Download Other
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Rise of the IMSI Catcher
Rise of the IMSI Catcher Lisa Parks In the wake of the Patriot Acts and the Snowden revelations, new details about surveillance technologies rarely seem surprising. Many have grown accustomed to Constitution-violating “sneak and peek” search warrant practices, biometric scanning, and sensors that make anything and everything monitor-able, no matter how large or small. As billions of people around the world are becoming digitally connected, the Kool-Aid is beginning to wear off. Networked office workers are revolting against the constant scrutiny of their online activities. Internet users are upset that Twitter and Facebook are in cahoots with the National Security Agency (NSA). And GPS- equipped smartphones seem more and more like electronic ankle bracelets. The utopian allure of connectivity is cracking and totalitarian tendencies are alive and kicking, especially in the world’s democracies. Such conditions have kept surveillance scholars busy. Since 9/11, scholars have analyzed the monumental shifts in surveillance that have unfolded in the context of the War on Terror.1 They have demonstrated that digital networks and social media have become havens for state and corporate monitoring of citizens’ expressions and transactions.2 They have explored how techniques of racial profiling, biometrics, and physical searching continue to disenfranchise people who are already vulnerable or immersed in struggles for social equality and justice, including the poor, people of color, and refugees.3 And they have charted the labyrinthine expansion of closed- circuit and airport security systems and the complex dynamics of their use.4 Despite the plethora of vital topics that have been tackled, surveillance Media Fields Journal no. -
Cellphone Surveillance Gear Floods U.S.Pdf
2/9/2017 Cellphone Surveillance Gear Floods U.S. Cities CityLab From The Atlantic Cellphone Spy Tools Have Flooded Local Police Departments Major cities throughout the U.S. have spent millions on mobile surveillance tools—but there are still few rules about what happens to the information they capture. GEORGE JOSEPH | @georgejoseph94 | Feb 8, 2017 | 100 Comments A protester uses her phone during a night of demonstrations over the police shooting of Keith Scott in Charlotte, North Carolina. (Mike Blake/Reuters) Love CityLab? Make sure you're signed up for our free e-mail newsletter. Email Sign up A little after midnight on November 28, 2014, hundreds of Black Lives Matter protesters filled the streets of downtown Chicago. The demonstration was one of many that erupted in cities nationwide soon after a Missouri grand jury failed to indict a Ferguson, Missouri, police officer for the shooting death of Michael Brown that August. As the protesters marched, a police vehicle crept behind them. The black SUV emblazoned with “City of Chicago Emergency Management” appeared to have two 360-degree cameras sprouting from its roof and a command center in the back. Whenever the vehicle drove by, protesters reported that their phones stopped working. A week later, audio of a police radio dispatch from the protest was released online. In the recording, an officer alerts a department intelligence analyst about of one of the protest organizers. “One of the girls here… she's been on http://www.citylab.com/crime/2017/02/cellphonespytoolshavefloodedlocalpolicedepartments/512543/?ncid=newsltushpmgnews 1/12 2/9/2017 Cellphone Surveillance Gear Floods U.S. -
9781108722100 Index.Pdf
Cambridge University Press 978-1-108-72210-0 — The Cambridge Handbook of Surveillance Law Edited by David Gray , Stephen E. Henderson Index More Information 757 Index Abika.com, 720 , 725 Amsterdam, Anthony, 609 Abortion, 317 Anderson, Joel, 635 Accountability, 72 , 160 , 172 , 193 , 277 , 463 , 503 , 606 , Andrejevic, Mark, 134 610 , 617 , 694 , 701 Angry Birds, 204 , 422 Accusearch, 720 Angwin, Julie, 426 ACLU v. Clapper , 33 , 262 , 587 Anonymity, 291 , 306 , 372 , 479 , 480 . See also Acxiom, 423 , 433 Constitutional Regulation of Surveillance, First Adams, John, 534 Amendment Adams, Samuel, 404 AOL, 440 Adblock Plus, 211 Apex Air Entry and Exit Re- Engineering Project, 146 Addington, David, 252 Apple, 222 , 239 , 240 , 243 , 334 , 355 , 424 , 432 , Administrative Procedure Act, 616 , 733 579 , 721 Rule making, 733 Encryption Controversy, 222 , 240 , 242 , 243 , 245 , Notice and Comment, 617 , 733 336 , 337 , 355 , 424 , 579 , 721 Notice of Inquiry, 734 Arab Spring, 146 Administrative Regulation of Surveillance, 178 , Area of Freedom, Security, and Justice, 645 , 654 276 , 433 , 511 , 542 , 574 , 599 , 615 , 677 , 681 , Article 29 Working Party, 649 708 – 26 , 727 Ashcroft, John, 13 , 252 , 549 Consent Decree, 735 Ashcroft v. Iqbal , 554 , 583 Enforcement Actions, 734 Assembly, Freedom of. See Constitutional Regulation Inspectors General, 557 of Surveillance, First Amendment Intraagency Review, 18 , 22 , 500 Associated Press, 475 Administrative Surveillance, 395 – 419 Association, Freedom of, 438 , 470 , 471 . See also Adversarial -
The Fourth Amendment in the Digital Age NACDL Symposium
The Fourth Amendment in the Digital Age NACDL Symposium Andrew Guthrie Ferguson Professor of Law UDC David A. Clarke School of Law REPORTER 0110 0100 0011 1001 1010 1100 1000 0111 Supported by a grant from the Foundation for Criminal Justice. 0011 Copyright © 2016 National Association of Criminal Defense Lawyers This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. To view a copy of this license, visit 0101 http://creativecommons.org/licenses/by-nc-nd/4.0/. It may be reproduced, provided that no charge is imposed, and the National Association of Criminal Defense Lawyers is acknowledged 1001 as the original publisher and the copyright holder. For any other form of reproduction, please contact NACDL for permission. Cover Images: 0000 © VoodooDot | shutterstock — surveillance © Alex Stokes | Dollarphotoclub — hand 1110 0110 1011 0010 For more information contact: NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS 0001 1660 L Street NW, 12th Floor Washington, DC 20036 Phone: 202-872-8600 1100 www .nacdl .org 1101 This publication is available online at www.nacdl.org/FourthAmendmentInTheDigitalAge 0110 0100 0011 1001 1010 The Fourth Amendment in the Digital Age NACDL Symposium 1100 1000 0111 E.G. “Gerry” Morris Gerald B. Lefcourt President, NACDL President, FCJ Austin, TX New York, NY 0011 0101 1001 Theodore Simon Immediate Past-President, NACDL Philadelphia, PA 0000 Norman L. Reimer Executive Director, NACDL 1110 Washington, DC Kyle O’Dowd 0110 Associate Executive Director for Policy, NACDL Washington, DC 1011 Jumana Musa Sr. Privacy and National 0010 Security Counsel, NACDL Washington, DC 0001 Andrew Guthrie Ferguson Professor of Law UDC David A. -
Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment Jonathan Bard Boston College Law School, [email protected]
Boston College Law Review Volume 57 | Issue 2 Article 8 3-31-2016 Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment Jonathan Bard Boston College Law School, [email protected] Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Communications Law Commons, Criminal Law Commons, Criminal Procedure Commons, Fourth Amendment Commons, and the Law Enforcement and Corrections Commons Recommended Citation Jonathan Bard, Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment, 57 B.C.L. Rev. 731 (2016), http://lawdigitalcommons.bc.edu/bclr/vol57/iss2/8 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. UNPACKING THE DIRTBOX: CONFRONTING CELL PHONE LOCATION TRACKING WITH THE FOURTH AMENDMENT Abstract: Surveillance technology has raced ahead of the Fourth Amendment, forcing courts to confront high-tech intrusions with rusty jurisprudence. The Dirtbox, an airborne cell-site simulator, allows the government to sweep entire cities and intercept individuals’ cell phone location information without rely- ing on cooperative intermediaries. This Note argues that the government’s use of the Dirtbox and other cell-site simulators amounts to a Fourth Amendment search because it may pinpoint individuals within a constitutionally protected space. Although the Department of Justice issued policy guidelines requiring its agents to obtain a search warrant before using this device, this narrow and unenforceable protocol fails to adequately regulate the rising use of cell phone tracking devices. -
Active Cell Site Simulators and the Fourth Amendment Aimee Thomson*
Cellular Dragnet: Active Cell Site Simulators and the Fourth Amendment Aimee Thomson* This Paper examines government use of active cell site simulators (ACSSs) and concludes that ACSS operations constitute a Fourth Amendment search. An ACSS known colloquially as a stingray, triggerfish, or dirtbox mimics a cell phone tower, forcing nearby cell phones to register with the device and divulge identifying and location information. Law enforcement officials regularly use ACSSs to identify and locate individuals, often with extreme precision, while sweeping up the identifying and location information of hundreds or thousands of third parties in the process. Despite the pervasive use of ACSSs at federal, state, and local levels, law enforcement duplicity concerning ACSS operations has prevented courts from closely examining their constitutionality. ACSS operations constitute a Fourth Amendment search under both the trespass paradigm and the privacy paradigm. Within the former, an ACSS emits radio signals that trespass on . Under the Jones reinvigoration of the trespass paradigm cell phones for the purpose of obtaining information, constituting a Fourth Amendment trespass. Radio signals also trespass under common law property and tort regimes, and the Paper proposes a new rule, consistent with existing trespass jurisprudence, to target only those radio signals that intentionally and without consent cause an active physical change in the cell phone. Within the latter, ACSS operations constitute a Fourth Amendment search because they that society can and should recognize as reasonable, particularly if Fourth Amendment jurisprudence continues to eliminate secrecy as a proxy for privacy. Until courts decisively recognize warrantless ACSS operations as illegal, however, advocates and litigants can implement several interim remedial measures. -
The Fourth Amendment in the Digital Age NACDL Symposium
The Fourth Amendment in the Digital Age NACDL Symposium Andrew Guthrie Ferguson Professor of Law UDC David A. Clarke School of Law REPORTER 0110 0100 0011 1001 1010 1100 1000 0111 Supported by a grant from the Foundation for Criminal Justice. 0011 Copyright © 2016 National Association of Criminal Defense Lawyers This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. To view a copy of this license, visit 0101 http://creativecommons.org/licenses/by-nc-nd/4.0/. It may be reproduced, provided that no charge is imposed, and the National Association of Criminal Defense Lawyers is acknowledged 1001 as the original publisher and the copyright holder. For any other form of reproduction, please contact NACDL for permission. Cover Images: 0000 © VoodooDot | shutterstock — surveillance © Alex Stokes | Dollarphotoclub — hand 1110 0110 1011 0010 For more information contact: NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS 0001 1660 L Street NW, 12th Floor Washington, DC 20036 Phone: 202-872-8600 1100 www .nacdl .org 1101 This publication is available online at www.nacdl.org/FourthAmendmentInTheDigitalAge 0110 0100 0011 1001 1010 The Fourth Amendment in the Digital Age NACDL Symposium 1100 1000 0111 E.G. “Gerry” Morris Gerald B. Lefcourt President, NACDL President, FCJ Austin, TX New York, NY 0011 0101 1001 Theodore Simon Immediate Past-President, NACDL Philadelphia, PA 0000 Norman L. Reimer Executive Director, NACDL 1110 Washington, DC Kyle O’Dowd 0110 Associate Executive Director for Policy, NACDL Washington, DC 1011 Jumana Musa Sr. Privacy and National 0010 Security Counsel, NACDL Washington, DC 0001 Andrew Guthrie Ferguson Professor of Law UDC David A. -
Department of Justice: National Security Division FOIA Request Log
Department of Justice: National Security Division FOIA request log, June 2013 - July 2015 Brought to you by AltGov2 www.altgov2.org/FOIALand NSD FOIA LOG From 06/17/2013 to 07/22/2015 Consul- Date Initially Date Request # Last Name First Name Subject of Request tation Date of Request Rec'd by NSD Completed Disposition Reason(s) 2009-161 Grafeld Margaret Daniel Pearl N 6/10/2009 12/23/2013 6 Schechter Ronald A any and all records relating to or N 5/6/2014 reflecting the U S Government's decisions or actions regarding the transfer, release, repatriation, or 2012-019 9/30/2011 10/13/2011 prosecution (by either military commissions or in a United States District Court) of Fayiz Al Kandari and/or of Fawzi Al Odah Schechter Ronald A any and all records reflecting the U S N Government's communications relating to, and decisions concerning the preferral 2012-024 and/or referral of, criminal charges by the 9/30/2011 10/13/2011 Office of Military Commissions against Fayiz Mohammed Ahmed Al Kandari Kraemer Alexander seeks records that will illuminate if and N how agencies responsible for implementing FISA/FAA authorities are interpreting these invasive anti terrorist 2012-056 surveillance powers; how the FISA/FAA 10/10/2011 11/17/2011 spying powers is being used; and if safeguards are in place to prevent abuse of Americans' rights (see FOIA request- 5 & 6, 1-13) Bogardus Kevin Request for any and all records N concerning audits of firms and individuals under the Foreign Agents Registration 2012-082 1/5/2012 1/6/2012 Act since fiscal year 2001 to -
Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies
Before the Federal Communications Commission Washington, DC 20554 In the Matter of Baltimore City Police Department Baltimore, Maryland Complaint for Relief Against Unauthorized Radio Operation and Willful Interference with Cellular Communications Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies Memorandum in Support of Complaint for Relief Against Unauthorized Radio Operation and Willful Interference with Cellular Communications and Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies (Complaint and Petition Submitted August 16, 2016) Submitted by American Civil Liberties Union American Civil Liberties Union of Northern California New York Civil Liberties Union American Civil Liberties Union of Maryland Electronic Frontier Foundation Nathan Freed Wessler American Civil Liberties Union Foundation 125 Broad St., 18th Fl. New York, NY 10004 (212) 549-2500 September 1, 2016 [email protected] Additional Signatories Listed Below Table of Contents Summary ......................................................................................................................................... 1 Interest of Parties ............................................................................................................................ 3 Argument ........................................................................................................................................ 4 I. The Issues Identified in the Complaint and Petition -
IMSI Catchers and Mobile Security Advisor: Professor Nadia Heninger
By Joseph Ooi IMSI Catchers and Mobile Security Advisor: Professor Nadia Heninger EAS 499 Senior Capstone Thesis School of Engineering and Applied Science University of Pennsylvania April 29, 2015 TABLE OF CONTENTS 1 INTRODUCTION ............................................................................ 2 2 CELL PHONE PROTOCOLS ........................................................ 3 2.1 CELLULAR NETWORKS .......................................................................................................................................... 3 2.2 1G (ANALOG) ..................................................................................................................................................... 3 2.3 2G (DIGITAL) ...................................................................................................................................................... 3 2.4 GSM PROTOCOL ................................................................................................................................................ 4 2.5 2.5G (GPRS) AND 2.75G (EDGE)........................................................................................................................ 8 2.6 3G (UMTS AND CDMA2000) ............................................................................................................................. 8 2.7 4G (WIMAX AND LTE) ....................................................................................................................................... 9 3 IMSI CATCHERS .........................................................................