014 -- Updated 1143 GMT (1943 HKT)
David Frum says the president has failed to react strongly to crises in Iran, Syria, Ukraine and Venezuela, encouraging others to act out
April 9, 2014 -- Updated 2057 GMT (0457 HKT)
Eric Liu says Paul Ryan gets it very wrong: The U.S.'s problem is not a culture of poverty, it is a culture of wealth that is destroying the American value linking work and reward
April 9, 2014 -- Updated 1151 GMT (1951 HKT)
Frida Ghitis writes: "We are still seeing the world mostly through men's eyes. We are still hearing it explained to us mostly by men."
April 10, 2014 -- Updated 1408 GMT (2208 HKT)
Chester Wisniewski says the Heartbleed bug shows how we're all tangled together, relying on each other for Internet security
April 9, 2014 -- Updated 1926 GMT (0326 HKT)
Danny Cevallos says an Ohio school that suspended a little kid for pointing his finger at another kid and pretending to shoot shows the growth in "zero tolerance" policies at school run amok
ADVERTISEMENT