Further Reading — Chapter 18
Foundational Investigations
1. Thompson, Stuart A., and Charlie Warzel. "One Nation, Tracked." New York Times, December 2019.
The landmark investigation that demonstrated, using a commercial location dataset, the re-identification potential of "anonymous" location data and its capacity to reveal sensitive information about millions of Americans. The investigation included a companion interactive feature that allowed readers to visualize location tracking from their own devices. This is essential reading for anyone seeking to understand the practical stakes of smartphone location surveillance. Available through NYT archive with subscription or library access; the core findings are widely cited and available through academic databases.
2. Cox, Joseph. "How the U.S. Military Buys Location Data from Ordinary Apps." Motherboard/Vice, November 2020.
Cox's reporting on X-Mode Social and the sale of location data from popular apps to military intelligence contractors, demonstrating the pathway from app location permission to government surveillance without any warrant. The investigation led to regulatory action and remains the most detailed public account of how the app-to-broker-to-government pipeline operates. Vice online archive.
Academic Research
3. de Montjoye, Yves-Alexandre, et al. "Unique in the Crowd: The Privacy Bounds of Human Mobility." Scientific Reports, 2013.
The original publication of the research demonstrating that four location data points uniquely identify 95% of individuals in a dataset. This is the technical foundation for the claim that location data anonymization does not provide meaningful privacy protection. Published in the open-access journal Scientific Reports and freely available online.
4. Penney, Jon. "Chilling Effects: Online Surveillance and Wikipedia Use." Berkeley Technology Law Journal, 2016.
Penney's empirical study documenting that Wikipedia searches for terrorism-related terms decreased measurably after the Snowden revelations about NSA surveillance, providing one of the strongest empirical demonstrations of the chilling effect. The study's methodology is applicable to analyzing chilling effects in location surveillance contexts. Available through law review databases and SSRN.
5. Brayne, Sarah, Alex Rosenblat, and danah boyd. "Predictive Policing." Data & Society Research Institute, 2015.
A policy-focused analysis of how smartphone data — including location data and digital exhaust — is used in predictive policing systems. Connects individual smartphone data collection to population-level behavioral analysis used in law enforcement. Freely available at datasociety.net.
Legal Analysis
6. Kerr, Orin S. "The Case for the Third-Party Doctrine." Michigan Law Review, 2009.
Kerr's defense of the third-party doctrine — the legal rule that information shared with a third party loses Fourth Amendment protection — provides the best scholarly articulation of the view that the current legal framework for smartphone data is adequate. Reading this alongside the criticism of the doctrine in the chapter provides a complete picture of the legal debate. Available through law review databases.
7. Tokson, Matthew. "Automation and the Fourth Amendment." Iowa Law Review, 2016.
An analysis of how automated, bulk data collection by technology companies should be analyzed under the Fourth Amendment, with specific attention to how automation changes the scale of government information access in ways the traditional third-party doctrine did not anticipate. The framework Tokson develops is directly applicable to geofence warrant analysis. Law review databases.
Policy and Advocacy
8. Electronic Frontier Foundation. "Street Level Surveillance: Location Tracking." EFF.org, updated annually.
The EFF's continuously updated documentation of law enforcement location tracking practices, including cell tower dumps, stingray devices, and geofence warrants. The Street Level Surveillance project provides the most comprehensive public database of these practices. Free at eff.org.
9. Bennett Cyphers and Gennie Gebhart. "Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance." EFF White Paper, 2019.
A technical deep-dive into the tracking technologies embedded in apps, websites, and networked devices, including a detailed explanation of how SDKs operate and how the digital advertising and data brokerage ecosystem processes the data they collect. Accessible to non-technical readers and provides the technical grounding for understanding how digital exhaust is systematically collected. Free at eff.org.
Book-Length Context
10. O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016.
O'Neil's analysis of how large-scale data systems — built on digital exhaust and behavioral tracking — are used to make consequential decisions about individuals' lives (employment, credit, insurance, housing) in ways that are opaque, unaccountable, and often discriminatory. While focused primarily on algorithmic decision-making rather than surveillance itself, the book provides essential context for understanding what is at stake when the data generated by smartphone surveillance is processed at scale. Highly accessible for undergraduate readers.