Digital Evidence Collection Portal
Digital Evidence Collection Portal
devices. This evolving landscape of modern electronics paired with new technologies has
fundamentally changed the way we gather and subpoena evidence for today’s modern
crimes. Investigators lack up to date knowledge of the types of evidence that is available on devices.
Companies that collect this data also have an obligation to protect customer privacy. The paradigm
shift from physical to electronic evidence has caused us to re-examine not only how that evidence is
collected but also how legislation has responded as a result. This document describes the history and
background of the problem as well as a new innovative solution proposed by the Cal Poly Digital
Transformation hub.
1
Table of Contents
Abstract................................................................................................................................ 1
Introduction......................................................................................................................... 5
Objectives ................................................................................................................................................. 6
Background............................................................................................................................................... 7
Project ....................................................................................................................................................... 8
Conclusion ......................................................................................................................... 26
2
Future Research ................................................................................................................ 27
References ......................................................................................................................... 28
3
Table of Figures
Figure 8. Microsoft Project Gantt Chart of Project Progress up to Present Time ......................... 24
4
Introduction
This project was the result of a partnership between California Polytechnic State University and
Amazon Web Services (AWS) in a joint venue known as the Digital Transformation Hub (DxHub).
The DxHub collaborates with public sector organizations to solve problems using design thinking
and proven innovation methodologies in combination with local experts to solve challenging
problems in new ways. This challenge was brought to the DxHub by the California Attorney
General's office. The motivation for this challenge was to build a training portal and toolset to
enable front-line criminal investigating officers the ability to collect digital evidence regardless of
their technical skill level. This document describes the project in detail and discusses how we used
modern project management tools and methodology to keep the project moving forward. Our role
as project managers involved organizing resources, kicking off the project to set expectations and
holding those resources accountable to assure the team delivered the project on time.
Problem Description
The explosion of new technology and its use in crime has created a situation where even
seasoned technologists don’t know what type of data is being collected on devices. Investigators
ultimately need to understand the data that may have been captured that could potentially be used as
evidence. Currently, this is accomplished through talking with others in the field and relying on a
network of information that is handed down based on experience. This method unfortunately
doesn’t scale well and relies on others to grow the knowledge of the unit. Investigative officers need
a way to search for evidence based on the type of crime. Once they have a list of possible evidence
options, they will need to know how to obtain that source of data and what process they must
follow. Since many of these electronic sources belong to technology companies, investigators need
guidance on how to subpoena that data using a process that is likely unique to that company. Each
5
technology company has a different process and terminology that is typically unique to that
company’s product. A guidebook on this process would help this issue. This project will enable
investigating officers to find sources of evidence embedded in this ocean of digital devices and guide
Objectives
In order to accomplish the overall goals that the California Attorney General's office had for the
DxHub, we outlined a series of milestones for the first phase of the project. The team had worked
through an innovative idea and approach through a solutions workshop held in Sacramento. That
1. Create a user interface prototype illustrating how to search for geolocation data
2. Have this user interface produce a sample list of responses available from Uber based on
geolocation input
3. Have the user interface allow the user to select as specific response type and show the user
4. Have the interface walk the user through requesting this data from Uber to be used in court
6
Literature Review
In preparation for managing this project an extensive literature review was done to understand
the background and history as well as other potential solutions in this space.
Background
We live in a world that continues to be more dependent on technology. This evolving landscape
of new technologies has fundamentally changed the way we gather and subpoena evidence for
today’s modern crimes. All this new technology brings with it new types of digital evidence and the
criminal justice system has had to adapt to these changes. Evidence derived from social media is no
different but obstacles involving user privacy and creating proper channels of requesting
information often stand in the way of gathering effective evidence of criminal activity. Digital
evidence can be gathered from any electronic device that collects information. There are dozens of
sensors in many widely used electronic devices today and information collected by these sensors can
be used in a variety of ways. Some information you may have never even considered has been used
in criminal court already. Ohio police even used an implanted pacemaker to produce data that was
used in an arson and insurance fraud case (Jackson). Despite increased privacy concerns, people are
generally unaware of exactly how much of their ‘digital footprint’ can be used in a criminal
investigation. Similarly, investigators can also be out of the loop as to what tools are at their disposal
Currently, not only are investigators commonly unaware of potential sources of evidence but
procedures for obtaining evidence through digital forensics is not consistent or standardized (Reith,
Carr and Gunsch). The goal of this project is to create a technology solution to address evidence
collection in this new world. The DxHub E-Crime portal attempts to sort out some of the
7
difficulties with investigators ability to both be aware of potential digital evidence and to properly
Project
This project was the result of a partnership between California Polytechnic State University and
Amazon Web Services (AWS) in a joint venue known as the Digital Transformation Hub (DxHub).
The DxHub collaborates with public sector organizations to solve problems using design thinking
and proven innovation methodologies in combination with the local experts to solve challenging
problems in new ways. This challenge was brought to the DxHub by the California Attorney
Generals office. The motivation for this challenge was to build a training portal and toolset to enable
front-line criminal investigating officers the ability to collect digital evidence regardless of their
technical skill level. The explosion of new technology and its use in crime has created a complex list
of options that now overwhelms even seasoned technologists. This review will focus on 5 main
areas of research to better inform project members of the following: historical background on
evidence collection, review of legislation both historical and recent changes, how Uber has made the
subpoena process easier, evidence collection process and technology, a review of agile project
Technology companies have responded in kind to comply with new legislation and even built
Historical Legislation
The change from physical evidence to digital evidence collection has highlighted shortcomings
in rules governing how evidence is collected. This new technology creates problems in applying old
rules of physical evidence collection to digital and computer evidence (Kerr). Orin Kerr,
hypothesizes that in order to be fair, the rules that outline how investigators should obtain and use
8
warrants in searching for computer-related evidence should be updated to reflect a major change
given the medium. With physical evidence most searches can be done in one step where-as digital
evidence collection is almost always requires 2 steps. This raises the question is the property being
seized for evidence the electronic device, or is it the data contained within? Physical search warrants
help limit the ability of an officer to broadly search the entire contents of one’s home, but the digital
evidence requires seizing a computer hard-drive which could, in this analogy, would be like seizing
one’s house and searching the entire contents of your home. To further complicate matters, much
of our digital evidence involves data sent over the internet and through Internet Service Providers
(ISP)s. A subpoena of third part ISPs would prevent the Fourth amendment from offering adequate
protection. The result a change in legislation was needed to ensure privacy in a digital world
remained intact. This historical perspective illustrates the initial mistakes made as the legislation
Calder detail the process of using evidence from ride sharing services as potential evidence in family
law disputes. Although the in-text examples do not detail criminal case as such are in the E-Crime
portal, their suggestions give a good idea of a lawyer’s perspective of the uses of data from ride
sharing platforms as evidence. It details that there are two ways that a potential lawyer can go about
using the ride sharing data. The first of which is through a formal request for a user to display their
trip history which includes the date and cost of the trip taken or a detailed history which includes the
map of the trip (pick up, drop off locations, route taken and payment method). If there is no
cooperation from the formal request for information a lawyer should move to the second of the two
paths of accruing applicable evidence from the ridesharing service. In this method a subpoena is
issued for detailed records stored on Uber’s servers. The subpoena should include the user’s email
9
address and phone number, and the time period for which records are being requested. The article
mentions and suggests the Uber legal guidelines that the Attorney General’s Office has supplied the
McLaren and Calder state that information from ride sharing services has been effectively used
“to prove adultery, dissipation of marital assets and the spending ability of the breadwinning spouse
to support a claim for alimony and child support.” The pick-up and drop off data can support a
theory of adultery by showing several drop-offs at a hotel, from there other surveillance footage can
further support the claim. They note that the location information usually has to be investigated
further to find suitable evidence. For example, the drop off location may not be where the rider has
intended to go. Adjacent locations have to be considered as potential areas of interest. Researching
nearby locations can reveal that the rider likely was intending to go to business across the street
rather than the restaurant that was label as his or her drop off location. Uber data was considered an
properly collect and preserve data and the chain of custody. Many research papers and books have
been written on the subject (Cohen), (Muniz) which detail the complicated techniques that must be
used with modern technology devices as technology companies also attempt to protect user’s
personal information. Apple Computer Company has been in the news several times on their
position on personal privacy [7]. Apple is constantly updating the software that runs on their iPhone
devices to prevent unauthorized access to the data contained on the device. This means that not
only must forensic analysts use complicated technology to even retrieve data when a lawful warrant
10
has been written, but that technology may break as the vendor improves the way in which the device
is protected.
collection. Many of the applications that would be used as a resource in the E-Crime portal release
transparency reports to the public that detail summaries of user data provided to law enforcement.
Transparency reports reviewed included reports from Lyft, Uber and Snapchat.
Snapchat releases transparency reports twice a year. In the first six months of 2018 Snapchat
received 7235 requests for data in the US and produced data in 85% of those instances. In 2017,
Lyft received 1178 requests for data in the US and complied with 87.5% of them. 128 of these
information requests came from California. In 2017, Uber received 2940 requests for data and
complied with between 68 and 73 percent of the time. It is important to note that data requests are
often for information in multiple accounts of both drivers and riders. In the first half of 2017 there
were an average of 2.7 accounts involved in each request. Assuming a similar investigative pattern,
exonerate suspects. Often times digital evidence is used against suspects is posted to social media
sites such as Facebook or twitter as public information. In one case a murder weapon was connected
to a suspect after investigators found pictures of the item in public photos posted by the suspect on
Facebook (Embury-Dennis). In another case, pictures posted on Facebook showed suspects wearing
11
stolen jewelry (Fares). In each of the aforementioned cases, the evidence was voluntarily posted
publicly by the suspects themselves. Oftentimes in these instances officers or investigators are not
searching themselves for evidence on these platforms but are instead tipped off by people in the
community that use the given social media platform. The practice of having law enforcement
monitoring social media sites as other users appears to be straddling a line of legality. In order to
gain information about potential suspects of crimes a police chief created a fake Facebook account
and changed to profile picture daily. He claimed it to be no different than sending an undercover
officer into a public location. However, practices like these are in direct conflict with Facebook’s
In a case more explicitly applicable to the DxHub’s E-Crime Portal, Chicago police were able to
identify accomplices conspiring in a fraud crime through the use of Uber’s geolocation data.
Although the Uber data alone was not evidence enough to place the suspects at the scene of the
alleged crime, it enabled investigators with a starting time and location to piece together other
sources of evidence. The drop off time and location data from Uber of the rides of the suspects was
the start of the trail that was continued by piecing together cell phone and surveillance footage from
private citizens. The trail of Uber data and private camera footage ultimately lead the investigators to
scene of the alleged crime (Ng). Cases like the ones mentioned in this paper show the uses of social
media evidence to solve crimes. The different cases also exhibit the variety of range in the uses of
social media evidence. Sometimes the prime pieces of evidence originate from a single social media
post while in other cases, the data from a social media platform can help find the first of a trail of
Despite its use, Uber can be very difficult to work with from the view of government agencies.
Government often lacks the explicit authority to gather data from Uber or other social media
12
platforms. Uber and others will cooperate voluntarily to avoid potential lawsuits, but Uber and
companies like them have to weigh their own commitments their users' personal data. Uber and
others have to balance potential risks of lawsuits by government agencies looking to access their data
and users who want their information kept private. An example of this balance that Uber attempts
to find is evident in a battle between the ride sharing service and the Taxi and Limousine
Commission in New York City. There, the TLC is attempting to hold Uber drivers to the same
regulations as other professional drivers in the city. The TLC primarily wants to ensure that drivers
are over worked and are not transporting passengers for more than 10 hours a day. To monitor this
policy the TLC requested that Uber hand over pickup and drop off data for drivers. However, Uber
has since refused this request on the basis that Uber cannot keep privacy commitments to users
once their data has left Uber’s control (Siddiqui). Despite the positive examples of social media
cooperation with law enforcement to solve crimes, Uber seems to convey a general policy of
cooperation on a very stringent case by case level and ultimately hesitant to partner with any outside
agencies regarding the sharing of user data. As a technology focused company, Uber will collect
information about its users as disclosed in a privacy policy disclosure. This information includes
location of users that purchase services from Uber directly and include precise location and time at
that location using GPS and or WiFi and IP address. This information is of great interest to
criminal investigators and can be used in a court of law as evidence. This is one example of the type
of information that can be used in the 21st Century as evidence. Uber has created a portal for law
enforcement to request this type of data with supported documentation. This portal was suggested
by the client as an example use case for the project to illustrate as part of our solution.
Modern Legislation
13
California has made the biggest steps in reviewing and updating legislation related to new
technologies and how those technologies may expose your privacy. Known as CalEPCA [3],
California Senate Bill 178 details how search warrants must be written with regard to digital evidence
to better align with the intent of the Fourth Amendment. Senator Mark Leno (D) and Joel
Anderson(R) have even suggested this is the nation’s best privacy law (Leno, Anderson). Supported
by major fortune 500 technology companies such as Facebook, Adobe, Dropbox and Google, this
legislation prevents law enforcement from accessing a person’s private information which includes
searching phones, online accounts, digital documents, text messages and location information
without getting explicit consent from a judge or showing it is an emergency that threatens life or
limb. This has made the collection process for law enforcement more complicated and has resulted
in careful procedures in how warrants are written and honored in trial. California Attorney General
has stated that many cases have been thrown out of court due to poorly written warrants and failure
mentor. Amazon is a well-known leader in customer driven design and one of their guiding
leadership principals is customer obsession. Agile software development primarily got its start back
in 2001, when seventeen software developers on vacation were in search of a way to approach
software design and development in using a lean approach. The result was the Manifesto for Agile
Software Development (Beck, Hunt, Schwaber, et all) which is based on 12 simple principals. These
principals essentially focus on delivery working software frequently to the customer using
dynamically list of customer driven priorities in an iterative fashion. One of the more popular books
on the subject, Learning Agile (Stellman) details how software projects can benefit from project
planning in this way. Agile project management is especially popular for managing software products
14
that can be created in an iterative fashion. The philosophy help keeps the team engaged and can help
avoid common problems that result in software delays such as developers adding features to the
product that they feel are important. Be constantly adjusting development to the customer’s
priorities you can help focus resources on customer driven functionality. In addition, by allowing the
customer to use the software during the development process, it allows for the customer to validate
fashion. A brief survey of tools was done to determine the best tool to use for this project (Mosier).
Much of the research points to an initial rank done to identify the 20 most popular tools in this
space. Of those tools a comparison was done highlighting the strengths and weaknesses of those
tools that were free (Ferreira). The clear winner was Asana and as a result that tool is what we plan
to use to manage project resources on this project. The Asana tool will allow the team to conduct bi-
monthly sprints and track and prioritize and allow us to estimate project completion date as well as
Summary of Research
Information revolution has radically changed the way humans interact with our surroundings.
We now have access to attributes in such large quantities that it has disrupted our legal system and
changed the way we think about crimes. This project will help educate law enforcement how to
navigate this rapidly evolving landscape of potential evidence that could be used to solve crimes in
15
Solutions and Achievements
Overall the team set out to create a lean prototype of an eCrime Training Portal that would
make it easier for law enforcement to discover subpoenable sources of data through a google like
search engine. The design team came up with a progressively innovative solution through iterative
design meetings and brainstorming how to effectively convey the results of such a search. Unlike
Google where results are clearly ranked, this tool might have several relevant sources that are
considered equally valuable. The result was a different design paradigm than a simple list of results.
Below in figure x is a picture of that whiteboard session. This ultimately led to the final design
shown in Figure x, y respectively. The demo with the client resulted in feedback that revealed the
officers may actually use search terms centered around evidence. Examples such as ‘blood, bomb,
cable decoder or even the name of a business” were given. The team is building out assets to
demonstrate these search terms. Our next demo is scheduled for June 17th.
16
Figure 2. Main Search Page of Prototype Portal
17
Figure 3. Screenshot of Prototype Portal after Selection is Made
Project Management
As project managers for this project, the team laid out a rough project timeline that would
achieve the previously described objectives. We would then revise this rough timeline into a more
detailed project roadmap in both Microsoft Project and Asana after resources available for the
18
a. Finalize the look and feel of the prototype and build final assets
a. Build a draft interface based on client feedback and assemble the draft prototype
a. Show the customer the draft user interface and get initial validation feedback
a. Implement changes from initial validation and present the final mockup
During the course of the project, the team laid out several tasks for the project managers that
After resources were assigned by the DxHub we met with Shane, our project mentor, and the
two students that were assigned to work on the project. During this kickoff meeting, we gave the
students some background about the project and laid out project roles. The four roles needed for
the project were UI/UX developer, Project Manager, Developer and Graphics designer. Details
19
At the time the graphic design role was expected to be assigned to another student working for
the DxHub that was not in attendance. Shane was looking for a full developer for the project and
Tanner (one of the students in attendance) expressed interest in helping out in that role if needed.
Ultimately, the most critical role of this project is the user interface design. This was the assigned
focus of Tanner and Kellie (the two students) as this was the are in which they were most
The project managers then laid out the scope of the project and the initial general schedule for
the project that was previously described. The project managers then established some important
communication standards to be followed for the duration of the project. A channel on slack was set
up as the standard for quick check-ins and minor task assignments. Twice weekly stand-up meetings
were scheduled during a predetermined free time in everyone’s schedules. One was an in-person
standup on Mondays and the other was a scheduled zoom video conference on Thursdays.
A work breakdown structure of the tasks needed to complete the project was created in
Microsoft Project. An image of the work breakdown can be seen in Figure 5 below.
20
Organize Teams and Resources
Of the three non-project management roles that were originally laid out for this project the
project managers only had the resources to complete tasks under the UI developer role. The planned
graphics designer took a different job shortly after the kickoff meeting so the project managers
needed to adjust plans accordingly. The DxHub invested in a more premium User Interface
program, based on the recommendations of Tanner and Kellie, which provided a more complete
and graphically pleasing prototype. This enhanced software and the rescheduling of the complete
graphics development to a later date allowed the project to continue progress despite deficiencies in
the original plan. The DxHub would look to find a new graphics lead, who would work concurrently
with the developer to finish the project after the user interface prototype was completely validated.
The full developer was not yet needed for the early stages of the project we were in throughout the
academic quarter.
We prepared agendas for each meeting and notes were taken and sent out to the team reviewing
open action items and decision that were made. A sample of one of our meeting templates is shown
in Figure 6.
21
22
Figure 6. Meeting Notes Example
The project managers held regular standup meetings that kept the project on track. Updates
from the team were given during these meetings and directions of the next steps were brainstormed
The project managers used Asana and Microsoft project as the main project management tools.
Detailed schedules were built out for the near future and an overview schedule for the future was
laid out for future tasks to be completed at the close of the academic quarter. A visual depiction of
the tasks can be seen in both the Asana and Microsoft Project graphics in figures 7 and 8 below.
23
Figure 7. Screen Capture of Asana Project Dashboard
A major delay in this project occurred when there were issues scheduling a validation meeting
with the client. While waiting for this meeting to gather input about the prototype, there simply was
Every week the team met for one hour to review the tasks for the week. The process begins
before the meeting, where project managers reviewed the backlog of tasks. Each task is reviewed
24
and ranked for importance relative to the client feedback that occurred during the demo done. The
demo done with the client happens right before the planning meeting as a way to confirm the
product is headed in the right direction. In addition, new items that came up during the week are
added and prioritized during pre sprint planning period. During the meeting, team members are
also asked to review the backlog and add items they feel are crucial to the project and remove or
prioritize items as needed. Milestone tasks are broken down into deliverables that are no more than
1 day. When the team finally meets as a group, the backlog should represent a combined effort to
focus on relevant tasks as they relate to customer needs. During the meeting the project manager
assigns tasks and evaluates the task duration estimate. The project manager also makes sure the total
number of tasks in the queue for the week don’t exceed the amount of time resource allocated.
Demo done meetings were conducted every 2 weeks to align customer needs with the tasks that
get assigned. Often in software the customer doesn’t know what they need until they have an
opportunity to interact with the product and see a demonstration. These product demos allowed us
to validate the approach and solution we were building aligned with what the customer really wanted
and needed.
25
Conclusion
Information revolution has radically changed the way humans interact with our surroundings.
We now have access to attributes in such large quantities that it has disrupted our legal system and
changed the way we think about crimes. This project will help educate law enforcement how to
navigate this rapidly evolving landscape of potential evidence that could be used to solve crimes in
ways never imagined. To solve the most critical problems facing investigators today, we need to
build a solution that will inform and guide officers to the information they need.
In its current state, the E-Crime Portal project is on track for success. The team was successful
in creating a working prototype that will serve as the groundwork for continued improvements
through iterations created from user feedback in future validation meetings. The kickoff meeting
and other communications led to an organized, smooth assignment of tasks. Subsequent activities
completed by the project managers kept the project on schedule with the exception of a substantial
delay resulting from issues scheduling a prototype validation meeting with the client. In the future,
the team recommends that prototype demos are scheduled well in advance in order to prevent the
client from creating bottlenecks. Overall, the project timeline aligned with the class schedule in a way
that allowed the project managers to walk into the project when needed and have time to realize and
help to overcome obstacles that threatened the on-time completion of the project’s objectives. As
we continue to iterate this solution based on the customers feedback, we will arrive at a minimum
viable product that the customer can use and evaluate the tools effectiveness at overcoming current
problems.
26
Future Research
This project will build on the work that was done thus far and continue to a second phase that
will focus the team on building out a mechanism to help investigators write actual search
warrants. Assuming the phase I deliverable was successful, te tool will need to facilitate the creation
of valid search warrant to actually obtain the data. According to the California Attorney General’s
office several high-profile cases have been thrown out of court due to poorly written search warrants
that contained errors. Phase II will build out a tool that can recommend templatized warrants for
27
References
Angeli, D. H., & Taylor, A. (n.d.). The Impact of Social Networking in Criminal Cases. Retrieved May
Cases.pdf
Cohen, Fred. “Two Models of Digital Forensic Examination.” 2009 Fourth International IEEE
doi:10.1109/sadfe.2009.8
Embury-Dennis, T. (2018, January 18). Woman found guilty of killing friend as Facebook photo taken
hours before shows deadly weapon. Retrieved May 11, 2019, from
https://www.independent.co.uk/news/world/americas/woman-kill-friend-belt-selfie-photo-
manslaughter-cheyenne-rose-antoine-brittney-gargol-saskatchewan-a8165261.html
Fares, M. (2016, June 23). Florida man brags about burglary on Facebook, lands him in jail. Retrieved
about-burglary-on-facebook-lands-him-in-jail-idUSKCN0Z92NC
Ferreira, Tânia, et al. “Freemium Project Management Tools: Asana, Freedcamp and Ace
Project.” Advances in Intelligent Systems and Computing Trends and Advances in Information
Goode, Steven. "The Admissibility of Electronic Evidence." Review of Litigation , vol. 29, no. 1, Fall
org.ezproxy.lib.calpoly.edu/HOL/P?h=hein.journals/rol29&i=3.
Goodison, S. E., Davis, R. C., & Jackson, B. A. (n.d.). Digital Evidence and the U.S. Criminal Justice
28
Jackson, B. A. (2017, May 11). Using Digital Data in Criminal Investigations: Where and How to Draw
digital-data-criminal-investigations-where-and-how-draw-line
Kent Beck; James Grenning; Robert C. Martin; Mike Beedle; Jim Highsmith; Steve Mellor; Arie van
Bennekum; Andrew Hunt; Ken Schwaber; Alistair Cockburn; Ron Jeffries; Jeff Sutherland; Ward
Cunningham; Jon Kern; Dave Thomas; Martin Fowler; Brian Marick (2001). "Manifesto for Agile
Kerr, Orin S. "Search Warrants in an Era of Digital Evidence." Mississippi Law Journal, vol. 75, no. 1,
org.ezproxy.lib.calpoly.edu/HOL/P?h=hein.journals/mislj75&i=110.`
Leno, Mark (D), Anderson, Joel , ACLU Web site April 2018, https://www.aclunc.org/our-
work/legislation/calecpa
McLaren, J. T., & Calder, J. M. (2017, January 17). Tips for Obtaining and Analyzing Uber Records.
law/practice/2017/tips-for-obtaining-and-analyzing-uber-records/
Mosier, Liann The Top 20 Most Popular Project Management Software Report Methodology,
https://blog.capterra.com/20-popular-project-management-software-products-infographic/
Muniz, Joseph. Investigating the Cyber Breach: the Digital Forensics Guide for the Network Engineer.
Ng, A. (2019, February 21). Uber data helped ID accomplices in Jussie Smollett staged attack, police
smolletts-staged-attack-police/
Reith, M., Carr, C., & Gunsch, G. (2002, Fall). An Examination of Digital Forensic Models. Retrieved
29
Siddiqui, F. (2017, January 05). Uber and New York City spar over rider data. Retrieved May 11, 2019,
from https://www.washingtonpost.com/news/dr-gridlock/wp/2017/01/05/uber-and-new-york-
city-spar-over-rider-data/?noredirect=on&utm_term=.bbdd129237bf
Selyukh, Alina Why Apple Says it Won’t Help Unlock that iPhone, In 5 Key Quotes, February 2016
https://www.npr.org/sections/thetwo-way/2016/02/25/468158520/why-apple-says-it-wont-help-
unlock-that-iphone-in-5-key-quotes
Senate Bill 178, Chapter 651 California Electronic Communications Privacy Act (CalEPCA)
https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB178
US/privacy/transparency/
Transparency Report (Rep.). (n.d.). Retrieved May 11, 2019, from Lyft website: https://c-
5uwzmx78pmca90x24tgnb-iaambax2ea1x2eiuihwvieax2ekwu.g00.cnet.com/g00/3_c-
5eee.kvmb.kwu_/c-5UWZMXPMCA90x24pbbx78ax3ax2fx2ftgnb-
iaamba.a1.iuihwviea.kwux2fpmtx78kmvbmzx2fTgnb_Qvnw_Zmycmab_Zmx78wzb_0895.x78ln_$/
$/$?i10c.ua=1&i10c.dv=18
30