What Personal Data Stays on a Phone?
The debate between the FBI and Apple over a killerās iPhone involves encryption, privacy, and national security. But it also has lessons for your personal data.
The wrangling between the FBI and Apple over an iPhone used by one of the San Bernardino, Calif., shooters in December highlights an area of confusion for many smartphone users. It's hard to know what personal data resides only on our smartphones, and what is also stored in the cloud.
To recap: In February, a court ordered Apple to help FBI investigators hack into the killerās phone. The company refused to write the software necessary to comply. And since then, personal data safety has been pitted against national security in a debate pulling in politicians, mobile security experts, and privacy advocates.
On March 21, the case took a new twist, when the government said it may have found a way to defeat the iPhoneās security without Appleās help.
You might think that in our highly connected age all personal data on a smartphone would also be stored on cloud computers. Donāt cellular companies and websites retain records of phone calls, emails exchanges, bank transactions, and other tasks performed with mobile devices? But if thatās true, why would the FBI need to hack into the handset?
The subject doesnāt matter just for national security. Any time you use a mapping program, send a text message, or upload a photograph to a social account, some personal data is generated. Much of that data does migrate to big computers owned by corporations such as Google and Facebook. But not all of it.
Understanding the details can help you predict what companies may have access to your personal data. It can also help you understand what information can be recovered if a phone is lostāand what data might be vulnerable to hackers.
Hereās a brief explanation of where your phone data is stored, broken out by type of file.
Your Photos
Photographs taken by an smartphone reside solely on the phone until they are shared or backed up. Many iPhone users have their pictures saved automatically to iCloud, and both Android and iPhone users can have photos automatically backed up to other services such as Google Photos. (When personal photos were stolen from Jennifer Lawrence and other celebrities in 2014, the criminals did it by accessing their iCloud accounts.)
A user can also manually save photos to a cloud service or computer, or share them through Facebook, email, or another forum.
The phone used by Syed Rizwan Farook, the San Bernardino killer, hadnāt been backed up for more than a month, so itās possible that the phone retains pictures no one else has seen. For the rest of us, avoiding backups means that photos remain privateābut vulnerable to loss if the phone is stolen or the data accidentally erased.
Consumer Reports tests all the best smartphones on the market. Start with this shopping guide to phones and plans, and then check our Ratings.
Standard Text Messages
Weāll get to Appleās iMessages in a moment. But ordinary text messages transmitted from one phone to another have to pass through cell providersā computer systems. Carriers retain metadata, or information on when text messages were sent, and to whom. That data is used for billing. However, most carriers only store the body of texts for as long as it takes to transmit themāonce the message hits its target, the data is deleted. Verizon is an exception, though it doesnāt hang onto the data for long. āText message content is generally retained for a week or less,ā Richard Young, a spokesman for the carrier's legislative, regulatory and policy office, says. (The company wouldnāt say why it retains the data.)
iMessages
Appleās own messaging app, iMessage, works differently from conventional texting services.
āCarriers have no metadata on iMessages,ā says Dan Guido, a security researcher and Hacker in Residence at the Polytechnic Institute of New York University. āIt all gets sent to and from Apple.ā
All the cell network knows is that itās transmitting an encrypted message to Appleās serversāand if the files are sent through Wi-Fi, they bypass the cellular carriers.
Any messages that have been backed up can be recoveredāand Apple shares such information with law enforcement when provided with the right legal documentation. (Yes, Apple can decrypt iMessages stored on iCloud.) That only applies to iMessages that have been backed up by the user, either manually or through automatic backups. The company doesnāt retain the messages as they are routed from one device to another.
Should phones be more secure or less?
Tell us how you'd balance personal security and law enforcement.
Where You've Been
When it comes to location data, cellphones are natural born snitches. Law enforcement has long been able to ask carriers to find a customer in real time. If thereās an ongoing kidnapping investigation, for instance, a cellular provider can often use multiple towers to triangulate a phoneās position; this method can also be used to locate phones when they make 911 calls.
Additionally, cellular companies can peer into their records to see where phones were located when making ordinary calls a year or more in the past. However, those records are highly impreciseāphone calls arenāt always routed through the nearest tower, and towers can have a range of dozens of miles. If you remember how to calculate the area of a circle, youāll see why records may only indicate where a phone was within several square miles, or even hundreds of square miles, when it made a call.
Smartphones also have GPS chips, and mobile app developers may be able trace everywhere a phoneās been. Google Maps, for example has an optional feature called Timeline that stores detailed location data for years, if itās turned on in a phoneās settings. Precise doesn't begin to describe this dataāyou can look years into the past to see where you walked or drove on a particular day. Law enforcement can request these detailed Timeline histories from Google with a warrant.
Some geographic data is only stored locally, on the handset. The iPhone has a feature called Frequent Locations, which generates a list of specific spots you've visited, as well when and how often.
āWe don't do tracking of our usersā devices, so we don't have location logs in the way that, say, a cellular company would with their cell tower pings,ā says a senior Apple engineer, speaking on condition that he not be named. Frequent Locations, he confirms, āis done locally on the device, as opposed to by Apple collecting everyone's location.ā
Apple says the feature is intended to offer services such as predictive traffic routing. The phone can learn your commuting schedule, and offer up what Apple hopes are useful notifications, such as how long your drive home may be, based on current traffic conditions. Android phones have the same capability.
Frequent Locations can be handy, but once you look at the records, the level of detail can be unsettling. If youāve been to your home 58 times in the past two months, it will tell you that, along with what time you arrived and left each day. (To find this data on an iPhone go to Settings > Privacy > Location Services > System Services > Frequent Locations. Tap on the name of a town in the list of places youāve been to see the details.)
The feature can be turned off. However, if it was running on Farookās iPhone, it could contain a record of locations the killer frequented in the days and weeks before the shooting.
Email, Contacts, and More
Emails are stored in the cloudāif you use Gmail, for instance, the content of your correspondence resides on Google servers. It can be accessed by law enforcement armed with the right warrants. Contact lists are stored online only if theyāve been backed up by the user.
Now, this isnāt a complete list of the data generated by smartphones. There are browser histories, records of items purchased on Amazon, movies watched, and notes or videos created by mobile apps. Much of this data is stored somewhere in the cloud, and if investigators knew about every online service used by a smartphone owner, they could probably request subpoenas and uncover most of it. But no amount of such sleuthing would rule out the possibility that something important remained on the phone, and only on the phone.
That sort of uncertainty can be haunting, says one former prosecutor who spoke to us on the condition of anonymity. āImagine if there was another terrorist attack, and it came out that there was something on a phone that might have helped stop it,ā he says. āYou don't always know what you're looking for. You just want all of it.ā
Thatās why thereās a genuine conflict at the heart of this national debate.
If companies such as Apple can be compelled to write software that undercuts security protections, security experts say, personal and financial data will be gradually become more accessible to hackers based both in the United States and abroad. And if tech companies canāt be compelled to do that, some clues in criminal investigations, even ones involved horrendous crimes, may never be discovered.
However the FBI fares in its new attempt to hack into Farook's iPhone, those tradeoffs will persist.