Contact Tracing: The Technology

Jul 9, 2020, 13:59 PM by BBB National Programs

Imagine that you have been placed in charge of setting up a contact tracing system using the smartphones already in the hands of the public. As we explained in our first piece in this series, one of the main goals of this system is to alert those who may have come into contact with others infected with coronavirus. Certain information—such as the precise location where such contact has taken place—may be useful but is not strictly necessary to the app’s purpose. And, for the sake of privacy, you want to avoid releasing identifying information about those participating in the system.

Not too long ago, such a system would have been virtually impossible without centrally monitoring and logging the location and movements of all participating smartphones—and their users. Such a system would be prone to abuse and invasions of privacy, and many members of the public would likely decline to participate for those reasons.

That is no longer the case.

In a joint project, Google and Apple are implementing a smartphone contact tracing system using a special protocol, ubiquitous on smartphones, that avoids most of these pitfalls: Bluetooth LE.


What is Bluetooth LE?

Bluetooth is familiar to mobile device users as the ubiquitous wireless protocol used by phones, tablets, laptops, and other electronics for short-range wireless communication. First introduced in the late 1990s, Bluetooth is used to wirelessly connect everything from headphones to keyboards to medical devices.

Bluetooth LE—standing for Low Energy—was introduced in 2009 to deal with an issue that had plagued Bluetooth since its inception: power consumption. Standard Bluetooth worked well enough but tended to rapidly drain power from devices. By substantially reducing the power required, Bluetooth LE was designed to allow Bluetooth connectivity in a wider range of devices—allowing for the creation of tiny devices powered by a “button” battery for months, or even years.

Bluetooth LE is especially useful for applications that involve proximity (or “closeness”) detection in the immediate area, with a typical range of about 30 feet. For instance: small tracker devices are widely sold (“Tile” is a popular brand) which, when attached to a keychain or other easily lost object, enable its easy location by using a smartphone. These devices use Bluetooth LE to continuously operate and transmit a signal without rapidly draining the battery. Other applications include fitness wristbands, healthcare devices, and “smart home” appliances.

Because Bluetooth LE has been built into every phone for nearly a decade and was designed with proximity detection in mind, it is ideal for continuously detecting which smartphones are near each other (and thus, which smartphone owners are near each other). This is accomplished by directing phones to transmit identifiers to each other, which are then received and logged. This transmission can happen on a continuous basis without draining users’ batteries.

But that’s only part of the solution.

To encourage widespread adoption and avoid privacy issues, the system developed by Google and Apple doesn’t involve transmitting identifiers easily traced to individual phones or owners, but instead uses rolling, or ephemeral identifiers.


What is an ephemeral ID?

The Bluetooth LE specification already provides for rolling identifiers (Media Access Control, or “MAC” addresses), to prevent phones from being identified and tracked. While adequate for most uses, changing the MAC address periodically is likely not enough to ensure user privacy for contact tracing, due to known weaknesses in the protocol. Instead of relying on MAC addresses to anonymize users, the contract tracing system developed by Google and Apple takes this concept a step further.

Under this system, a phone participating in a contact tracing program generates an apparently random identifier, not directly traceable to the phone or its owner, and continually transmits it to nearby phones using Bluetooth LE. This identifier is changed every 10–20 minutes (the ID thus being “rolling” or “ephemeral”), every time the phone’s Bluetooth LE MAC address routinely changes, and is derived from a “Temporary Exposure Key,” (“TEK”) which is changed daily. Each participating phone also “listens” for other phones’ broadcasts and will receive and store the identifiers of nearby phones for fourteen days.

If a participating user is diagnosed as positive for coronavirus, that user can alert the contact tracing app of the diagnosis. With the user’s consent, the app will then upload the phone’s last fourteen days of TEKs to a central server. Every other phone running the contact tracing app will automatically download these anonymous keys, use them to derive the ephemeral IDs for the diagnosed person’s phone over the previous 14 days, then compare them against the phone’s own list of collected identifiers.

If a match is found—signifying that the phone’s user has recently been in the vicinity of someone who later tested positive for coronavirus—the app will alert the user that a potential exposure has occurred and provide information about what to do next.


Why is this useful for contact tracing?

In balancing the requirements for a smartphone contact tracing system—privacy, effectiveness, power efficiency, vulnerability to bad actors, and so on—Bluetooth LE provides an effective means of notifying users of potential contacts in a timely fashion, while mitigating most of the other concerns. The system places little burden on users and won’t drain their smartphone batteries. It doesn’t record the locations of users, only their temporary proximity—keeping the users’ locations private both from system administrators and potential hackers.

Unlike GPS (Global Positioning System), commonly used for maps and directions, contact tracing identifiers don’t indicate the location of smartphones at the time they made contact, only the fact that contact was made. This enhances the privacy aspects of the contact tracing system—even supposing that a hostile actor were able to compromise the system and identify individual phones, the actual location and path of the phones would remain inaccessible, as that data is never recorded by the system.


Looking Forward

By using Bluetooth LE instead of a location-based system (such as GPS), Google and Apple’s contact tracing system increases the likelihood that it can successfully make a difference in fighting coronavirus without sacrificing individual privacy to do it. This is not to say that it is perfect: as with any technological system, weaknesses or vulnerabilities often emerge when implemented.

BBB National Programs and other privacy organizations continue to monitor the development and implementation of this and other contact tracing systems. Nevertheless, Google and Apple’s system shows real promise as a means of increasing individual awareness of potential coronavirus contacts—and doing it without violating privacy, while using a feature already found on everyone’s phones.

Suggested Articles


Avoid Misleading Messages When Advertising Medical Devices

Advertisers of medical devices face complex tasks when marketing their products. In addition to complying with FDA regulations, medical device advertising is subject to the same truth-in-advertising principles set by the FTC. In addition to express claims, marketers are responsible for all the messages reasonably conveyed to consumers in their advertising and should ask some important questions to ensure consumers are not misled. Ask yourself these questions when advertising medical devices to avoid conveying misleading messages.
Read more

The Do’s and Don’ts of Buying Smart for Baby: A Primer from Privacy Experts

Researching a new product and finding the critical or in-depth information you are looking for to build confidence in your purchasing decision often requires sifting through superficial lists of “best products.” These lists are often sponsored by the products they feature, which means instead of a focus on being helpful they are full of incentivized endorsements and affiliate links. In this blog, we provide a list – not a sponsored list – of some do’s and don’ts for how to confidently research smart devices.
Read more

When Web Designs Turn Into Dark Patterns And What To Do About It

Recently I wrote about the proliferation of dark patterns and tried to give readers a sense of just how widespread these practices are. But it is not just the pervasiveness of dark patterns that has lawmakers and regulators concerned, it is the intent behind them and their impact on consumers. Nonprofit leaders, in particular, should be aware of this and how to guard against it given that they are well-positioned to garner and enhance consumer trust.
Read more

Politics Aside, Advertising Gains Guidance on Deception and Substantiation in the 1980s

As we continue to celebrate the 50th anniversary of the National Advertising Division (NAD) we are looking forward while taking stock of past decades, with a special focus on decisions and developments that continue to impact advertising law and NAD cases today. This month we highlight two pivotal moments from the 1980’s that helped shape NAD’s jurisprudence.
Read more