Digital Contact Tracing
   HOME

TheInfoList



OR:

Digital contact tracing is a method of
contact tracing In public health, contact tracing is the process of identifying persons who may have been exposed to an infected person ("contacts") and subsequent collection of further data to assess transmission. By tracing the contacts of infected individua ...
relying on
tracking system A tracking system, also known as a locating system, is used for the observing of persons or objects on the move and supplying a timely ordered sequence of location data for further processing. It is important to be aware of human tracking, fur ...
s, most often based on mobile devices, to determine contact between an infected patient and a user. It came to public prominence in the form of
COVID-19 apps COVID-19 apps include mobile-software applications for digital contact-tracing - i.e. the process of identifying persons ("contacts") who may have been in contact with an infected individual - deployed during the COVID-19 pandemic. Numerous ...
during the
COVID-19 pandemic The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing global pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The novel virus was first identif ...
. Since the initial outbreak, many groups have developed nonstandard protocols designed to allow for wide-scale digital contact tracing, most notably
BlueTrace BlueTrace is an open-source application protocol that facilitates digital contact tracing of users to stem the spread of the COVID-19 pandemic. Initially developed by the Singaporean Government, BlueTrace powers the contact tracing for the TraceT ...
and
Exposure Notification The (Google/Apple) Exposure Notification (GAEN) system, originally known as the Privacy-Preserving Contact Tracing Project, is a framework and protocol specification developed by Apple Inc. and Google to facilitate digital contact tracing during ...
. When considering the limitations of mobile devices, there are two competing ways to trace proximity:
GPS The Global Positioning System (GPS), originally Navstar GPS, is a Radionavigation-satellite service, satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of t ...
and
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
; each with their own drawbacks. Additionally, the protocols can either be
centralized Centralisation or centralization (see spelling differences) is the process by which the activities of an organisation, particularly those regarding planning and decision-making, framing strategy and policies become concentrated within a particu ...
or
decentralized Decentralization or decentralisation is the process by which the activities of an organization, particularly those regarding planning and decision making, are distributed or delegated away from a central, authoritative location or group. Conce ...
, meaning contact history can either be processed by a central health authority, or by individual clients in the network. On 10 April 2020,
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
and
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
jointly announced that they would integrate functionality to support such Bluetooth-based apps directly into their Android and
iOS iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes ...
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
s.


History

Digital contact tracing has existed as a concept since at least 2007, and it was proven to be effective in the first empirical investigation using Bluetooth data in 2014. However, it was largely held back by the necessity of widespread adoption. A 2018 patent application by Facebook discussed a Bluetooth proximity-based trust method. The concept came to prominence during the
COVID-19 pandemic The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing global pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The novel virus was first identif ...
, where it was deployed on a wide scale for the first time through multiple government and private
COVID-19 apps COVID-19 apps include mobile-software applications for digital contact-tracing - i.e. the process of identifying persons ("contacts") who may have been in contact with an infected individual - deployed during the COVID-19 pandemic. Numerous ...
. Many countries, however, saw poor adoption, with Singapore's digital contact tracing app,
TraceTogether TraceTogether is a digital system implemented by the Government of Singapore to facilitate contact tracing efforts in response to the COVID-19 pandemic in Singapore. The main goal is quick identification of persons who may have come into close co ...
, seeing an adoption rate of only 10-20%. COVID-19 apps tend to be voluntary rather than mandatory, which may also have an impact on the rate of adoption. Israel was the only country in the world to use its internal security agency (
Shin Bet The Israel Security Agency (ISA; he, שֵׁירוּת הַבִּיטָּחוֹן הַכְּלָלִי; ''Sherut ha-Bitaẖon haKlali''; "the General Security Service"; ar, جهاز الأمن العام), better known by the acronym Shabak ( he, ...
) to track citizens' geolocations to slow the spread of the virus. However, cellphone-based location tracking proved to be insufficiently accurate, as scores of Israeli citizens were falsely identified as carriers of COVID-19 and subsequently ordered to self-quarantine. In an attempt to contain the spread of the
Omicron Variant Omicron (B.1.1.529) is a variant of SARS-CoV-2 first reported to the World Health Organization (WHO) by the Network for Genomics Surveillance in South Africa on 24 November 2021. It was first detected in Botswana and has spread to become the ...
, Israel reinstated the use of Shin Bet counterterrorism surveillance measures for a limited period of time. Apps were often met with overwhelming criticism about concerns with the data health authorities were collecting. Experts also criticized protocols like the
Pan-European Privacy-Preserving Proximity Tracing Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT/PEPP) is a full-stack open protocol designed to facilitate digital contact tracing of infected participants. The protocol was developed in the context of the ongoing COVID-19 pandemic. Th ...
and
BlueTrace BlueTrace is an open-source application protocol that facilitates digital contact tracing of users to stem the spread of the COVID-19 pandemic. Initially developed by the Singaporean Government, BlueTrace powers the contact tracing for the TraceT ...
for their centralized contact log processing, that meant the government could determine who you had been in contact with. MIT SafePaths published the earliest paper, 'Apps Gone Rogue', on a decentralized GPS algorithm as well as the pitfalls of previous methods. MIT SafePaths was also the first to release a privacy-preserving Android and iOS GPS app. Covid Watch was the first organization to develop and open source an anonymous, decentralized Bluetooth digital contact tracing protocol, publishing their white paper on the subject on 20 March 2020. The group was founded as a research collaboration between
Stanford University Stanford University, officially Leland Stanford Junior University, is a private research university in Stanford, California. The campus occupies , among the largest in the United States, and enrolls over 17,000 students. Stanford is consider ...
and the
University of Waterloo The University of Waterloo (UWaterloo, UW, or Waterloo) is a public research university with a main campus in Waterloo, Ontario Waterloo is a city in the Canadian province of Ontario. It is one of three cities in the Regional Municipality ...
. The protocol they developed, the CEN Protocol, later renamed the
TCN Protocol The Temporary Contact Numbers Protocol, or TCN Protocol, is an open source, decentralized, anonymous exposure alert protocol developed by Covid Watch in response to the COVID-19 pandemic. The Covid Watch team, started as an independent research ...
, was first released on 17 March 2020 and presented at Stanford HAI's COVID-19 and AI virtual conference on April 1. NOVID is the first digital contact tracing app which primarily uses Ultrasound. Their ultrasound technology yields much higher accuracy than Bluetooth-based apps, and they are currently the only app with sub-meter contact tracing accuracy.


Methodologies


Bluetooth proximity tracing

Bluetooth, more specifically
Bluetooth Low Energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in ...
, is used to track encounters between two phones. Typically, Bluetooth is used to transmit anonymous, time-shifting identifiers to nearby devices. Receiving devices then commit these identifiers to a locally stored contact history log. Given epidemiological recommendations, devices store inputs only of the encountered devices for a fixed time, exceeding a threshold (e.g., more than 15 min) at a certain distance (e.g., less than 2 meters). Bluetooth protocols with encryption are perceived to have less privacy problems and have lower battery usage than GPS-based schemes. Because a user's location is not logged as part of the protocols, the system is unable to track patients who may have become infected by touching a surface an ill patient has also touched. Another serious concern is the potential inaccuracy of Bluetooth at detecting contact events. Potential challenges for high received signal strength fluctuations in BLE proximity tracing are line-of-sight vs. non-line-of-sight conditions, various BLE advertising channels, different device placements, possible WiFi interference.


Location tracking

Location tracking can be achieved via cell phone tower networks or using GPS. Cell phone tower network-based location tracking has the advantage of eliminating the need to download an app. Location tracking enables calculating user position with certain levels of accuracy in 2D or 3D. The first contact tracing protocol of this type was deployed in Israel. The accuracy is however typically not sufficient for meaningful contact tracing. Smartphone GPS logging solutions are more private than Bluetooth based solutions because the smartphone can passively record the GPS values. The concern with Bluetooth-based solutions is that the smartphone will continuously emit an RF signal every 200ms, which can be spied on. On the other hand, digital contact tracing solutions that force users to release their location trails to a central system without encryption can lead to privacy problems.


GEO-QR code tagging

Another method of tracking is assigning a venue or a place to a
QR code A QR code (an initialism for quick response code) is a type of matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso Wave. A barcode is a machine-readable optical label that can contain information about th ...
and having the people scan the QR code by their mobiles to tag their visits. By this method, people voluntarily check in and check out from the location and they have control on their privacy, and they need not download or install any app. Should a positive COVID-19 case be identified later, such systems can detect any possible encounter within the venue or place between the positive case individual and others who might have visited and tagged their visits to the venue at the same time. Such method have been used in Malaysia by Malaysian government and also in Australia and New Zealand by private sector under QR-code visitor check-in systems. In Australia and New Zealand, respective local governments have later sought to centralize contact tracing by requiring businesses to use the state's QR-code system.


Ultrasound

Using ultrasound is another way to record contacts. Smartphones emit ultrasound signals which are detected by other smartphones. Currently, NOVID, which is the only digital contact tracing app with sub-meter contact tracing accuracy, primarily uses Ultrasound.


CCTV with facial recognition

CCTV with facial recognition can also be used to detect confirmed cases and those breaking control measures. The systems may or may not store identifying data or use a central database.


Reporting centralization

One of the largest privacy concerns raised about protocols such as BlueTrace or PEPP-PT is the usage of centralised report processing. In a centralised report processing protocol a user must upload their entire contact log to a health authority administered server, where the health authority is then responsible for matching the log entries to contact details, ascertaining potential contact, and ultimately warning users of potential contact. Alternatively, anonymous decentralized report processing protocols, while still having a central reporting server, delegate the responsibility to process logs to clients on the network. Tokens exchanged by clients contain no intrinsic information or static identifiers. Protocols using this approach, such as
TCN TCN is the flagship (television), flagship television station of the Nine Network in Australia. The station is currently located at 1 Denison Street, North Sydney, New South Wales, North Sydney. The licence, issued to a company named Television C ...
and DP-3T, have the client upload a number from which encounter tokens can be derived by individual devices. Clients then check these tokens against their local contact logs to determine if they have come in contact with an infected patient. Inherent in the fact the government does not process nor have access to contact logs, this approach has major privacy benefits. However, this method also presents some issues, primarily the lack of human in the loop reporting, leading to a higher occurrence of false positives; and potential scale issues, as some devices might become overwhelmed with a large number of reports. Anonymous decentralised reporting protocols are also less mature than their centralized counterparts as governments were initially much more keen to adopt centralized surveillance systems.


Ephemeral IDs

Ephemeral IDs, also known as EphIDs, Temporary IDs or Rolling Proximity IDs⁣, are the tokens exchanged by clients during an encounter to uniquely identify themselves. These IDs regularly change, generally ever 20 minutes, and are not constituted by
plain text In computing, plain text is a loose term for data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects (floating-point numbers, images, etc.). It may also include a limit ...
personally identifiable information. The variable nature of a client's identifier is needed for the prevention of tracking by malicious third parties who, by observing static identifiers over a large geographical area over time, could track users and deduce their identity. Because EphIDs are not static, there is theoretically no way a third party could track a client for a period longer than the lifetime of the EphID. There may, however, still be incidental leakage of static identifiers, such as was the case on the BlueTrace apps
TraceTogether TraceTogether is a digital system implemented by the Government of Singapore to facilitate contact tracing efforts in response to the COVID-19 pandemic in Singapore. The main goal is quick identification of persons who may have come into close co ...
and COVIDSafe before they were
patched Patched (Ptc) is a conserved 12-pass transmembrane protein receptor that plays an obligate negative regulatory role in the Hedgehog signaling pathway in insects and vertebrates. Patched is an essential gene in embryogenesis for proper segm ...
. Generally, there are two ways of generating Ephemeral IDs. Centralized protocols such as
BlueTrace BlueTrace is an open-source application protocol that facilitates digital contact tracing of users to stem the spread of the COVID-19 pandemic. Initially developed by the Singaporean Government, BlueTrace powers the contact tracing for the TraceT ...
issue Temporary IDs from the central reporting server, where they are generated by
encrypting In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
a static User ID with a
secret key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key c ...
only known to the health authority. Alternatively, anonymous decentralized protocols such as
TCN TCN is the flagship (television), flagship television station of the Nine Network in Australia. The station is currently located at 1 Denison Street, North Sydney, New South Wales, North Sydney. The licence, issued to a company named Television C ...
and DP-3T have the clients deterministically generate the IDs from a secret key only known to the client. This secret key is later revealed and used by clients to determine contact with an infected patient.


List of protocols


Issues and controversies

During the currently unfolding
COVID-19 pandemic The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing global pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The novel virus was first identif ...
, reactions to digital contact tracing applications worldwide have been drastic and often polarized, especially in European countries. Despite holding the promise to drastically reduce contagion and allow for a relaxation of social distancing measures, digital contact tracing applications have been criticized by academia and publics alike. The two main issues brought up concern the technical efficacy of such systems and their ethical implications, in particular regarding privacy, freedoms and democracy. The US non-profit, ForHumanity, called for Independent Audit and Governance of Contact Tracing and the subsequently launched the first comprehensive audit vetted by a team of global experts, known as ForHumanity Fellows on privacy, algorithmic bias, trust, ethics and cybersecurity. NY State Senate Bill S-8448D, which passed in the Senate in July 2020, calls for Independent Audit of Digital Contact Tracing.


Independent audit and governance

Voluntary adoption of digital contact tracing has fallen short of some estimated thresholds for efficacy. This has been referred to as a "trust-gap" and advocates for digital contact tracing have endeavored to identify ways to bridge the gap. Independent Governance suggests that contact tracing authorities and technology providers do not have adequate trust from the traced populace and therefore requires independent oversight which exists on behalf of the traced for the purposes of looking after their best interests. Independent Audit borrows from the financial accounting industry the process of third-party oversight assuring compliance with existing rules and best-practices. The third party auditor examines all details of digital contact tracing in the areas of ethics, trust, privacy, bias and cybersecurity. The audit provides oversight, transparency and accountability over the authority providing the digital contact tracing.


Technical feasibility

The technical feasibility and necessity of digital contact tracing is currently subject of debate, with its major proponents claiming it to be indispensable to stop the spread of pandemics, as COVID-19, and its opponents raising points on its technical functioning and adoption rate by citizens. First of all, the conflict between the opt-in voluntary usage by citizens in many countries and the necessity of an almost universal adoption rate is unresolved. Indeed, according to a study published in ''Science'', an adoption rate between of around 60% of the total population is needed for digital contact tracing applications to be effective. In countries where this was made voluntary, like Singapore, the adoption rate remained below 20%. Second, the efficacy of using Bluetooth technology to determine proximity is subject to scrutiny, with critics pointing out that false positives could be reported due to the inaccuracy of the technology. Instances of this are interference by physical objects (e.g. two people in two adjacent rooms) and connections being made even at 10–20 meters distances.


System requirements

Smartphone-based digital contact tracing applications have system requirements such as Android/iOS version, bluetooth enabled, gps enabled. The system requirements facilitate maintainability and technical effectiveness at the cost of the adoption rate. Smartphones stop receiving software updates a few years after release (2–3 years for Android, 5 years for iOS). Improvements to this ecosystem would benefit the adoption rate of future digital contact tracing applications.


Ethical issues

Other than having doubts about the technical effectiveness of smartphone-based contact tracing systems, publics and academia are confronted with ethical issues about the use of smartphone data by central governments to track and direct citizen behaviour. The most pressing questions pertain privacy and surveillance, liberty, and ownership. Around the world, governments and publics have taken different positions on this issue.


Privacy

On privacy, the main problem about digital contact tracing regards type of information which can be collected from each person and the way related data is treated by companies and institutions. The type of data which is collected, and the approach being used (centralized or decentralized) determine the severity of the issue. In other words, a privacy-first approach that sacrifices data for privacy or a data-first approach that collects citizen data in exchange for private information from citizens. Moreover, critics point out that claims of anonymity and protection of personal data, even if made by institutions, cannot be verified and that individual's user profiles can be traced back in several cases.


Surveillance

Closely related to privacy, comes the issue of surveillance: too much personal data in centralized governmental database could set a dangerous precedent on the way governments are capable of “spying” on individual behaviour. The possibility that a wide-ranging adoption of digital contact tracing could set a dangerous precedent for surveillance and control has been abundantly treated by media and academia alike. In short, the main concern here relates to the tendency of temporary measures, justified by an emergency situation, to be normalized and extended indefinitely in a society. Concerns of normalizing exceptional surveillance practices were raised Israel, where existing cellphone surveillance measures used for counterterrorism purposes were employed for COVID-19 contact tracing purposes.


Environment

Electronic waste Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics which are destined for refurbishment, reuse, resale, salvage recycling through material recovery, or disposal are also considered e-waste. Informa ...
may result from the need to purchase a new smartphone to meet the system requirements of smartphone-based digital contact tracing applications.


See also

*
COVID-19 apps COVID-19 apps include mobile-software applications for digital contact-tracing - i.e. the process of identifying persons ("contacts") who may have been in contact with an infected individual - deployed during the COVID-19 pandemic. Numerous ...
*
Alipay Health Code Government by algorithm (also known as algorithmic regulation, regulation by algorithms, algorithmic governance, algocratic governance, algorithmic legal order or algocracy) is an alternative form of government or social ordering, where the usa ...


References

Software associated with the COVID-19 pandemic Bluetooth software Mass surveillance


Further reading

* {{cite book , title=Contact Tracing in Post-Covid World: A Cryptologic Approach , last1=Chakraborty , first1=Pranab , author2=Subhamoy Maitra , author3=Mridul Nandi , author4=Suprita Talnikar , year=2021 , publisher=Springer , isbn=9789811597268 , url=https://www.springer.com/gp/book/9789811597268