All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "873097",
"signature": "Article:873097",
"url": "https://staging.dailymaverick.co.za/article/2021-04-06-5g-opens-the-gates-for-surveillance-on-steroids/",
"shorturl": "https://staging.dailymaverick.co.za/article/873097",
"slug": "5g-opens-the-gates-for-surveillance-on-steroids",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 6,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "5G opens the gates for surveillance on steroids",
"firstPublished": "2021-04-06 00:11:57",
"lastUpdate": "2021-04-06 00:11:57",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "134172",
"name": "Maverick Citizen",
"signature": "Category:134172",
"slug": "maverick-citizen",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-citizen/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 20496,
"contents": "<i><span style=\"font-weight: 400;\">*See more </span></i><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><i><span style=\"font-weight: 400;\">here</span></i></a>\r\n\r\n<span style=\"font-weight: 400;\">Imagine a world where police no longer needed human witnesses. One where they could determine that, while inside your home, you walked exactly 453m between 9.18am and 10.05am? Or perhaps they could prove that you’re lying, since they have medical records reflecting your cardiac rhythms during a specific timeframe? These are actual cases where police in the US traced minute details of people’s lives through their smart devices. In the </span><a href=\"https://edition.cnn.com/2017/04/25/us/fitbit-womans-death-investigation-trnd/index.html\"><span style=\"font-weight: 400;\">former,</span></a><span style=\"font-weight: 400;\"> a woman’s Fitbit proved her husband lied about her movements on the morning of her murder. In the </span><a href=\"https://web.archive.org/web/20170208120124if_/http://www.whio.com/news/data-from-man-pacemaker-led-arson-charges/sDp2XXGPY1EKJkY57sureP/\"><span style=\"font-weight: 400;\">latter,</span></a><span style=\"font-weight: 400;\"> a man’s pacemaker gave him away in an arson investigation. </span>\r\n\r\n<span style=\"font-weight: 400;\">This is what evidence will increasingly look like as we move towards the world of 5G, where smart homes and cities become the norm. While 2G and 3G are still the most widely available networks in South Africa, cities are already changing. Since 2019, </span><a href=\"https://www.forbes.com/sites/tobyshapshak/2019/09/18/let-it-rain-5g-pure-play-operator-rain-launches-africas-first-commercial-5g-network/#5fae0c9c65e8)\"><span style=\"font-weight: 400;\">Rain</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.rcrwireless.com/20200505/5g/vodacom-launches-5g-three-south-african-cities\"><span style=\"font-weight: 400;\">Vodacom</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.reuters.com/article/mtn-group-safrica-5g-idUSL8N2E74Y7\"><span style=\"font-weight: 400;\">MTN</span></a><span style=\"font-weight: 400;\"> have all launched 5G networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">To see the drastic impact of 5G on government surveillance, it helps to take a step back.</span>\r\n\r\n<b>The size of a briefcase</b>\r\n\r\n<span style=\"font-weight: 400;\">In 1979 in Japan, </span><a href=\"https://communities-dominate.blogs.com/brands/2009/11/celebrating-30-years-of-mobile-phones-thank-you-ntt-of-japan.html\"><span style=\"font-weight: 400;\">Nippon Telegraph and Telephone (NTT) introduced the world’s first commercial cellular</span></a><span style=\"font-weight: 400;\"> phone network in Tokyo. This was the start: first-generation – or 1G – cellular phones. By 1984, the 1G car phone service was available throughout Japan. But it was a niche product for the wealthy. </span><a href=\"https://www.in2013dollars.com/us/inflation/1979?amount=2000#:~:text=In%20other%20words%2C%20%242%2C000%20in,1979%20inflation%20rate%20was%2011.35%25\"><span style=\"font-weight: 400;\">Signing up cost $2,000 (about $7,200 or R110,000 today</span></a><span style=\"font-weight: 400;\">). Then, you had to rent a phone for$300 a month (just over $1,080 or R16,000 today). On top of that, calls cost $1 a minute ($3.60 or R54 today). You could get one to carry around too: the size of a briefcase, it weighed about 10kg.</span>\r\n\r\n<span style=\"font-weight: 400;\">1G only allowed </span><a href=\"https://www.brainbridge.be/news/from-1g-to-5g-a-brief-history-of-the-evolution-of-mobile-standards\"><span style=\"font-weight: 400;\">voice calls</span></a><span style=\"font-weight: 400;\">. With </span><a href=\"https://electronics.howstuffworks.com/radio-scanner.htm\"><span style=\"font-weight: 400;\">a radio scanner</span></a><span style=\"font-weight: 400;\">, a spy could tune into conversations as if they were radio programmes.</span>\r\n\r\n<span style=\"font-weight: 400;\">Since the birth of 1G, a new generation of mobile technology has emerged roughly every 10 years (hence the abbreviations 2G, 3G, 4G, and 5G). Starting with 2G in 1991, there was a major change that had a lasting impact on surveillance: communications became digitised. </span><a href=\"https://www.internetsociety.org/encryption/what-is-encryption/?\"><span style=\"font-weight: 400;\">With that came encryption</span></a><span style=\"font-weight: 400;\"> – a mechanism to scramble a communications signal so that the message is incomprehensible to an eavesdropper.</span>\r\n\r\n<span style=\"font-weight: 400;\">There was also a lot more to intercept. Along with better </span><a href=\"https://www.brainbridge.be/news/from-1g-to-5g-a-brief-history-of-the-evolution-of-mobile-standards\"><span style=\"font-weight: 400;\">call quality</span></a><span style=\"font-weight: 400;\"> came texting with Short Message Service (SMS) and audio- and video-sharing with Multimedia Messaging Service (MMS). In 2001, </span><a href=\"https://www.digitaltrends.com/mobile/4g-vs-lte/\"><span style=\"font-weight: 400;\">3G brought internet connection to phones</span></a><span style=\"font-weight: 400;\">. Spies could now also get hold of emails and browsing habits.</span>\r\n\r\n<span style=\"font-weight: 400;\">With 4G, the use of smartphone apps became entrenched. </span><a href=\"https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html\"><span style=\"font-weight: 400;\">Apps collect masses of data about their users.</span></a><span style=\"font-weight: 400;\"> Consequently, government agencies have access to a new form of mass surveillance. For instance, they now buy location data harvested from apps we install on our smartphones. In November 2020, </span><a href=\"https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x\"><i><span style=\"font-weight: 400;\">Vice</span></i><span style=\"font-weight: 400;\"> reported that</span></a><span style=\"font-weight: 400;\"> the US military was purchasing location data taken from several ordinary smartphone apps, including a Muslim prayer app downloaded by 98 million people.</span>\r\n\r\n<span style=\"font-weight: 400;\">But with 5G, the amount of data that authorities can intercept will vastly increase, simply because the new standard is capable of so much more.</span>\r\n\r\n<span style=\"font-weight: 400;\">A major change with 5G, is how fast data downloads from the internet. 4G can download at a maximum speed of around 150 megabits per second (Mbps). </span><a href=\"https://www.digitaltrends.com/mobile/5g-vs-4g/\"><span style=\"font-weight: 400;\">Download speeds for 5G range from one to 10 gigabits per second</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another </span><a href=\"https://blog.stackpath.com/latency/\"><span style=\"font-weight: 400;\">defining feature of 5G is latency</span></a><span style=\"font-weight: 400;\">, and it’s measured in milliseconds (ms). Roughly speaking, it’s how fast data is sent from your computer or smartphone to a destination device (like Facebook’s server), plus the time it takes for that device to process your data. For example, if you update your Facebook status, latency is the time taken from the moment you click “post” to when your post appears on your wall.</span>\r\n\r\n<span style=\"font-weight: 400;\">Whereas 4G’s latency is around 45ms, </span><a href=\"https://www.gsmarena.com/glossary.php3?term=5g\"><span style=\"font-weight: 400;\">5G latency could, in theory, be as low as 1ms</span></a><span style=\"font-weight: 400;\">. You don’t need 5G’s low latency for gaming or streaming movies. But when you need hundreds of machines in a megafactory to talk to each other and react instantaneously, you do. It’s also vital to applications like self-driving cars and remote robotic surgery.</span>\r\n\r\n<span style=\"font-weight: 400;\">Whereas previous generations were all about connecting people, </span><a href=\"https://www.itu.int/en/mediacentre/backgrounders/Pages/5G-fifth-generation-of-mobile-technologies.aspx\"><span style=\"font-weight: 400;\">5G is all about connecting machines</span></a><span style=\"font-weight: 400;\">. Entire cities and homes are set to become dependent on 5G simply to function.</span>\r\n\r\n<b>Billions of devices</b>\r\n\r\n<span style=\"font-weight: 400;\">But one change accompanying 5G expansion is expected to have major implications for surveillance: the proliferation of the </span><a href=\"https://www.researchgate.net/publication/325803863_Defining_the_IoT\"><span style=\"font-weight: 400;\">Internet of Things</span></a><span style=\"font-weight: 400;\"> (IoT). The term refers to everyday appliances with computing power that collect data (through sensors, microphones, or cameras) and send and receive data via the internet. They’re also known as smart devices. Smart TV’s, smartphones and smartwatches are common examples.</span>\r\n\r\n<span style=\"font-weight: 400;\">IoT devices aren’t new. In 2000, LG introduced the first </span><a href=\"https://www.itweb.co.za/content/KA3WwqdlozkqrydZ\"><span style=\"font-weight: 400;\">internet-based smart refrigerator</span></a><span style=\"font-weight: 400;\">. You could use it to send emails, take photos, or order groceries online. But at $20,000 per fridge, </span><a href=\"https://www.gapintelligence.com/blog/are-we-there-yet/\"><span style=\"font-weight: 400;\">the idea never took off</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Yet by 2018, according to Statista, </span><a href=\"https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/\"><span style=\"font-weight: 400;\">there were 22 billion IoT devices connected globally</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">With 5G the number of IoT devices will vastly increase, since 5G has a much greater capacity than preceding generations. The International Telecommunication Union predicts there could be </span><a href=\"https://www.itu.int/en/mediacentre/backgrounders/Pages/5G-fifth-generation-of-mobile-technologies.aspx\"><span style=\"font-weight: 400;\">as many as 50 billion devices</span></a><span style=\"font-weight: 400;\"> connected to the internet come 2025, with the amount of data traffic estimated to increase between 10 and 100 times from 2020 to 2030.</span>\r\n\r\n<span style=\"font-weight: 400;\">With so much more data, these IoT devices will give governments a new surveillance resource. In fact, they’re already making use of it.</span>\r\n\r\n<b>Intimate personal details</b>\r\n\r\n<span style=\"font-weight: 400;\">Take, </span><a href=\"https://www.softwaretestinghelp.com/iot-devices/\"><span style=\"font-weight: 400;\">for instance</span></a><span style=\"font-weight: 400;\">, a voice controller – a speaker with microphones that receive vocal commands. Prominent examples are Amazon Echo and Google Nest, and they’ve been around since the mid-2010s. </span><a href=\"https://www.wired.com/story/star-witness-your-smart-speaker/\"><span style=\"font-weight: 400;\">Police investigators are increasingly approaching the two tech giants for customer data</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">A voice controller (aka a smart speaker) collects intimate details. It recognises your voice, and </span><a href=\"https://techcrunch.com/2017/03/12/alexa-privacy/\"><span style=\"font-weight: 400;\">it “listens” actively</span></a><span style=\"font-weight: 400;\"> in case you command it to switch on the lights, lock the doors, or schedule reminders. You can </span><a href=\"https://www.cnet.com/home/smart-home/connect-google-home-to-your-phone-for-super-convenient-speakerphone-calls-heres-how/\"><span style=\"font-weight: 400;\">synchronise it with your smartphone’s contacts</span></a><span style=\"font-weight: 400;\"> and issue a voice command to initiate a hands-free call. Amazon’s new </span><a href=\"https://www.washingtonpost.com/technology/2021/02/26/amazon-echo-show-10/\"><span style=\"font-weight: 400;\">Echo Show 10</span></a><span style=\"font-weight: 400;\"> has a camera that “follows” you around.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another example that’s been around since 2012 and is popular with police in the US, is the </span><a href=\"https://www.timetoast.com/timelines/evolution-of-doorbells\"><span style=\"font-weight: 400;\">smart doorbell</span></a><span style=\"font-weight: 400;\">. Ring, a company owned by Amazon, offers a </span><a href=\"https://www.youtube.com/watch?v=XAMqqY_2gKM\"><span style=\"font-weight: 400;\">smart doorbell that connects to your home’s wifi network</span></a><span style=\"font-weight: 400;\">. It’s fitted with a video camera, and you can use your smartphone to see who is knocking at your door. </span><a href=\"https://support.ring.com/hc/en-us/articles/360022461232-Motion-Detection-in-Powered-Ring-Devices\"><span style=\"font-weight: 400;\">It records video whenever its motion sensors are triggered</span></a><span style=\"font-weight: 400;\">, and sends alerts to your phone. Recorded footage is stored on Amazon’s servers. In 2019 </span><i><span style=\"font-weight: 400;\">The Washington Post</span></i><span style=\"font-weight: 400;\"> reported that </span><a href=\"https://www.washingtonpost.com/technology/2019/08/28/doorbell-camera-firm-ring-has-partnered-with-police-forces-extending-surveillance-reach/\"><span style=\"font-weight: 400;\">Ring joined forces with 400 US police agencies to engage customers in sharing footage</span></a><span style=\"font-weight: 400;\"> to assist investigations (much to the chagrin of civil liberties organisations). </span>\r\n\r\n<span style=\"font-weight: 400;\">Then there are smart devices that police haven’t taken a fancy to (yet). But, if they did, </span><a href=\"https://robots.ieee.org/robots/kuri/\"><span style=\"font-weight: 400;\">a social robot for home entertainment</span></a><span style=\"font-weight: 400;\"> captures a lot of intimate data. With sensors, an HD camera, microphones and speakers, it automatically navigates its way around your house, while it plays music and takes snapshots of your daily activities.</span>\r\n\r\n<span style=\"font-weight: 400;\">Information won’t just be generated in your home. If two driverless cars crashed, </span><a href=\"https://www.cnet.com/news/5-amazing-things-youll-be-able-to-do-with-5g/\"><span style=\"font-weight: 400;\">data collected by their sensors or cameras could reveal detailed information about the accident</span></a><span style=\"font-weight: 400;\">. Police could also give up blockades and simply pull smart cars over by taking control of them remotely. According to </span><a href=\"https://www.cnet.com/news/5-amazing-things-youll-be-able-to-do-with-5g/\"><span style=\"font-weight: 400;\">Professor Elizabeth Joh</span></a><span style=\"font-weight: 400;\"> of the Davis School of Law at the University of California, “Autonomous cars are not yet commonplace, but soon they will be. Yet little attention has been paid to how autonomous cars will change policing. Vehicles equipped with artificial intelligence and connected both to the internet and one another may be subject to automated stops. The issue is already being discussed as a theoretical possibility and as a desirable policing tool.”</span>\r\n\r\n<b>Burgeoning field</b>\r\n\r\n<span style=\"font-weight: 400;\">Along with increased data generation, the digital forensics field has burgeoned, according to </span><a href=\"https://www.sciencedirect.com/science/article/pii/S2589871X20300152?via%3Dihub\"><span style=\"font-weight: 400;\">a review paper from Interpol</span></a><span style=\"font-weight: 400;\">. The growth of smart technology and apps is a major factor driving this expansion. The global </span><a href=\"https://www.prnewswire.com/in/news-releases/digital-forensics-market-worth-968-billion-usd-by-2022-675981253.html\"><span style=\"font-weight: 400;\">digital forensics market will be worth $9.68-billion come 2022</span></a><span style=\"font-weight: 400;\">, according to MarketsandMarkets. Behind the increase are tougher government regulations, escalating cyberattacks, and mass adoption of IoT devices. </span>\r\n\r\n<span style=\"font-weight: 400;\">Also trending upward: police’s reliance on smart devices as a source of evidence. There was </span><a href=\"https://nest.com/legal/transparency-report/\"><span style=\"font-weight: 400;\">a steady increase in police requests for Google Nest data from 2015 to 2018</span></a><span style=\"font-weight: 400;\">, but after that Google stopped issuing separate statistics for cops’ Nest data applications. Amazon doesn’t issue separate statistics for police requests of IoT data either, but 2020 saw the highest number of police applications yet – some 3,105 from January to June. That’s up 24% compared to the same period in 2019. </span><a href=\"https://www.wired.com/story/star-witness-your-smart-speaker/\"><span style=\"font-weight: 400;\">Experts suggest</span></a><span style=\"font-weight: 400;\"> that the increasing number of smart devices is contributing to this trend.</span>\r\n\r\n<a href=\"https://privacyinternational.org/timelineiotincourt\"><span style=\"font-weight: 400;\">IoT devices have featured in some serious criminal cases</span></a><span style=\"font-weight: 400;\">. Fitbits, smart watches, and voice controllers have provided evidence in rape and murder investigations in Europe, Australia and the US. But how police use IoT devices to investigate brings “</span><a href=\"https://privacyinternational.org/long-read/3026/my-fridge-my-witness\"><span style=\"font-weight: 400;\">new challenges and risks</span></a><span style=\"font-weight: 400;\">”, says civil liberties group Privacy International. The organisation warns that laws are outdated, and people lack awareness of the data that IoT devices generate.</span>\r\n\r\n<b>South Africa</b>\r\n\r\n<span style=\"font-weight: 400;\">That lack of awareness stems partly from the fact that data generated and transmitted by smart devices </span><a href=\"http://www.mdpi.com/2079-9292/9/8/1215/pdf\"><span style=\"font-weight: 400;\">can be stored in a variety of formats and places</span></a><span style=\"font-weight: 400;\">. Formats include audio, video or any other data file depending on the device’s purpose. Data could be on the device itself, on company servers, or on the smartphone used to control the device.</span>\r\n\r\n<span style=\"font-weight: 400;\">That means if police in South Africa want data related to a smart device, they’ll need multiple subpoena laws.</span>\r\n\r\n<span style=\"font-weight: 400;\">To learn more about the local context, </span><i><span style=\"font-weight: 400;\">Daily Maverick</span></i><span style=\"font-weight: 400;\"> spoke to digital forensic specialist Peter Fryer. He’s spent two decades in the field, working with the South African Police Service (SAPS) on cybercrime investigations, delivering expert testimony, and training police in the Southern African Development Community in digital forensics, evidence handling and first responder protocols.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer said the SAPS hasn’t started making use of smart devices in investigations yet, since too few people use them. But if police wanted to get hold of smart device data stored on servers in the US by tech giants like Amazon, Google or Facebook, they’d use the </span><a href=\"https://2009-2017.state.gov/j/inl/rls/nrcrpt/2012/vol2/184110.htm\"><span style=\"font-weight: 400;\">mutual legal assistance treaty</span></a><span style=\"font-weight: 400;\"> (MLAT) between SA and the US. It’s a legal framework through which two countries assist each other in criminal investigations.</span>\r\n\r\n<span style=\"font-weight: 400;\">These US tech companies distinguish between two data types: content and non-content. The former includes items like emails, WhatsApp messages, and social media posts (for instance, what you wrote on your Facebook wall). With smart devices, content can include photos, visual and audio recordings, and biometric information (in the case of body-worn devices).</span>\r\n\r\n<span style=\"font-weight: 400;\">Non-content information includes data </span><i><span style=\"font-weight: 400;\">about</span></i><span style=\"font-weight: 400;\"> your account and device. It includes subscriber registration information (like your name, surname, phone number, email and physical address), billing information, the date you created your account, and the times your device connected to the net. Police can also request your device’s Internet Protocol (IP) address – a unique number assigned to every device connected to the internet. An </span><a href=\"https://whatismyipaddress.com/email-header\"><span style=\"font-weight: 400;\">email header</span></a><span style=\"font-weight: 400;\"> can also be disclosed. This includes the subject line, email addresses of the sender and all receivers, the email’s time-stamp, and the sender’s IP address. </span>\r\n\r\n<span style=\"font-weight: 400;\">Here’s an example of an email header in Gmail: </span>\r\n\r\n<img loading=\"lazy\" class=\"aligncenter size-full wp-image-873165\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inset-1-figure-1-example-of-email-header.png\" alt=\"\" width=\"1974\" height=\"698\" />\r\n\r\n<span style=\"font-weight: 400;\"> </span><b>‘An arduous process’</b>\r\n\r\n<span style=\"font-weight: 400;\">But convincing companies to hand over information is a tough sell.</span>\r\n\r\n<span style=\"font-weight: 400;\">“It’s an arduous process,” says Fryer. “It can take weeks or months – you almost have to prove your case upfront.” He describes the procedure SAPS must follow (via the US-SA MLAT): First, they’d have to approach SA’s National Prosecuting Authority (NPA). The NPA would draft the request for information, which then goes to the US embassy. Here, the US State Department staff designated to deal with law enforcement examine the request, and then passes it on to the US Department of Justice, which then approaches the tech company.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says police’s motivation must satisfy South African and foreign legislation. He says tech giants have “robust and mature law enforcement liaison” staff that understand the law, but also know they must protect users’ privacy. </span><a href=\"https://policies.google.com/terms/information-requests\"><span style=\"font-weight: 400;\">Google</span></a><span style=\"font-weight: 400;\">, for instance, evaluates requests in terms of US laws, the law of the foreign country, the </span><a href=\"https://globalnetworkinitiative.org/gni-principles/\"><span style=\"font-weight: 400;\">Global Network Initiative’s Principles on Freedom of Expression and Privacy</span></a><span style=\"font-weight: 400;\">, and its own policies.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says requests must be specific: “It can’t be a blanket application, like ‘I want the identity of everybody that tweeted #zumamustfall’. You have to approach it on a case-by-case basis. You have to show that the user you are making the inquiry about is actually in South Africa, that the suspicious act was committed in South Africa, and that the act is genuinely a crime in terms of South African law.”</span>\r\n\r\n<span style=\"font-weight: 400;\">A </span><a href=\"https://techcrunch.com/2018/11/14/amazon-echo-recordings-judge-murder-case/\"><span style=\"font-weight: 400;\">US murder case from November 2018</span></a><span style=\"font-weight: 400;\"> demonstrates Fryer’s point. A judge ordered Amazon to release audio recorded by an Echo and stored on its servers. The court also ordered Amazon to hand over data about all devices that connected to the speaker. </span><a href=\"https://assets.documentcloud.org/documents/5113287/Timothy-Verrill-order-for-Amazon-Echo-data.pdf\"><span style=\"font-weight: 400;\">This extract of the court order</span></a><span style=\"font-weight: 400;\"> (courtesy of TechCrunch shows the level of detail required.:</span>\r\n\r\n<img loading=\"lazy\" class=\"aligncenter size-full wp-image-873167\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inset-2-figure-2-court-order-extract.png\" alt=\"\" width=\"1588\" height=\"1224\" />\r\n\r\n<span style=\"font-weight: 400;\">Amazon’s </span><a href=\"https://d1.awsstatic.com/certifications/Amazon_LawEnforcement_Guidelines.pdf\"><span style=\"font-weight: 400;\">law enforcement assistance policy</span></a><span style=\"font-weight: 400;\"> says it won’t disclose content without a search warrant or court order, and </span><a href=\"https://www.bbc.com/news/technology-39063113\"><span style=\"font-weight: 400;\">even then they will fight it in court</span></a><span style=\"font-weight: 400;\"> if they think police are overreaching. </span>\r\n\r\n<a href=\"https://policies.google.com/terms/information-requests\"><span style=\"font-weight: 400;\">Google takes a similar stance</span></a><span style=\"font-weight: 400;\">: “If a request asks for too much information, we try to narrow it, and in some cases we object to producing any information at all,” its policy reads.</span>\r\n\r\n<span style=\"font-weight: 400;\">And that’s how it plays out in practice. Says Fryer: “They’ll review the application and say, ‘Yes, no, maybe.’ It can be a one-liner saying that your request doesn’t satisfy their requirements. They could say, ‘We’ll give you IP addresses but we won’t give you subscriber information.’ ”</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says there’s another way for SAPS to get a bit of joy from tech giants. Most companies have online query forms for law enforcement agencies who need assistance. (See, for example, </span><a href=\"https://lers.google.com/signup_v2/requestaccount\"><span style=\"font-weight: 400;\">Google</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.facebook.com/records/login/\"><span style=\"font-weight: 400;\">Facebook</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://ler.amazon.com\"><span style=\"font-weight: 400;\">Amazon</span></a><span style=\"font-weight: 400;\">.) Police must send the request from an official government email address, says Fryer.</span>\r\n\r\n<span style=\"font-weight: 400;\">“They can request the preservation of an account.” (With account preservation, the company retains account information for a limited period to give police time to get a subpoena or court order.) But for anything substantial, says Fryer, they have to jump through the hoops.</span>\r\n\r\n<b>It can lead to other information</b>\r\n\r\n<span style=\"font-weight: 400;\">But basic information leads to much more. In 2013, the Technology Analysis Branch of the Office of the Privacy Commissioner of Canada </span><a href=\"https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/ip_201305/\"><span style=\"font-weight: 400;\">conducted some tests</span></a><span style=\"font-weight: 400;\"> to demonstrate this. With readily available online tools (including Google) they could uncover intimate details without further court orders or special software. These new details could then be used to apply for further court orders. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"wp-image-873168 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inste-3-Figure-3-table_non-content-information.png\" alt=\"\" width=\"1504\" height=\"1062\" /> Police can find detailed information based on a single piece of non-content data without needing further court permissions or special software. Compiled by: H Swart.</p>\r\n\r\n<span style=\"font-weight: 400;\">Source: </span><a href=\"https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/ip_201305/\"><i><span style=\"font-weight: 400;\">Technology Analysis Branch of the Office of the Privacy Commissioner of Canada, May 2013</span></i></a><i><span style=\"font-weight: 400;\">.</span></i><b> </b>\r\n\r\n<span style=\"font-weight: 400;\">The researchers concluded: “As information technologies become more common… and the more they become an extension of our very selves, the more sensitive and revealing subscriber identification information becomes.”</span>\r\n\r\n<span style=\"font-weight: 400;\">However, SA authorities seldom get what they want from tech giants. Companies like Amazon and Google release statistics on police requests for information biannually (although neither releases specific data on smart devices, or the crimes involved). </span><a href=\"https://transparencyreport.google.com/user-data/overview?hl=en&user_data_produced=authority:ZA;series:compliance&lu=dlr_requests&user_requests_report_period=series:requests,accounts;authority:ZA;time:&legal_process_breakdown=expanded:0&dlr_requests=authority:ZA;time\"><span style=\"font-weight: 400;\">Google reports</span></a><span style=\"font-weight: 400;\"> date from July 2013 to December 2020. In all those years, SA made 28 applications. Only four were granted. The requests from SA to Amazon are </span><a href=\"https://d1.awsstatic.com/certifications/Information_Request_Report_December_2020.pdf\"><span style=\"font-weight: 400;\">so low that the company doesn’t report</span></a><span style=\"font-weight: 400;\"> on them.</span>\r\n\r\n<b>The alternative</b>\r\n\r\n<span style=\"font-weight: 400;\">Yet, there is another avenue for police: the device itself. It’s simpler, </span><a href=\"http://www.saflii.org/cgi-bin/disp.pl?file=za/cases/ZAWCHC/2015/118.html&query=%22section%20205%22%20AND%20%22computer%22\"><span style=\"font-weight: 400;\">as this 2015 court ruling shows</span></a><span style=\"font-weight: 400;\">. A group accused of abalone poaching had their cellphones seized. Police used Section 20 of the Criminal Procedures Act; it allows them to search and seize evidence with a court order.</span>\r\n\r\n<span style=\"font-weight: 400;\">The suspects’ lawyer argued the order only applied to the phones’ physical hardware, and not the data. He argued that phones were actually “mini computers”, since they had software, could search the web, send emails, and store photos. (The jury is still out as to whether all smart devices are actually computers, but there seems to be a general consensus that </span><a href=\"https://www.researchgate.net/publication/325049063_What_is_a_smart_device_-_a_conceptualisation_within_the_paradigm_of_the_internet_of_things\"><span style=\"font-weight: 400;\">IoT devices share some defining characteristics with computers</span></a><span style=\"font-weight: 400;\">. These include their abilities to connect to the internet, compute autonomously, and transfer data.)</span>\r\n\r\n<span style=\"font-weight: 400;\">But the judge sided with the prosecution, who argued that accessing a phone’s data after seizing it was akin to opening a seized safe to examine the contents. The judge thought it nonsensical that police could confiscate an electronic device, but be forbidden from accessing the data on its hard drive.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer explains that if police wanted to seize a smart device, it would be exactly the same as searching your home for drugs, guns, laptops or phones: “The search warrant allows them to search any electronic media or anything that has the ability to store, transmit or transact with data.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Yet, there’s a catch. What information is contained in IoT devices, which typically don’t have much memory? In 2019, </span><a href=\"https://privacyinternational.org/news-analysis/2819/mystery-amazon-echo-data\"><span style=\"font-weight: 400;\">Privacy International tried to find out what data was stored on an Amazon Echo</span></a><span style=\"font-weight: 400;\">. Despite their efforts, they remained unsure, concluding: “As connected devices... play an increasing role in criminal proceedings, we are concerned that... we do not know what data connected devices in the home may collect, including accidentally. We do not know what they store on the device.”</span>\r\n\r\n<b>And one or two other ways</b>\r\n\r\n<span style=\"font-weight: 400;\">Still, there are other routes to private data. Often, a smart device is linked to an app on a smartphone. If you didn’t have a pin or other mechanism (like a fingerprint scan) to secure your phone, anyone could read your emails or access the smart device through the phone’s apps.</span>\r\n\r\n<span style=\"font-weight: 400;\">Daily Maverick asked Fryer whether police could seize a smartphone and access your accounts this way.</span>\r\n\r\n<span style=\"font-weight: 400;\">He said it’s possible, and explained there’s an ongoing debate in SA about whether authorities should require a two-step warrant to access data on electronic devices. Police would have to apply for a warrant to seize the device, and then apply again to access the data on it. The physical location of the device, and the data on the device, are treated as two separate places.</span>\r\n\r\n<span style=\"font-weight: 400;\">Says Fryer: “It prevents police from simply getting access to your phone and just flicking through every message.” Once police have someone’s phone, they’d have to apply for a separate warrant to access the accounts or any data or apps on the phone. “You’d have to create a relatively narrow investigative scope.”</span>\r\n\r\n<span style=\"font-weight: 400;\">But right now, there’s no two-step process. And, says Fryer, there’s other legislation through which police can access an electronic device, but they generally don’t use it. “The Electronic Communications and Transactions Act (ECTA) has a provision that can compel someone to give up their username and password. I don’t think it’s being properly applied.” In short, police aren’t taking full advantage of the law, says Fryer.</span>\r\n\r\n<span style=\"font-weight: 400;\">Although far cheaper than 1G phones, smart devices still aren’t entirely affordable. For instance, </span><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf)%20shows%20that%20smart%20speaker%20penetration%20in%20SA%20didn%E2%80%99t%20reach%2010%,%20making%20it%20a%20%E2%80%9Cniche%20product\"><span style=\"font-weight: 400;\">Deloitte’s Global Mobile Consumer Survey for 2019</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><span style=\"font-weight: 400;\">South Africans will have to wait for 5G networks to roll out sufficiently</span></a><span style=\"font-weight: 400;\"> – and prices to drop – before IoT devices truly become mainstream. But,</span> <span style=\"font-weight: 400;\">although the tech is new, <a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\">old legislation already paves the way</a> for the long arm of the law to get into these luxury personalised gadgets. How this ultimately impacts personal privacy remains to be seen.</span><b> DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Heidi Swart is a journalist who reports on surveillance and data privacy. This story was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s Department of Journalism, Film and TV and Unisa’s Department of Communication Science. </span></i>",
"teaser": "5G opens the gates for surveillance on steroids",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "509",
"name": "Heidi Swart",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/heidiswart.jpg",
"url": "https://staging.dailymaverick.co.za/author/heidiswart/",
"editorialName": "heidiswart",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2072",
"name": "Surveillance",
"url": "https://staging.dailymaverick.co.za/keyword/surveillance/",
"slug": "surveillance",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Surveillance",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "8322",
"name": "Smartphones",
"url": "https://staging.dailymaverick.co.za/keyword/smartphones/",
"slug": "smartphones",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Smartphones",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "40675",
"name": "personal information",
"url": "https://staging.dailymaverick.co.za/keyword/personal-information/",
"slug": "personal-information",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "personal information",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "51252",
"name": "Information technology",
"url": "https://staging.dailymaverick.co.za/keyword/information-technology/",
"slug": "information-technology",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Information technology",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "145165",
"name": "5G",
"url": "https://staging.dailymaverick.co.za/keyword/5g/",
"slug": "5g",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "5G",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348145",
"name": "voice controller",
"url": "https://staging.dailymaverick.co.za/keyword/voice-controller/",
"slug": "voice-controller",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "voice controller",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348146",
"name": "privacy rights",
"url": "https://staging.dailymaverick.co.za/keyword/privacy-rights/",
"slug": "privacy-rights",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "privacy rights",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "12715",
"name": "",
"description": "<i><span style=\"font-weight: 400;\">*See more </span></i><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><i><span style=\"font-weight: 400;\">here</span></i></a>\r\n\r\n<span style=\"font-weight: 400;\">Imagine a world where police no longer needed human witnesses. One where they could determine that, while inside your home, you walked exactly 453m between 9.18am and 10.05am? Or perhaps they could prove that you’re lying, since they have medical records reflecting your cardiac rhythms during a specific timeframe? These are actual cases where police in the US traced minute details of people’s lives through their smart devices. In the </span><a href=\"https://edition.cnn.com/2017/04/25/us/fitbit-womans-death-investigation-trnd/index.html\"><span style=\"font-weight: 400;\">former,</span></a><span style=\"font-weight: 400;\"> a woman’s Fitbit proved her husband lied about her movements on the morning of her murder. In the </span><a href=\"https://web.archive.org/web/20170208120124if_/http://www.whio.com/news/data-from-man-pacemaker-led-arson-charges/sDp2XXGPY1EKJkY57sureP/\"><span style=\"font-weight: 400;\">latter,</span></a><span style=\"font-weight: 400;\"> a man’s pacemaker gave him away in an arson investigation. </span>\r\n\r\n<span style=\"font-weight: 400;\">This is what evidence will increasingly look like as we move towards the world of 5G, where smart homes and cities become the norm. While 2G and 3G are still the most widely available networks in South Africa, cities are already changing. Since 2019, </span><a href=\"https://www.forbes.com/sites/tobyshapshak/2019/09/18/let-it-rain-5g-pure-play-operator-rain-launches-africas-first-commercial-5g-network/#5fae0c9c65e8)\"><span style=\"font-weight: 400;\">Rain</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.rcrwireless.com/20200505/5g/vodacom-launches-5g-three-south-african-cities\"><span style=\"font-weight: 400;\">Vodacom</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.reuters.com/article/mtn-group-safrica-5g-idUSL8N2E74Y7\"><span style=\"font-weight: 400;\">MTN</span></a><span style=\"font-weight: 400;\"> have all launched 5G networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">To see the drastic impact of 5G on government surveillance, it helps to take a step back.</span>\r\n\r\n<b>The size of a briefcase</b>\r\n\r\n<span style=\"font-weight: 400;\">In 1979 in Japan, </span><a href=\"https://communities-dominate.blogs.com/brands/2009/11/celebrating-30-years-of-mobile-phones-thank-you-ntt-of-japan.html\"><span style=\"font-weight: 400;\">Nippon Telegraph and Telephone (NTT) introduced the world’s first commercial cellular</span></a><span style=\"font-weight: 400;\"> phone network in Tokyo. This was the start: first-generation – or 1G – cellular phones. By 1984, the 1G car phone service was available throughout Japan. But it was a niche product for the wealthy. </span><a href=\"https://www.in2013dollars.com/us/inflation/1979?amount=2000#:~:text=In%20other%20words%2C%20%242%2C000%20in,1979%20inflation%20rate%20was%2011.35%25\"><span style=\"font-weight: 400;\">Signing up cost $2,000 (about $7,200 or R110,000 today</span></a><span style=\"font-weight: 400;\">). Then, you had to rent a phone for$300 a month (just over $1,080 or R16,000 today). On top of that, calls cost $1 a minute ($3.60 or R54 today). You could get one to carry around too: the size of a briefcase, it weighed about 10kg.</span>\r\n\r\n<span style=\"font-weight: 400;\">1G only allowed </span><a href=\"https://www.brainbridge.be/news/from-1g-to-5g-a-brief-history-of-the-evolution-of-mobile-standards\"><span style=\"font-weight: 400;\">voice calls</span></a><span style=\"font-weight: 400;\">. With </span><a href=\"https://electronics.howstuffworks.com/radio-scanner.htm\"><span style=\"font-weight: 400;\">a radio scanner</span></a><span style=\"font-weight: 400;\">, a spy could tune into conversations as if they were radio programmes.</span>\r\n\r\n<span style=\"font-weight: 400;\">Since the birth of 1G, a new generation of mobile technology has emerged roughly every 10 years (hence the abbreviations 2G, 3G, 4G, and 5G). Starting with 2G in 1991, there was a major change that had a lasting impact on surveillance: communications became digitised. </span><a href=\"https://www.internetsociety.org/encryption/what-is-encryption/?\"><span style=\"font-weight: 400;\">With that came encryption</span></a><span style=\"font-weight: 400;\"> – a mechanism to scramble a communications signal so that the message is incomprehensible to an eavesdropper.</span>\r\n\r\n<span style=\"font-weight: 400;\">There was also a lot more to intercept. Along with better </span><a href=\"https://www.brainbridge.be/news/from-1g-to-5g-a-brief-history-of-the-evolution-of-mobile-standards\"><span style=\"font-weight: 400;\">call quality</span></a><span style=\"font-weight: 400;\"> came texting with Short Message Service (SMS) and audio- and video-sharing with Multimedia Messaging Service (MMS). In 2001, </span><a href=\"https://www.digitaltrends.com/mobile/4g-vs-lte/\"><span style=\"font-weight: 400;\">3G brought internet connection to phones</span></a><span style=\"font-weight: 400;\">. Spies could now also get hold of emails and browsing habits.</span>\r\n\r\n<span style=\"font-weight: 400;\">With 4G, the use of smartphone apps became entrenched. </span><a href=\"https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html\"><span style=\"font-weight: 400;\">Apps collect masses of data about their users.</span></a><span style=\"font-weight: 400;\"> Consequently, government agencies have access to a new form of mass surveillance. For instance, they now buy location data harvested from apps we install on our smartphones. In November 2020, </span><a href=\"https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x\"><i><span style=\"font-weight: 400;\">Vice</span></i><span style=\"font-weight: 400;\"> reported that</span></a><span style=\"font-weight: 400;\"> the US military was purchasing location data taken from several ordinary smartphone apps, including a Muslim prayer app downloaded by 98 million people.</span>\r\n\r\n<span style=\"font-weight: 400;\">But with 5G, the amount of data that authorities can intercept will vastly increase, simply because the new standard is capable of so much more.</span>\r\n\r\n<span style=\"font-weight: 400;\">A major change with 5G, is how fast data downloads from the internet. 4G can download at a maximum speed of around 150 megabits per second (Mbps). </span><a href=\"https://www.digitaltrends.com/mobile/5g-vs-4g/\"><span style=\"font-weight: 400;\">Download speeds for 5G range from one to 10 gigabits per second</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another </span><a href=\"https://blog.stackpath.com/latency/\"><span style=\"font-weight: 400;\">defining feature of 5G is latency</span></a><span style=\"font-weight: 400;\">, and it’s measured in milliseconds (ms). Roughly speaking, it’s how fast data is sent from your computer or smartphone to a destination device (like Facebook’s server), plus the time it takes for that device to process your data. For example, if you update your Facebook status, latency is the time taken from the moment you click “post” to when your post appears on your wall.</span>\r\n\r\n<span style=\"font-weight: 400;\">Whereas 4G’s latency is around 45ms, </span><a href=\"https://www.gsmarena.com/glossary.php3?term=5g\"><span style=\"font-weight: 400;\">5G latency could, in theory, be as low as 1ms</span></a><span style=\"font-weight: 400;\">. You don’t need 5G’s low latency for gaming or streaming movies. But when you need hundreds of machines in a megafactory to talk to each other and react instantaneously, you do. It’s also vital to applications like self-driving cars and remote robotic surgery.</span>\r\n\r\n<span style=\"font-weight: 400;\">Whereas previous generations were all about connecting people, </span><a href=\"https://www.itu.int/en/mediacentre/backgrounders/Pages/5G-fifth-generation-of-mobile-technologies.aspx\"><span style=\"font-weight: 400;\">5G is all about connecting machines</span></a><span style=\"font-weight: 400;\">. Entire cities and homes are set to become dependent on 5G simply to function.</span>\r\n\r\n<b>Billions of devices</b>\r\n\r\n<span style=\"font-weight: 400;\">But one change accompanying 5G expansion is expected to have major implications for surveillance: the proliferation of the </span><a href=\"https://www.researchgate.net/publication/325803863_Defining_the_IoT\"><span style=\"font-weight: 400;\">Internet of Things</span></a><span style=\"font-weight: 400;\"> (IoT). The term refers to everyday appliances with computing power that collect data (through sensors, microphones, or cameras) and send and receive data via the internet. They’re also known as smart devices. Smart TV’s, smartphones and smartwatches are common examples.</span>\r\n\r\n<span style=\"font-weight: 400;\">IoT devices aren’t new. In 2000, LG introduced the first </span><a href=\"https://www.itweb.co.za/content/KA3WwqdlozkqrydZ\"><span style=\"font-weight: 400;\">internet-based smart refrigerator</span></a><span style=\"font-weight: 400;\">. You could use it to send emails, take photos, or order groceries online. But at $20,000 per fridge, </span><a href=\"https://www.gapintelligence.com/blog/are-we-there-yet/\"><span style=\"font-weight: 400;\">the idea never took off</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Yet by 2018, according to Statista, </span><a href=\"https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/\"><span style=\"font-weight: 400;\">there were 22 billion IoT devices connected globally</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">With 5G the number of IoT devices will vastly increase, since 5G has a much greater capacity than preceding generations. The International Telecommunication Union predicts there could be </span><a href=\"https://www.itu.int/en/mediacentre/backgrounders/Pages/5G-fifth-generation-of-mobile-technologies.aspx\"><span style=\"font-weight: 400;\">as many as 50 billion devices</span></a><span style=\"font-weight: 400;\"> connected to the internet come 2025, with the amount of data traffic estimated to increase between 10 and 100 times from 2020 to 2030.</span>\r\n\r\n<span style=\"font-weight: 400;\">With so much more data, these IoT devices will give governments a new surveillance resource. In fact, they’re already making use of it.</span>\r\n\r\n<b>Intimate personal details</b>\r\n\r\n<span style=\"font-weight: 400;\">Take, </span><a href=\"https://www.softwaretestinghelp.com/iot-devices/\"><span style=\"font-weight: 400;\">for instance</span></a><span style=\"font-weight: 400;\">, a voice controller – a speaker with microphones that receive vocal commands. Prominent examples are Amazon Echo and Google Nest, and they’ve been around since the mid-2010s. </span><a href=\"https://www.wired.com/story/star-witness-your-smart-speaker/\"><span style=\"font-weight: 400;\">Police investigators are increasingly approaching the two tech giants for customer data</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">A voice controller (aka a smart speaker) collects intimate details. It recognises your voice, and </span><a href=\"https://techcrunch.com/2017/03/12/alexa-privacy/\"><span style=\"font-weight: 400;\">it “listens” actively</span></a><span style=\"font-weight: 400;\"> in case you command it to switch on the lights, lock the doors, or schedule reminders. You can </span><a href=\"https://www.cnet.com/home/smart-home/connect-google-home-to-your-phone-for-super-convenient-speakerphone-calls-heres-how/\"><span style=\"font-weight: 400;\">synchronise it with your smartphone’s contacts</span></a><span style=\"font-weight: 400;\"> and issue a voice command to initiate a hands-free call. Amazon’s new </span><a href=\"https://www.washingtonpost.com/technology/2021/02/26/amazon-echo-show-10/\"><span style=\"font-weight: 400;\">Echo Show 10</span></a><span style=\"font-weight: 400;\"> has a camera that “follows” you around.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another example that’s been around since 2012 and is popular with police in the US, is the </span><a href=\"https://www.timetoast.com/timelines/evolution-of-doorbells\"><span style=\"font-weight: 400;\">smart doorbell</span></a><span style=\"font-weight: 400;\">. Ring, a company owned by Amazon, offers a </span><a href=\"https://www.youtube.com/watch?v=XAMqqY_2gKM\"><span style=\"font-weight: 400;\">smart doorbell that connects to your home’s wifi network</span></a><span style=\"font-weight: 400;\">. It’s fitted with a video camera, and you can use your smartphone to see who is knocking at your door. </span><a href=\"https://support.ring.com/hc/en-us/articles/360022461232-Motion-Detection-in-Powered-Ring-Devices\"><span style=\"font-weight: 400;\">It records video whenever its motion sensors are triggered</span></a><span style=\"font-weight: 400;\">, and sends alerts to your phone. Recorded footage is stored on Amazon’s servers. In 2019 </span><i><span style=\"font-weight: 400;\">The Washington Post</span></i><span style=\"font-weight: 400;\"> reported that </span><a href=\"https://www.washingtonpost.com/technology/2019/08/28/doorbell-camera-firm-ring-has-partnered-with-police-forces-extending-surveillance-reach/\"><span style=\"font-weight: 400;\">Ring joined forces with 400 US police agencies to engage customers in sharing footage</span></a><span style=\"font-weight: 400;\"> to assist investigations (much to the chagrin of civil liberties organisations). </span>\r\n\r\n<span style=\"font-weight: 400;\">Then there are smart devices that police haven’t taken a fancy to (yet). But, if they did, </span><a href=\"https://robots.ieee.org/robots/kuri/\"><span style=\"font-weight: 400;\">a social robot for home entertainment</span></a><span style=\"font-weight: 400;\"> captures a lot of intimate data. With sensors, an HD camera, microphones and speakers, it automatically navigates its way around your house, while it plays music and takes snapshots of your daily activities.</span>\r\n\r\n<span style=\"font-weight: 400;\">Information won’t just be generated in your home. If two driverless cars crashed, </span><a href=\"https://www.cnet.com/news/5-amazing-things-youll-be-able-to-do-with-5g/\"><span style=\"font-weight: 400;\">data collected by their sensors or cameras could reveal detailed information about the accident</span></a><span style=\"font-weight: 400;\">. Police could also give up blockades and simply pull smart cars over by taking control of them remotely. According to </span><a href=\"https://www.cnet.com/news/5-amazing-things-youll-be-able-to-do-with-5g/\"><span style=\"font-weight: 400;\">Professor Elizabeth Joh</span></a><span style=\"font-weight: 400;\"> of the Davis School of Law at the University of California, “Autonomous cars are not yet commonplace, but soon they will be. Yet little attention has been paid to how autonomous cars will change policing. Vehicles equipped with artificial intelligence and connected both to the internet and one another may be subject to automated stops. The issue is already being discussed as a theoretical possibility and as a desirable policing tool.”</span>\r\n\r\n<b>Burgeoning field</b>\r\n\r\n<span style=\"font-weight: 400;\">Along with increased data generation, the digital forensics field has burgeoned, according to </span><a href=\"https://www.sciencedirect.com/science/article/pii/S2589871X20300152?via%3Dihub\"><span style=\"font-weight: 400;\">a review paper from Interpol</span></a><span style=\"font-weight: 400;\">. The growth of smart technology and apps is a major factor driving this expansion. The global </span><a href=\"https://www.prnewswire.com/in/news-releases/digital-forensics-market-worth-968-billion-usd-by-2022-675981253.html\"><span style=\"font-weight: 400;\">digital forensics market will be worth $9.68-billion come 2022</span></a><span style=\"font-weight: 400;\">, according to MarketsandMarkets. Behind the increase are tougher government regulations, escalating cyberattacks, and mass adoption of IoT devices. </span>\r\n\r\n<span style=\"font-weight: 400;\">Also trending upward: police’s reliance on smart devices as a source of evidence. There was </span><a href=\"https://nest.com/legal/transparency-report/\"><span style=\"font-weight: 400;\">a steady increase in police requests for Google Nest data from 2015 to 2018</span></a><span style=\"font-weight: 400;\">, but after that Google stopped issuing separate statistics for cops’ Nest data applications. Amazon doesn’t issue separate statistics for police requests of IoT data either, but 2020 saw the highest number of police applications yet – some 3,105 from January to June. That’s up 24% compared to the same period in 2019. </span><a href=\"https://www.wired.com/story/star-witness-your-smart-speaker/\"><span style=\"font-weight: 400;\">Experts suggest</span></a><span style=\"font-weight: 400;\"> that the increasing number of smart devices is contributing to this trend.</span>\r\n\r\n<a href=\"https://privacyinternational.org/timelineiotincourt\"><span style=\"font-weight: 400;\">IoT devices have featured in some serious criminal cases</span></a><span style=\"font-weight: 400;\">. Fitbits, smart watches, and voice controllers have provided evidence in rape and murder investigations in Europe, Australia and the US. But how police use IoT devices to investigate brings “</span><a href=\"https://privacyinternational.org/long-read/3026/my-fridge-my-witness\"><span style=\"font-weight: 400;\">new challenges and risks</span></a><span style=\"font-weight: 400;\">”, says civil liberties group Privacy International. The organisation warns that laws are outdated, and people lack awareness of the data that IoT devices generate.</span>\r\n\r\n<b>South Africa</b>\r\n\r\n<span style=\"font-weight: 400;\">That lack of awareness stems partly from the fact that data generated and transmitted by smart devices </span><a href=\"http://www.mdpi.com/2079-9292/9/8/1215/pdf\"><span style=\"font-weight: 400;\">can be stored in a variety of formats and places</span></a><span style=\"font-weight: 400;\">. Formats include audio, video or any other data file depending on the device’s purpose. Data could be on the device itself, on company servers, or on the smartphone used to control the device.</span>\r\n\r\n<span style=\"font-weight: 400;\">That means if police in South Africa want data related to a smart device, they’ll need multiple subpoena laws.</span>\r\n\r\n<span style=\"font-weight: 400;\">To learn more about the local context, </span><i><span style=\"font-weight: 400;\">Daily Maverick</span></i><span style=\"font-weight: 400;\"> spoke to digital forensic specialist Peter Fryer. He’s spent two decades in the field, working with the South African Police Service (SAPS) on cybercrime investigations, delivering expert testimony, and training police in the Southern African Development Community in digital forensics, evidence handling and first responder protocols.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer said the SAPS hasn’t started making use of smart devices in investigations yet, since too few people use them. But if police wanted to get hold of smart device data stored on servers in the US by tech giants like Amazon, Google or Facebook, they’d use the </span><a href=\"https://2009-2017.state.gov/j/inl/rls/nrcrpt/2012/vol2/184110.htm\"><span style=\"font-weight: 400;\">mutual legal assistance treaty</span></a><span style=\"font-weight: 400;\"> (MLAT) between SA and the US. It’s a legal framework through which two countries assist each other in criminal investigations.</span>\r\n\r\n<span style=\"font-weight: 400;\">These US tech companies distinguish between two data types: content and non-content. The former includes items like emails, WhatsApp messages, and social media posts (for instance, what you wrote on your Facebook wall). With smart devices, content can include photos, visual and audio recordings, and biometric information (in the case of body-worn devices).</span>\r\n\r\n<span style=\"font-weight: 400;\">Non-content information includes data </span><i><span style=\"font-weight: 400;\">about</span></i><span style=\"font-weight: 400;\"> your account and device. It includes subscriber registration information (like your name, surname, phone number, email and physical address), billing information, the date you created your account, and the times your device connected to the net. Police can also request your device’s Internet Protocol (IP) address – a unique number assigned to every device connected to the internet. An </span><a href=\"https://whatismyipaddress.com/email-header\"><span style=\"font-weight: 400;\">email header</span></a><span style=\"font-weight: 400;\"> can also be disclosed. This includes the subject line, email addresses of the sender and all receivers, the email’s time-stamp, and the sender’s IP address. </span>\r\n\r\n<span style=\"font-weight: 400;\">Here’s an example of an email header in Gmail: </span>\r\n\r\n<img class=\"aligncenter size-full wp-image-873165\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inset-1-figure-1-example-of-email-header.png\" alt=\"\" width=\"1974\" height=\"698\" />\r\n\r\n<span style=\"font-weight: 400;\"> </span><b>‘An arduous process’</b>\r\n\r\n<span style=\"font-weight: 400;\">But convincing companies to hand over information is a tough sell.</span>\r\n\r\n<span style=\"font-weight: 400;\">“It’s an arduous process,” says Fryer. “It can take weeks or months – you almost have to prove your case upfront.” He describes the procedure SAPS must follow (via the US-SA MLAT): First, they’d have to approach SA’s National Prosecuting Authority (NPA). The NPA would draft the request for information, which then goes to the US embassy. Here, the US State Department staff designated to deal with law enforcement examine the request, and then passes it on to the US Department of Justice, which then approaches the tech company.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says police’s motivation must satisfy South African and foreign legislation. He says tech giants have “robust and mature law enforcement liaison” staff that understand the law, but also know they must protect users’ privacy. </span><a href=\"https://policies.google.com/terms/information-requests\"><span style=\"font-weight: 400;\">Google</span></a><span style=\"font-weight: 400;\">, for instance, evaluates requests in terms of US laws, the law of the foreign country, the </span><a href=\"https://globalnetworkinitiative.org/gni-principles/\"><span style=\"font-weight: 400;\">Global Network Initiative’s Principles on Freedom of Expression and Privacy</span></a><span style=\"font-weight: 400;\">, and its own policies.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says requests must be specific: “It can’t be a blanket application, like ‘I want the identity of everybody that tweeted #zumamustfall’. You have to approach it on a case-by-case basis. You have to show that the user you are making the inquiry about is actually in South Africa, that the suspicious act was committed in South Africa, and that the act is genuinely a crime in terms of South African law.”</span>\r\n\r\n<span style=\"font-weight: 400;\">A </span><a href=\"https://techcrunch.com/2018/11/14/amazon-echo-recordings-judge-murder-case/\"><span style=\"font-weight: 400;\">US murder case from November 2018</span></a><span style=\"font-weight: 400;\"> demonstrates Fryer’s point. A judge ordered Amazon to release audio recorded by an Echo and stored on its servers. The court also ordered Amazon to hand over data about all devices that connected to the speaker. </span><a href=\"https://assets.documentcloud.org/documents/5113287/Timothy-Verrill-order-for-Amazon-Echo-data.pdf\"><span style=\"font-weight: 400;\">This extract of the court order</span></a><span style=\"font-weight: 400;\"> (courtesy of TechCrunch shows the level of detail required.:</span>\r\n\r\n<img class=\"aligncenter size-full wp-image-873167\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inset-2-figure-2-court-order-extract.png\" alt=\"\" width=\"1588\" height=\"1224\" />\r\n\r\n<span style=\"font-weight: 400;\">Amazon’s </span><a href=\"https://d1.awsstatic.com/certifications/Amazon_LawEnforcement_Guidelines.pdf\"><span style=\"font-weight: 400;\">law enforcement assistance policy</span></a><span style=\"font-weight: 400;\"> says it won’t disclose content without a search warrant or court order, and </span><a href=\"https://www.bbc.com/news/technology-39063113\"><span style=\"font-weight: 400;\">even then they will fight it in court</span></a><span style=\"font-weight: 400;\"> if they think police are overreaching. </span>\r\n\r\n<a href=\"https://policies.google.com/terms/information-requests\"><span style=\"font-weight: 400;\">Google takes a similar stance</span></a><span style=\"font-weight: 400;\">: “If a request asks for too much information, we try to narrow it, and in some cases we object to producing any information at all,” its policy reads.</span>\r\n\r\n<span style=\"font-weight: 400;\">And that’s how it plays out in practice. Says Fryer: “They’ll review the application and say, ‘Yes, no, maybe.’ It can be a one-liner saying that your request doesn’t satisfy their requirements. They could say, ‘We’ll give you IP addresses but we won’t give you subscriber information.’ ”</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer says there’s another way for SAPS to get a bit of joy from tech giants. Most companies have online query forms for law enforcement agencies who need assistance. (See, for example, </span><a href=\"https://lers.google.com/signup_v2/requestaccount\"><span style=\"font-weight: 400;\">Google</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.facebook.com/records/login/\"><span style=\"font-weight: 400;\">Facebook</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://ler.amazon.com\"><span style=\"font-weight: 400;\">Amazon</span></a><span style=\"font-weight: 400;\">.) Police must send the request from an official government email address, says Fryer.</span>\r\n\r\n<span style=\"font-weight: 400;\">“They can request the preservation of an account.” (With account preservation, the company retains account information for a limited period to give police time to get a subpoena or court order.) But for anything substantial, says Fryer, they have to jump through the hoops.</span>\r\n\r\n<b>It can lead to other information</b>\r\n\r\n<span style=\"font-weight: 400;\">But basic information leads to much more. In 2013, the Technology Analysis Branch of the Office of the Privacy Commissioner of Canada </span><a href=\"https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/ip_201305/\"><span style=\"font-weight: 400;\">conducted some tests</span></a><span style=\"font-weight: 400;\"> to demonstrate this. With readily available online tools (including Google) they could uncover intimate details without further court orders or special software. These new details could then be used to apply for further court orders. </span>\r\n\r\n[caption id=\"attachment_873168\" align=\"aligncenter\" width=\"1504\"]<img class=\"wp-image-873168 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/heidi-smart-5g-inste-3-Figure-3-table_non-content-information.png\" alt=\"\" width=\"1504\" height=\"1062\" /> Police can find detailed information based on a single piece of non-content data without needing further court permissions or special software. Compiled by: H Swart.[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Source: </span><a href=\"https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/ip_201305/\"><i><span style=\"font-weight: 400;\">Technology Analysis Branch of the Office of the Privacy Commissioner of Canada, May 2013</span></i></a><i><span style=\"font-weight: 400;\">.</span></i><b> </b>\r\n\r\n<span style=\"font-weight: 400;\">The researchers concluded: “As information technologies become more common… and the more they become an extension of our very selves, the more sensitive and revealing subscriber identification information becomes.”</span>\r\n\r\n<span style=\"font-weight: 400;\">However, SA authorities seldom get what they want from tech giants. Companies like Amazon and Google release statistics on police requests for information biannually (although neither releases specific data on smart devices, or the crimes involved). </span><a href=\"https://transparencyreport.google.com/user-data/overview?hl=en&user_data_produced=authority:ZA;series:compliance&lu=dlr_requests&user_requests_report_period=series:requests,accounts;authority:ZA;time:&legal_process_breakdown=expanded:0&dlr_requests=authority:ZA;time\"><span style=\"font-weight: 400;\">Google reports</span></a><span style=\"font-weight: 400;\"> date from July 2013 to December 2020. In all those years, SA made 28 applications. Only four were granted. The requests from SA to Amazon are </span><a href=\"https://d1.awsstatic.com/certifications/Information_Request_Report_December_2020.pdf\"><span style=\"font-weight: 400;\">so low that the company doesn’t report</span></a><span style=\"font-weight: 400;\"> on them.</span>\r\n\r\n<b>The alternative</b>\r\n\r\n<span style=\"font-weight: 400;\">Yet, there is another avenue for police: the device itself. It’s simpler, </span><a href=\"http://www.saflii.org/cgi-bin/disp.pl?file=za/cases/ZAWCHC/2015/118.html&query=%22section%20205%22%20AND%20%22computer%22\"><span style=\"font-weight: 400;\">as this 2015 court ruling shows</span></a><span style=\"font-weight: 400;\">. A group accused of abalone poaching had their cellphones seized. Police used Section 20 of the Criminal Procedures Act; it allows them to search and seize evidence with a court order.</span>\r\n\r\n<span style=\"font-weight: 400;\">The suspects’ lawyer argued the order only applied to the phones’ physical hardware, and not the data. He argued that phones were actually “mini computers”, since they had software, could search the web, send emails, and store photos. (The jury is still out as to whether all smart devices are actually computers, but there seems to be a general consensus that </span><a href=\"https://www.researchgate.net/publication/325049063_What_is_a_smart_device_-_a_conceptualisation_within_the_paradigm_of_the_internet_of_things\"><span style=\"font-weight: 400;\">IoT devices share some defining characteristics with computers</span></a><span style=\"font-weight: 400;\">. These include their abilities to connect to the internet, compute autonomously, and transfer data.)</span>\r\n\r\n<span style=\"font-weight: 400;\">But the judge sided with the prosecution, who argued that accessing a phone’s data after seizing it was akin to opening a seized safe to examine the contents. The judge thought it nonsensical that police could confiscate an electronic device, but be forbidden from accessing the data on its hard drive.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fryer explains that if police wanted to seize a smart device, it would be exactly the same as searching your home for drugs, guns, laptops or phones: “The search warrant allows them to search any electronic media or anything that has the ability to store, transmit or transact with data.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Yet, there’s a catch. What information is contained in IoT devices, which typically don’t have much memory? In 2019, </span><a href=\"https://privacyinternational.org/news-analysis/2819/mystery-amazon-echo-data\"><span style=\"font-weight: 400;\">Privacy International tried to find out what data was stored on an Amazon Echo</span></a><span style=\"font-weight: 400;\">. Despite their efforts, they remained unsure, concluding: “As connected devices... play an increasing role in criminal proceedings, we are concerned that... we do not know what data connected devices in the home may collect, including accidentally. We do not know what they store on the device.”</span>\r\n\r\n<b>And one or two other ways</b>\r\n\r\n<span style=\"font-weight: 400;\">Still, there are other routes to private data. Often, a smart device is linked to an app on a smartphone. If you didn’t have a pin or other mechanism (like a fingerprint scan) to secure your phone, anyone could read your emails or access the smart device through the phone’s apps.</span>\r\n\r\n<span style=\"font-weight: 400;\">Daily Maverick asked Fryer whether police could seize a smartphone and access your accounts this way.</span>\r\n\r\n<span style=\"font-weight: 400;\">He said it’s possible, and explained there’s an ongoing debate in SA about whether authorities should require a two-step warrant to access data on electronic devices. Police would have to apply for a warrant to seize the device, and then apply again to access the data on it. The physical location of the device, and the data on the device, are treated as two separate places.</span>\r\n\r\n<span style=\"font-weight: 400;\">Says Fryer: “It prevents police from simply getting access to your phone and just flicking through every message.” Once police have someone’s phone, they’d have to apply for a separate warrant to access the accounts or any data or apps on the phone. “You’d have to create a relatively narrow investigative scope.”</span>\r\n\r\n<span style=\"font-weight: 400;\">But right now, there’s no two-step process. And, says Fryer, there’s other legislation through which police can access an electronic device, but they generally don’t use it. “The Electronic Communications and Transactions Act (ECTA) has a provision that can compel someone to give up their username and password. I don’t think it’s being properly applied.” In short, police aren’t taking full advantage of the law, says Fryer.</span>\r\n\r\n<span style=\"font-weight: 400;\">Although far cheaper than 1G phones, smart devices still aren’t entirely affordable. For instance, </span><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf)%20shows%20that%20smart%20speaker%20penetration%20in%20SA%20didn%E2%80%99t%20reach%2010%,%20making%20it%20a%20%E2%80%9Cniche%20product\"><span style=\"font-weight: 400;\">Deloitte’s Global Mobile Consumer Survey for 2019</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><span style=\"font-weight: 400;\">South Africans will have to wait for 5G networks to roll out sufficiently</span></a><span style=\"font-weight: 400;\"> – and prices to drop – before IoT devices truly become mainstream. But,</span> <span style=\"font-weight: 400;\">although the tech is new, <a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\">old legislation already paves the way</a> for the long arm of the law to get into these luxury personalised gadgets. How this ultimately impacts personal privacy remains to be seen.</span><b> DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Heidi Swart is a journalist who reports on surveillance and data privacy. This story was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s Department of Journalism, Film and TV and Unisa’s Department of Communication Science. </span></i>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/F3whzgxBxcKvMzk1Wi41OySniEA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/tHu-guVUVvU7gh-nhn4dv7O3iRk=/450x0/smart/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/iT0ffVOEdEAvbWfH92kuVkzTfbM=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/-ZFvBykJJ6sHJPPrcN1edsIvuNk=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/gCNi8G2lYtKFP5dn_Nx9jESwZHM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/F3whzgxBxcKvMzk1Wi41OySniEA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/tHu-guVUVvU7gh-nhn4dv7O3iRk=/450x0/smart/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/iT0ffVOEdEAvbWfH92kuVkzTfbM=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/-ZFvBykJJ6sHJPPrcN1edsIvuNk=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/gCNi8G2lYtKFP5dn_Nx9jESwZHM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-smart-5G.jpg",
"type": "image"
}
],
"summary": "It’s the beginning: 5G will bring radical changes in how we live, with far-reaching implications for privacy and surveillance. Although the tech is new, decades-old legislation* already paves the way for South African authorities to access citizens’ information through their personal smart devices.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "5G opens the gates for surveillance on steroids",
"search_description": "<i><span style=\"font-weight: 400;\">*See more </span></i><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><i><span",
"social_title": "5G opens the gates for surveillance on steroids",
"social_description": "<i><span style=\"font-weight: 400;\">*See more </span></i><a href=\"https://www2.deloitte.com/content/dam/Deloitte/za/Documents/technology-media-telecommunications/za-GMCS-2019-final-report.pdf\"><i><span",
"social_image": ""
},
"cached": true,
"access_allowed": true
}