people using phones

Israel Moves to Track Cell Phone Location Data To Prevent Spread of Coronavirus

The U.S. and tech companies are contemplating a similar step, though the American version of cell phone tracking would likely include aggregated data and more privacy protections.

As countries around the world determine the best ways to combat the spread of COVID-19, Israel is taking a singular approach to fighting the coronavirus pandemic: instructing the country’s internal security service to identify people who have come into contact with the virus through their cell phone location data.

Prime Minister Benjamin Netanyahu made the decision on Tuesday night, arguing that the electronic tracking of patients using a counterterrorism tool was necessary in the wake of an international emergency.

"Because the virus is spreading at a tremendous pace, a delay of even one hour in these tools can lead to the deaths of many Israelis, just as is happening with the deaths of thousands in Italy and in other places in the world," Netanyahu said in a statement, according to CNN.

The measure was approved by a transitional government, which opponents say is making life-or-death decisions without support from the majority of the electorate.

Advocates for privacy rights were concerned with the lack of oversight of the security agency, Shin Bet, and the potential for location tracking of Israelis by law enforcement to become commonplace. The chief of Shin Bet, Nadav Argaman, said in a statement that only a very limited group of agents would have access to the data and that it will not be stored in the Shin Bet database.

“Israel is a democracy,” Netanyahu said earlier this week, according to The New York Times. “We have to maintain the balance between the rights of the individual and needs of general society, and we are doing that.”

Netanyahu’s critics include former Israeli deputy attorney general Malkiel Blass, who told the Times that because the Israeli parliament dissolved in December, Netanyahu was operating without enough input or oversight from legislators.

“Even in crises of this nature, the core of civil rights in a democracy must be preserved,” Blass said. “I understand that infection and contagion and the spread of the virus must be prevented, but it is inconceivable that because of the panic, civil rights should be trampled without restraint, at levels that are totally disproportionate to the threat and the problem.”

There is a chance that Americans will also have their cellphone location data shared with the federal government, The Washington Post reported on Tuesday. The difference would be that tech companies would likely share aggregated location data rather than individualized location data showing a person’s whereabouts.

Other options include tech companies like Apple and Google sharing insights from the data itself rather than sharing raw data with the government. Privacy experts suggested that government officials restrict their data requests to very specific categories that would inform public health decisions rather than making blanket requests for raw data.

“We are in the middle of a public health crisis,” Adam Schwartz, senior staff attorney for the Electronic Frontier Foundation, told Recode. “And some rebalancing of collective and individual interests may be appropriate. But those adjustments need to be temporary and science-driven and not discriminate.”

For their part, representatives of the tech industry speaking with White House leaders told the Post they are still in the process of collecting ideas and proposed actions, which will then be presented to government officials.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3