9781108722100 Index.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

9781108722100 Index.Pdf Cambridge University Press 978-1-108-72210-0 — The Cambridge Handbook of Surveillance Law Edited by David Gray , Stephen E. Henderson Index More Information 757 Index Abika.com, 720 , 725 Amsterdam, Anthony, 609 Abortion, 317 Anderson, Joel, 635 Accountability, 72 , 160 , 172 , 193 , 277 , 463 , 503 , 606 , Andrejevic, Mark, 134 610 , 617 , 694 , 701 Angry Birds, 204 , 422 Accusearch, 720 Angwin, Julie, 426 ACLU v. Clapper , 33 , 262 , 587 Anonymity, 291 , 306 , 372 , 479 , 480 . See also Acxiom, 423 , 433 Constitutional Regulation of Surveillance, First Adams, John, 534 Amendment Adams, Samuel, 404 AOL, 440 Adblock Plus, 211 Apex Air Entry and Exit Re- Engineering Project, 146 Addington, David, 252 Apple, 222 , 239 , 240 , 243 , 334 , 355 , 424 , 432 , Administrative Procedure Act, 616 , 733 579 , 721 Rule making, 733 Encryption Controversy, 222 , 240 , 242 , 243 , 245 , Notice and Comment, 617 , 733 336 , 337 , 355 , 424 , 579 , 721 Notice of Inquiry, 734 Arab Spring, 146 Administrative Regulation of Surveillance, 178 , Area of Freedom, Security, and Justice, 645 , 654 276 , 433 , 511 , 542 , 574 , 599 , 615 , 677 , 681 , Article 29 Working Party, 649 708 – 26 , 727 Ashcroft, John, 13 , 252 , 549 Consent Decree, 735 Ashcroft v. Iqbal , 554 , 583 Enforcement Actions, 734 Assembly, Freedom of. See Constitutional Regulation Inspectors General, 557 of Surveillance, First Amendment Intraagency Review, 18 , 22 , 500 Associated Press, 475 Administrative Surveillance, 395 – 419 Association, Freedom of, 438 , 470 , 471 . See also Adversarial Judicial System, 512 Constitutional Regulation of Surveillance, First Advertisers, 174 Amendment Aerial Surveillance , 264 AT&T, 11 , 424 , 582 , 731 , 750 Afghanistan, 127 Atlantic , 219 Aftergood, Steven, 260 Attorney General, 10 , 39 , 80 , 109 , 600 Air Force Offi ce of Scientifi c Research, 145 Audit Logs, 22 , 280 , 284 Air Transportation and Security, 71 Auditing, 34 al Qaeda, 12 , 21 , 252 Authorization for Use of Military Force (AUMF), 14 Alexander, Keith, 352 Automated License Plate Recognition, 182 , 186 , 188 , Alien and Sedition Act, 534 194 , 271 , 387 , 423 Alito, Samuel, 58 , 69 , 215 , 264 Autonomy, 457 , 466 , 471 , 477 All Writs Act, 242 , 384 , 505 , 580 Auto- Surveillance. See Self- Surveillance Amar, Akhil, 407 Aviation and Transportation Security Act, 77 Amazon, 473 Avoidance of Surveillance, 713 Amazon Echo, 208 Awad, Nihad, 565 America Online, 239 American Civil Liberties Union, 163 , 274 , 280 , 283 , Backbone (Telecommunications), 30 300 , 568 , 637 , 703 Bailyn, Bernard, 406 American Civil Liberties Union v. Clapper , 703 Baker, Stewart, 425 American Colonies, 309 , 533 Balancing Approach, 40 American Friends Service Committee, 536 Balkin, Jack, 135 Amirahmadi, Hooshang, 565 Baltimore, Maryland, USA, 282 757 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-108-72210-0 — The Cambridge Handbook of Surveillance Law Edited by David Gray , Stephen E. Henderson Index More Information 758 758 Index Bamford, James, 253 Brand, Rachel, 692 Bank Secrecy Act, 188 Brandeis, Louis, 346 , 431 Barbie, 220 Bratton, William, 320 , 566 Barbulescu v. Romania , 515 Brave New World , 134 Barnosky, Jason, 163 Brazil, 670 , 674 Bates v. Little Rock , 478 Brennan Center for Justice, 165 , 573 Bates, John, 31 , 107 , 569 Brennan, William, 323 Beck, Charles, 194 Brewer, John, 401 Behavioral Marketing, 175 Brexit, 464 Belgium, 523 Brightest Flashlight, 427 Bell Atlantic v. Twombly , 554 , 583 Brittain, Craig, 725 Bellia, Patricia, 612 Brookings Institute, 163 BellSouth, 11 Brown, Jerry, 635 Benner- Beck, Dru, 330 Brown, Michael, 282 Berger v. New York , 298 , 496 , 506 , 589 , 598 Bucella, Donna, 87 Beria, Lavrenti, 422 Budapest Convention on Cybercrime, 670 , 671 Berk, Richard, 134 Bulk Metadata Surveillance, 7 – 43 Bernstein v. United States , 349 Bureau of Alcohol, Tobacco, Firearms and Explosives Beware (Policing App), 221 (ATF), 192 Big Data, 121 – 49 , 171 – 97 , 484 , 494 , 642 , 737 Burger, Warren, 430 Big Data Governance, 125 Bush, George W., 8 , 77 , 78 , 108 , 248 , 550 , 688 , 691 Bilateral Treaty, 672 Biles, Simone, 220 Cable Communications Act, 730 , 731 , 744 Binary Searches, 322 Cable Communications Privacy Act, 605 Binney, William, 436 , 440 Cable Television Consumer Protection and Biometric Surveillance, 121 – 49 , 185 , 186 , 188 , 194 , Competition Act, 730 489 , 642 Caldwell, Leslie, 241 Behavioral, 126 , 129 , 142 , 273 CALEA. See Communications Assistance for Law DNA, 122 , 128 , 130 , 172 , 508 , 644 Enforcement Act Rapid DNA, 146 California, 636 Facial Recognition, 122 , 142 , 182 , 185 , 194 , 211 , California Communications Privacy Act (CalECPA), 273 , 281 , 423 , 489 299 , 384 , 623 Fingerprinting, 122 , 145 , 185 California District Attorneys Association, 639 Hard (Primary), 125 California Police Chiefs Association, 639 Iris Scan, 122 , 145 California Research Bureau, 274 Soft (Secondary), 125 California State Sheriffs’ Association, 639 Voice Recognition, 130 , 141 California v. Ciraolo , 264 Black Lives Matter, 567 Calo, Ryan, 467 Blacklists, 72 . See also Watchlists Capitalism, 456 , 466 Blackstone, William, 402 Carter, David L., 152 Blasi Casagran, Cristina, 642 Casablanca , 71 , 99 Blasi, Vincent, 439 Catholic Worker , 567 Blatchford, Samuel, 414 Cell Phone Surveillance, 190 , 231 Blitz, Mark, 263 Cell Site Location Information, 45 , 47 , 235 , 494 , 605 . Bloomberg, Michael, 271 See also Location Surveillance Bluetooth, 201 , 746 Center for Democracy and Technology, 703 Body Cameras, 281 , 604 Central Intelligence Agency, 25 , 115 , 118 , 220 , Bolingbroke, Henry St. John, 402 535 , 688 Border Security, 130 Director of, 80 Bork, Robert, 487 Certifi cation Order, 500 , 631 Boston, USA Cheney, Richard, 12 , 252 Boston Police Department, 143 Chertoff, Michael, 272 Boston Regional Intelligence Center (BRIC), 161 , Chicago, Illinois, USA, 192 , 272 , 282 164 , 165 Child Pornography, 323 , 325 , 493 , 640 Marathon Bombing . See Terrorism, USA Children’s Online Privacy Protection Act, 180 , 188 Bot, Yves, 656 Chilling Effect, 178 , 277 , 353 , 420 – 36 , 437 – 48 , Boundary Management, 458 , 460 , 465 460 , 470 Bournemouth, England, 270 China, 242 , 259 , 351 , 373 , 374 , 670 Boyd v. United States , 415 Church, Frank, 74 , 250 boyd, danah, 285 Church Committee, 74 , 250 , 260 , 533 , 536 , 686 Bradley, Joseph, 416 Cider Tax of 1763, 403 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-108-72210-0 — The Cambridge Handbook of Surveillance Law Edited by David Gray , Stephen E. Henderson Index More Information 759 Index 759 Cisco Systems, Inc., 243 Constitutional Regulation of Surveillance, 495 Citron, Danielle Keats, 291 Due Process, 148 , 186 , 213 City of Los Angeles v. Lyons, 587 Notice, 72 , 94 , 244 Civil Liberties and Privacy Offi cers, 683 , 694 Equal Protection, 186 , 187 , 214 Civil Society, 465 Fifth Amendment Clapper, James, 7 , 258 , 259 , 351 Right against Compelled Self- Incrimination, 490 Clapper v. Amnesty International , 439 , 487 , 584 , 680 First Amendment, 20 , 22 , 178 , 278 , 353 , 470 , 549 , Clarke, Roger, 134 679 , 699 , 722 Classifi ed Information, 74 , 117 , 575 Anonymity, 479 , 480 Clear Channel Outdoors, 206 Freedom of Speech, 476 Clipper Chip, 363 Freedom of the Press, 483 Closed Circuit Television (CCTV) Surveillance, 133 , Right of Assembly, 477 182 , 186 , 211 , 263 , 321 , 515 , 601 Fourth Amendment, 10 , 15 , 26 , 32 , 40 , 52 , 86 , 102 , Cloud Computing/ Cloud Storage, 334 , 372 , 494 , 552 108 , 111 , 113 , 148 , 186 , 200 , 212 , 221 , 264 , Cloud Security Alliance, 443 267 , 296 , 322 , 338 , 381 , 427 , 433 , 483 – 86 , 493 , Cloudwash, 208 506 , 512 , 534 , 538 , 589 , 597 , 699 , 709 Cohen, Julie, 455 Digital Search Protocol, 229 Coke, Edward, 399 Exigent Circumstances, 68 Cold War, 533 Foreign Intelligence, 113 Collins, Elisabeth, 692 National Security, 486 Colon v. Netherland , 514 Oath or Affi rmation, 503 Colombia, 750 Particularity Requirement, 230 , 232 , 298 , 496 , 500 Combined DNA Index System (CODIS), 185 The People, 105 , 113 , 251 Combined Intelligence Fusion Cell, 141 Plain View Doctrine, 229 , 503 Comey, James, 13 , 42 , 239 , 241 , 252 , 355 , 361 , 474 , Private Search Doctrine, 297 562 , 703 Probable Cause, 628 Common Carriers, 730 Search Incident to Arrest, 231 Common Foreign and Security Policy, 654 , 657 Special Needs, 15 Commonwealth v. Dana, 410 Standing, 105 . See also Judicial Regulation of Communications Act, 730 – 32 Surveillance Section 201, 741 State Agency Requirement, 434 Section 222, 736 Taint Team, 229 Customer Proprietary Information, 738 Trespass Concept, 58 Customer Proprietary Network Information, 737 Warrant Requirement, 534 Section 227, 752 Constitutional Regulation of Surveillance, First Section 229, 748 Amendment, 163 Section 301, 745 Consular Lookout and Support System (CLASS), 75 Section 303, 745 Contact Chaining. See Social Network Analysis Section 333, 755 Contextual Integrity, 458 Section 631, 744 , 754 Convention for the Protection of Human Rights and Section 705, 743 , 747 , 755 Fundamental Freedom Communications Assistance for Law Enforcement Act, Article 8, 475 52 , 245 , 363 , 748 Convention for the Protection of Individuals with Communications Decency Act, 386 , 720 , 730 regard to the Automatic Processing of Personal Communications Surveillance, 7 – 43 , 102 , 296 , 372 , Data (Council of Europe), 647 , 654 382 , 496 , 537 , 603 , 727 , 737 , 742 Cook, Timothy, 241 Communism,
Recommended publications
  • Download Other
    ACLU AMERICAN CIVIL LIBERTIES UNION I November 19, 2014 Freedom of Information Operations Unit (SARO) Drug Enforcement. Administration Department of Justice 700 Army Navy Drive Arlington, VA 22202 Fax: (202) 307-7596 Record/Information Dissemination Section Federal Bureau oflnvestigation Department of.Tustice 170 Marcel Drive AMERICAN CIVIL LIBERTIES Winchester, VA 22602-4843 UNION FOUNDATION Fax: (540) 868-4995 NATIONAL OFFICE 125 BROAD STREET, 18TH FL NEW YORK, NY 10004-21,00 Office of General Cotmsel T/212_549_2500 WWW.ACLU.ORG United States Marshals Service Department of Justice Washington, D.C. 20530-1000 Fax: (202) 307-8544 FOINPA Mail Refenal Unit Department of Justice Room 115 LOC Building Washington, DC 20530-0001 Fax: (301) 341-0772 U.S. Immigration and Customs Enforcement Freedom ofinfonnation Act Office 500 12th Street., S.W., Stop 5009 Washington, D.C. 20536-5009 Fax: (202) 732-4265 Re: Freedom of Information Act Request I Cell Site Simulators Deployed on Aircraft 1 To Whom It May Concem: This letter is a request tmder the Freedom oflnfotmation Act by the American Civil Liberties Union ("ACLU"). This request seeks records regarding the acquisition, possession, and use of cell site simulators deployed on aircraft. Cell site simulators, also called IMSI catchers (in reference to the tmique identifier-or intemational mobile subscriber identity-of wireless devices), impersonate a wireless service provider's cell tower, prompting cell phones and other wireless devices to commtmicate with them. One model of this technology, which the U.S. Marshals Service and likely other agencies deploy on aircraft, is sometimes called a "dirtbox" or "DRT box," after its manufacturer Digital Receiver Technology, Inc.
    [Show full text]
  • Rise of the IMSI Catcher
    Rise of the IMSI Catcher Lisa Parks In the wake of the Patriot Acts and the Snowden revelations, new details about surveillance technologies rarely seem surprising. Many have grown accustomed to Constitution-violating “sneak and peek” search warrant practices, biometric scanning, and sensors that make anything and everything monitor-able, no matter how large or small. As billions of people around the world are becoming digitally connected, the Kool-Aid is beginning to wear off. Networked office workers are revolting against the constant scrutiny of their online activities. Internet users are upset that Twitter and Facebook are in cahoots with the National Security Agency (NSA). And GPS- equipped smartphones seem more and more like electronic ankle bracelets. The utopian allure of connectivity is cracking and totalitarian tendencies are alive and kicking, especially in the world’s democracies. Such conditions have kept surveillance scholars busy. Since 9/11, scholars have analyzed the monumental shifts in surveillance that have unfolded in the context of the War on Terror.1 They have demonstrated that digital networks and social media have become havens for state and corporate monitoring of citizens’ expressions and transactions.2 They have explored how techniques of racial profiling, biometrics, and physical searching continue to disenfranchise people who are already vulnerable or immersed in struggles for social equality and justice, including the poor, people of color, and refugees.3 And they have charted the labyrinthine expansion of closed- circuit and airport security systems and the complex dynamics of their use.4 Despite the plethora of vital topics that have been tackled, surveillance Media Fields Journal no.
    [Show full text]
  • Cellphone Surveillance Gear Floods U.S.Pdf
    2/9/2017 Cellphone Surveillance Gear Floods U.S. Cities ­ CityLab From The Atlantic Cellphone Spy Tools Have Flooded Local Police Departments Major cities throughout the U.S. have spent millions on mobile surveillance tools—but there are still few rules about what happens to the information they capture. GEORGE JOSEPH | @georgejoseph94 | Feb 8, 2017 | 100 Comments A protester uses her phone during a night of demonstrations over the police shooting of Keith Scott in Charlotte, North Carolina. (Mike Blake/Reuters) Love CityLab? Make sure you're signed up for our free e-mail newsletter. Email Sign up A little after midnight on November 28, 2014, hundreds of Black Lives Matter protesters filled the streets of downtown Chicago. The demonstration was one of many that erupted in cities nationwide soon after a Missouri grand jury failed to indict a Ferguson, Missouri, police officer for the shooting death of Michael Brown that August. As the protesters marched, a police vehicle crept behind them. The black SUV emblazoned with “City of Chicago Emergency Management” appeared to have two 360-degree cameras sprouting from its roof and a command center in the back. Whenever the vehicle drove by, protesters reported that their phones stopped working. A week later, audio of a police radio dispatch from the protest was released online. In the recording, an officer alerts a department intelligence analyst about of one of the protest organizers. “One of the girls here… she's been on http://www.citylab.com/crime/2017/02/cellphone­spy­tools­have­flooded­local­police­departments/512543/?ncid=newsltushpmgnews 1/12 2/9/2017 Cellphone Surveillance Gear Floods U.S.
    [Show full text]
  • The Fourth Amendment in the Digital Age NACDL Symposium
    The Fourth Amendment in the Digital Age NACDL Symposium Andrew Guthrie Ferguson Professor of Law UDC David A. Clarke School of Law REPORTER 0110 0100 0011 1001 1010 1100 1000 0111 Supported by a grant from the Foundation for Criminal Justice. 0011 Copyright © 2016 National Association of Criminal Defense Lawyers This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. To view a copy of this license, visit 0101 http://creativecommons.org/licenses/by-nc-nd/4.0/. It may be reproduced, provided that no charge is imposed, and the National Association of Criminal Defense Lawyers is acknowledged 1001 as the original publisher and the copyright holder. For any other form of reproduction, please contact NACDL for permission. Cover Images: 0000 © VoodooDot | shutterstock — surveillance © Alex Stokes | Dollarphotoclub — hand 1110 0110 1011 0010 For more information contact: NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS 0001 1660 L Street NW, 12th Floor Washington, DC 20036 Phone: 202-872-8600 1100 www .nacdl .org 1101 This publication is available online at www.nacdl.org/FourthAmendmentInTheDigitalAge 0110 0100 0011 1001 1010 The Fourth Amendment in the Digital Age NACDL Symposium 1100 1000 0111 E.G. “Gerry” Morris Gerald B. Lefcourt President, NACDL President, FCJ Austin, TX New York, NY 0011 0101 1001 Theodore Simon Immediate Past-President, NACDL Philadelphia, PA 0000 Norman L. Reimer Executive Director, NACDL 1110 Washington, DC Kyle O’Dowd 0110 Associate Executive Director for Policy, NACDL Washington, DC 1011 Jumana Musa Sr. Privacy and National 0010 Security Counsel, NACDL Washington, DC 0001 Andrew Guthrie Ferguson Professor of Law UDC David A.
    [Show full text]
  • Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment Jonathan Bard Boston College Law School, [email protected]
    Boston College Law Review Volume 57 | Issue 2 Article 8 3-31-2016 Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment Jonathan Bard Boston College Law School, [email protected] Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Communications Law Commons, Criminal Law Commons, Criminal Procedure Commons, Fourth Amendment Commons, and the Law Enforcement and Corrections Commons Recommended Citation Jonathan Bard, Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment, 57 B.C.L. Rev. 731 (2016), http://lawdigitalcommons.bc.edu/bclr/vol57/iss2/8 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. UNPACKING THE DIRTBOX: CONFRONTING CELL PHONE LOCATION TRACKING WITH THE FOURTH AMENDMENT Abstract: Surveillance technology has raced ahead of the Fourth Amendment, forcing courts to confront high-tech intrusions with rusty jurisprudence. The Dirtbox, an airborne cell-site simulator, allows the government to sweep entire cities and intercept individuals’ cell phone location information without rely- ing on cooperative intermediaries. This Note argues that the government’s use of the Dirtbox and other cell-site simulators amounts to a Fourth Amendment search because it may pinpoint individuals within a constitutionally protected space. Although the Department of Justice issued policy guidelines requiring its agents to obtain a search warrant before using this device, this narrow and unenforceable protocol fails to adequately regulate the rising use of cell phone tracking devices.
    [Show full text]
  • Active Cell Site Simulators and the Fourth Amendment Aimee Thomson*
    Cellular Dragnet: Active Cell Site Simulators and the Fourth Amendment Aimee Thomson* This Paper examines government use of active cell site simulators (ACSSs) and concludes that ACSS operations constitute a Fourth Amendment search. An ACSS known colloquially as a stingray, triggerfish, or dirtbox mimics a cell phone tower, forcing nearby cell phones to register with the device and divulge identifying and location information. Law enforcement officials regularly use ACSSs to identify and locate individuals, often with extreme precision, while sweeping up the identifying and location information of hundreds or thousands of third parties in the process. Despite the pervasive use of ACSSs at federal, state, and local levels, law enforcement duplicity concerning ACSS operations has prevented courts from closely examining their constitutionality. ACSS operations constitute a Fourth Amendment search under both the trespass paradigm and the privacy paradigm. Within the former, an ACSS emits radio signals that trespass on . Under the Jones reinvigoration of the trespass paradigm cell phones for the purpose of obtaining information, constituting a Fourth Amendment trespass. Radio signals also trespass under common law property and tort regimes, and the Paper proposes a new rule, consistent with existing trespass jurisprudence, to target only those radio signals that intentionally and without consent cause an active physical change in the cell phone. Within the latter, ACSS operations constitute a Fourth Amendment search because they that society can and should recognize as reasonable, particularly if Fourth Amendment jurisprudence continues to eliminate secrecy as a proxy for privacy. Until courts decisively recognize warrantless ACSS operations as illegal, however, advocates and litigants can implement several interim remedial measures.
    [Show full text]
  • The Fourth Amendment in the Digital Age NACDL Symposium
    The Fourth Amendment in the Digital Age NACDL Symposium Andrew Guthrie Ferguson Professor of Law UDC David A. Clarke School of Law REPORTER 0110 0100 0011 1001 1010 1100 1000 0111 Supported by a grant from the Foundation for Criminal Justice. 0011 Copyright © 2016 National Association of Criminal Defense Lawyers This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. To view a copy of this license, visit 0101 http://creativecommons.org/licenses/by-nc-nd/4.0/. It may be reproduced, provided that no charge is imposed, and the National Association of Criminal Defense Lawyers is acknowledged 1001 as the original publisher and the copyright holder. For any other form of reproduction, please contact NACDL for permission. Cover Images: 0000 © VoodooDot | shutterstock — surveillance © Alex Stokes | Dollarphotoclub — hand 1110 0110 1011 0010 For more information contact: NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS 0001 1660 L Street NW, 12th Floor Washington, DC 20036 Phone: 202-872-8600 1100 www .nacdl .org 1101 This publication is available online at www.nacdl.org/FourthAmendmentInTheDigitalAge 0110 0100 0011 1001 1010 The Fourth Amendment in the Digital Age NACDL Symposium 1100 1000 0111 E.G. “Gerry” Morris Gerald B. Lefcourt President, NACDL President, FCJ Austin, TX New York, NY 0011 0101 1001 Theodore Simon Immediate Past-President, NACDL Philadelphia, PA 0000 Norman L. Reimer Executive Director, NACDL 1110 Washington, DC Kyle O’Dowd 0110 Associate Executive Director for Policy, NACDL Washington, DC 1011 Jumana Musa Sr. Privacy and National 0010 Security Counsel, NACDL Washington, DC 0001 Andrew Guthrie Ferguson Professor of Law UDC David A.
    [Show full text]
  • Department of Justice: National Security Division FOIA Request Log
    Department of Justice: National Security Division FOIA request log, June 2013 - July 2015 Brought to you by AltGov2 www.altgov2.org/FOIALand NSD FOIA LOG From 06/17/2013 to 07/22/2015 Consul- Date Initially Date Request # Last Name First Name Subject of Request tation Date of Request Rec'd by NSD Completed Disposition Reason(s) 2009-161 Grafeld Margaret Daniel Pearl N 6/10/2009 12/23/2013 6 Schechter Ronald A any and all records relating to or N 5/6/2014 reflecting the U S Government's decisions or actions regarding the transfer, release, repatriation, or 2012-019 9/30/2011 10/13/2011 prosecution (by either military commissions or in a United States District Court) of Fayiz Al Kandari and/or of Fawzi Al Odah Schechter Ronald A any and all records reflecting the U S N Government's communications relating to, and decisions concerning the preferral 2012-024 and/or referral of, criminal charges by the 9/30/2011 10/13/2011 Office of Military Commissions against Fayiz Mohammed Ahmed Al Kandari Kraemer Alexander seeks records that will illuminate if and N how agencies responsible for implementing FISA/FAA authorities are interpreting these invasive anti terrorist 2012-056 surveillance powers; how the FISA/FAA 10/10/2011 11/17/2011 spying powers is being used; and if safeguards are in place to prevent abuse of Americans' rights (see FOIA request- 5 & 6, 1-13) Bogardus Kevin Request for any and all records N concerning audits of firms and individuals under the Foreign Agents Registration 2012-082 1/5/2012 1/6/2012 Act since fiscal year 2001 to
    [Show full text]
  • Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies
    Before the Federal Communications Commission Washington, DC 20554 In the Matter of Baltimore City Police Department Baltimore, Maryland Complaint for Relief Against Unauthorized Radio Operation and Willful Interference with Cellular Communications Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies Memorandum in Support of Complaint for Relief Against Unauthorized Radio Operation and Willful Interference with Cellular Communications and Petition for an Enforcement Advisory on Use of Cell Site Simulators by State and Local Government Agencies (Complaint and Petition Submitted August 16, 2016) Submitted by American Civil Liberties Union American Civil Liberties Union of Northern California New York Civil Liberties Union American Civil Liberties Union of Maryland Electronic Frontier Foundation Nathan Freed Wessler American Civil Liberties Union Foundation 125 Broad St., 18th Fl. New York, NY 10004 (212) 549-2500 September 1, 2016 [email protected] Additional Signatories Listed Below Table of Contents Summary ......................................................................................................................................... 1 Interest of Parties ............................................................................................................................ 3 Argument ........................................................................................................................................ 4 I. The Issues Identified in the Complaint and Petition
    [Show full text]
  • IMSI Catchers and Mobile Security Advisor: Professor Nadia Heninger
    By Joseph Ooi IMSI Catchers and Mobile Security Advisor: Professor Nadia Heninger EAS 499 Senior Capstone Thesis School of Engineering and Applied Science University of Pennsylvania April 29, 2015 TABLE OF CONTENTS 1 INTRODUCTION ............................................................................ 2 2 CELL PHONE PROTOCOLS ........................................................ 3 2.1 CELLULAR NETWORKS .......................................................................................................................................... 3 2.2 1G (ANALOG) ..................................................................................................................................................... 3 2.3 2G (DIGITAL) ...................................................................................................................................................... 3 2.4 GSM PROTOCOL ................................................................................................................................................ 4 2.5 2.5G (GPRS) AND 2.75G (EDGE)........................................................................................................................ 8 2.6 3G (UMTS AND CDMA2000) ............................................................................................................................. 8 2.7 4G (WIMAX AND LTE) ....................................................................................................................................... 9 3 IMSI CATCHERS .........................................................................
    [Show full text]