{"id":34113,"date":"2020-03-30T15:32:51","date_gmt":"2020-03-30T15:32:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31076\/Federal-Officials-Are-Using-Your-Cellphone-Data-To-Respond-To-The-Outbreak.html"},"modified":"2020-03-30T15:32:51","modified_gmt":"2020-03-30T15:32:51","slug":"federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/","title":{"rendered":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak"},"content":{"rendered":"<div class=\"img-wrapper sc-1eow4w5-2 gfolHV\" contenteditable=\"false\" data-syndicationrights=\"false\" readability=\"7\">\n<div class=\"image-hydration-wrapper sc-1eow4w5-3 iJyiXs\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Illustration for article titled Federal Officials Are Using Your Cellphone Data to Respond to the Outbreak: Report\" data-srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,q_80,w_80\/x2qcesnswvnnykeg47th.jpg 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,fl_progressive,q_80,w_320\/x2qcesnswvnnykeg47th.jpg 320w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,fl_progressive,q_80,w_470\/x2qcesnswvnnykeg47th.jpg 470w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,q_80,w_800\/x2qcesnswvnnykeg47th.jpg 800w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,q_80,w_1600\/x2qcesnswvnnykeg47th.jpg 1600w\" draggable=\"auto\" data-chomp-id=\"x2qcesnswvnnykeg47th\" data-format=\"jpg\" data-alt=\"Illustration for article titled Federal Officials Are Using Your Cellphone Data to Respond to the Outbreak: Report\" data-anim-src><\/div>\n<\/div>\n<p>Photo: Spencer Platt (Getty)<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">The Centers for Disease Control and Prevention has teamed up with state and local governments across America to track people\u2019s cellphone location data and trace the novel coronavirus\u2019s spread, according to a new <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.wsj.com\/articles\/government-tracking-how-people-move-around-in-coronavirus-pandemic-11585393202&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.wsj.com\/articles\/government-tracking-how-people-move-around-in-coronavirus-pandemic-11585393202\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street Journal<\/a><\/span> report.<\/p>\n<p class=\"sc-77igqf-0 hJpRRP\">Mobile advertising companies\u2014as opposed to the cellphone carriers themselves\u2014have been forwarding information from users \u201cin certain areas of geographic interest\u201d to federal authorities by way of the CDC, people familiar with the matter told the Wall Street Journal. It\u2019s apparently all part of a bid to create a nationwide government portal that monitors the outbreak using geolocation data from as many as 500 cities.<strong>&nbsp;<\/strong><\/p>\n<div id=\"swappable-mobile-ad-container\" class=\"js_ad-mobile-dynamic swappable-mobile-ad-container js_ad-dynamic ad-mobile-dynamic movable-ad bxm4mm-4 liWXlp\">\n<div class=\"ad-unit ad-mobile bxm4mm-5 eZvXLs\">\n<p>Advertisement<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">Officials argue this information, which has been anonymized and aggregated, can help them tailor their epidemic response to the virus\u2019s spread as well as map out the outbreak\u2019s economic impact using variables like how many miles a person drove or how many shops they visited.<\/p>\n<p class=\"sc-77igqf-0 hJpRRP\">This government surveillance (to use a loaded conspiracy buzzword, that, in this case, seems pretty spot-on) can also cue authorities in on whether people are following <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.cdc.gov\/coronavirus\/2019-ncov\/community\/index.html&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.cdc.gov\/coronavirus\/2019-ncov\/community\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">CDC social distancing guidelines<\/a><\/span> or official shelter-in-place mandates. In one case the Wall Street Journal cited, researchers contacted the police after determining via geolocation data that large groups of New Yorkers were still visiting Brooklyn\u2019s Prospect Park despite warning notices.<\/p>\n<div class=\"bxm4mm-11 ciBKcm\">\n<aside class=\"sc-1auy74q-0 hgqaKZ\" readability=\"0.11702127659574\">\n<div class=\"sc-1auy74q-3 sc-1auy74q-5 fBhlna\" readability=\"0.81914893617021\">\n<div class=\"sc-1auy74q-21 FzHZb\">\n<div class=\"sc-1auy74q-7 bqGLhh\">\n<div class=\"js_lazy-image sc-1auy74q-15 kPsBOf\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,q_80,w_80\/bvn0paywvfhoxmyrqv5g.jpg 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,fl_progressive,q_80,w_320\/bvn0paywvfhoxmyrqv5g.jpg 320w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,fl_progressive,q_80,w_470\/bvn0paywvfhoxmyrqv5g.jpg 470w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,q_80,w_800\/bvn0paywvfhoxmyrqv5g.jpg 800w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,q_80,w_1600\/bvn0paywvfhoxmyrqv5g.jpg 1600w\" sizes=\"320px\" draggable=\"auto\" data-chomp-id=\"bvn0paywvfhoxmyrqv5g\" data-format=\"jpg\" data-anim-src><\/div>\n<\/div>\n<\/div><\/div>\n<p><span class=\"sc-1auy74q-19 djmGRD\">G\/O Media may get a commission<\/span><\/p>\n<\/div>\n<\/aside>\n<\/div>\n<aside class=\"inset--story branded-item branded-item--gizmodo sc-1rh3ayr-5 kIoxhb\" data-commerce-source=\"inset\" readability=\"13.135416666667\">\n<div class=\"js_lazy-image sc-1rh3ayr-1 iNvMiS\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_180,q_80,w_320\/szvvjkbigg4rwomjytym.jpg 320w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_264,q_80,w_470\/szvvjkbigg4rwomjytym.jpg 470w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_450,q_80,w_800\/szvvjkbigg4rwomjytym.jpg 800w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_675,q_80,w_1200\/szvvjkbigg4rwomjytym.jpg 1200w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,fl_progressive,g_center,h_900,q_80,w_1600\/szvvjkbigg4rwomjytym.jpg 1600w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,q_80,w_80\/szvvjkbigg4rwomjytym.jpg 80w\" sizes=\"(max-width: 480px) 200px, 260px\" draggable=\"auto\" data-chomp-id=\"szvvjkbigg4rwomjytym\" data-format=\"jpg\" data-anim-src><\/div>\n<\/div>\n<\/aside>\n<p class=\"sc-77igqf-0 hJpRRP\">Even though the data has purportedly been stripped of any identifiable information, this still feels like an Orwellian nightmare, one that\u2019s already begun raising several red flags among privacy activists. In an interview with the Wall Street Journal, one such privacy researcher and activist, Wolfie Christl, said the industry was \u201ccovidwashing\u201d its invasive practices and products as a justification for sharing metadata. The term is a reference to the disease, covid-19, caused by the novel coronavirus outbreak.<\/p>\n<div id class=\"js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad bxm4mm-4 liWXlp\">\n<div class=\"ad-unit ad-mobile bxm4mm-5 eZvXLs\">\n<p>Advertisement<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">\u201cIn the light of the emerging disaster, it may be appropriate to make use of aggregate analytics based on consumer data in some cases, even if data is being gathered secretly or illegally by companies. As true anonymization of location data is nearly impossible, strong legal safeguards are mandatory,\u201d Christl told the outlet.<\/p>\n<p class=\"sc-77igqf-0 hJpRRP\">Grosser still, regulations for these mobile advertisers have yet to be clearly defined in existing privacy law, particularly since cellphone users often opt-in to these company\u2019s tracking measures and the data shared with authorities contains no identifiable information.<\/p>\n<div id class=\"js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad bxm4mm-4 liWXlp\">\n<div class=\"ad-unit ad-mobile bxm4mm-5 eZvXLs\">\n<p>Advertisement<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">Different rules exist for telecom carriers, though, several of which told the Wall Street Journal that the U.S. government had not requested metadata from them at this time. That may be because officials are seeking that same kind of information from other tech giants instead; the <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.washingtonpost.com\/technology\/2020\/03\/17\/white-house-location-data-coronavirus\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.washingtonpost.com\/technology\/2020\/03\/17\/white-house-location-data-coronavirus\/\" target=\"_blank\" rel=\"noopener noreferrer\">Washington Post<\/a><\/span> recently reported that federal authorities were in \u201cactive talks\u201d with Facebook, Google, and other tech companies about obtaining anonymized, aggregated data to monitor whether users are adhering to official health ordinances.<\/p>\n<p class=\"sc-77igqf-0 hJpRRP\">Governments worldwide have begun implementing similar surveillance to help shape their covid-19 responses. Telecom companies in Italy, Germany, and Austria have already admitted to sharing users\u2019 geolocation data with authorities, per a <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.reuters.com\/article\/us-health-coronavirus-europe-telecoms\/european-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.reuters.com\/article\/us-health-coronavirus-europe-telecoms\/european-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2\" target=\"_blank\" rel=\"noopener noreferrer\">Reuters<\/a><\/span> report. <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.politico.eu\/article\/european-commission-mobile-phone-data-thierry-breton-coronavirus-covid19\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.politico.eu\/article\/european-commission-mobile-phone-data-thierry-breton-coronavirus-covid19\/\" target=\"_blank\" rel=\"noopener noreferrer\">Last week<\/a><\/span>, the European Union\u2019s internal market commissioner, Thierry Breton, pressured the region\u2019s largest telecom companies to share anonymized metadata from their customers\u2019 cellphones to follow the virus\u2019s spread and use that information to triage medical supplies.<\/p>\n<div id class=\"js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad bxm4mm-4 liWXlp\">\n<div class=\"ad-unit ad-mobile bxm4mm-5 eZvXLs\">\n<p>Advertisement<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">Even more invasive measures have been deployed across Asia in an attempt to curb the virus\u2019s spread. Authorities in <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.reuters.com\/article\/us-health-coronavirus-europe-telecoms\/european-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.reuters.com\/article\/us-health-coronavirus-europe-telecoms\/european-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2\" target=\"_blank\" rel=\"noopener noreferrer\">China, Taiwan, and South Korea<\/a><\/span> have used aggregated metadata to enforce quarantine orders as well as to identify which individual\u2019s contacts had tested positive for covid-19.<\/p>\n<p class=\"sc-77igqf-0 hJpRRP\">China also teamed up with Alibaba Group and Tencent,<strong>&nbsp;<\/strong>two of the largest tech giants in Asia, to employ <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/china-enlists-tech-titans-to-help-it-track-coronavirus-1841750720&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/china-enlists-tech-titans-to-help-it-track-coronavirus-1841750720\">color-coded QR codes<\/a><\/span> tied to a resident\u2019s ID number. These codes designate an individual\u2019s freedom of movement based on their likelihood to spread the virus as determined by a symptom survey. While not immediately clear, it was later discovered that this system also shared personal information like location metadata and identification numbers with local authorities so police could monitor their movements, according to a <span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.nytimes.com\/2020\/03\/01\/business\/china-coronavirus-surveillance.html&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.nytimes.com\/2020\/03\/01\/business\/china-coronavirus-surveillance.html\" target=\"_blank\" rel=\"noopener noreferrer\">New York Times report<\/a><\/span>.<\/p>\n<div id class=\"js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad bxm4mm-4 liWXlp\">\n<div class=\"ad-unit ad-mobile bxm4mm-5 eZvXLs\">\n<p>Advertisement<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"sc-77igqf-0 hJpRRP\">[<span><a class=\"sc-145m8ut-0 gaHZkC js_link sc-1out364-0 fwjlmD\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.wsj.com\/articles\/government-tracking-how-people-move-around-in-coronavirus-pandemic-11585393202&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.wsj.com\/articles\/government-tracking-how-people-move-around-in-coronavirus-pandemic-11585393202\" target=\"_blank\" rel=\"noopener noreferrer\">The Wall Street Journal<\/a><\/span>]<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31076\/Federal-Officials-Are-Using-Your-Cellphone-Data-To-Respond-To-The-Outbreak.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34114,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8540],"class_list":["post-34113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyusavirusphone"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-30T15:32:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak\",\"datePublished\":\"2020-03-30T15:32:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif\",\"keywords\":[\"headline,government,privacy,usa,virus,phone\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/\",\"name\":\"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif\",\"datePublished\":\"2020-03-30T15:32:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,usa,virus,phone\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyusavirusphone\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/","og_locale":"en_US","og_type":"article","og_title":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-30T15:32:51+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif","type":"image\/gif"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak","datePublished":"2020-03-30T15:32:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif","keywords":["headline,government,privacy,usa,virus,phone"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/","url":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/","name":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif","datePublished":"2020-03-30T15:32:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/federal-officials-are-using-your-cellphone-data-to-respond-to-the-outbreak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,usa,virus,phone","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyusavirusphone\/"},{"@type":"ListItem","position":3,"name":"Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34113"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34114"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}