It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The Supreme Court ruled Wednesday that police cannot go snooping through people’s cell phones without a warrant, in a unanimous decision that amounts to a major statement in favor of privacy rights.
Police agencies had argued that searching through the data on cell phones was no different than asking someone to turn out his pockets, but the justices rejected that, saying a cell phone is more fundamental.
The ruling amounts to a 21st century update to legal understanding of privacy rights.
“The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought,” Chief Justice John G. Roberts Jr. wrote for the unanimous court.
“Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple— get a warrant.”
Justices even said police cannot check a cellphone’s call log, saying even those contain more information that just phone numbers, and so perusing them is a violation of privacy that can only be justified with a warrant.
The chief justice said cellphones are different not only because people can carry around so much more data — the equivalent of millions of pages of documents — that police would have access to, but that the data itself is qualitatively different than what someone might otherwise carry.
He said it could lay bare someone’s entire personal history, from their medical records to their “specific movements down to the minute.”
originally posted by: Xcathdra
“Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple— get a warrant.”
133."The illegal we do immediately. The unconstitutional takes a little longer." Henry Kissinger
The Legal Limit Report #4 (pg 9)
Other Lawless Acts:
1. Aided drug cartels instead of enforcing immigration laws as found by a federal judge. Border Patrol agents, multiple times, knowingly helped smuggle illegal immigrant children into the U.S.; “the DHS is encouraging parents to seriously jeopardize the safety of their children.”
2. Illegally sold thousands of guns to criminals, in the operation known as Fast and Furious, and then refused to comply with congressional subpoenas about the operation.
3. Dismissed charges filed by Bush Administration against New Black Panther Party members who were videotaped intimidating voters at a Philadelphia polling station during the 2008 election.
4. Argued for expansive federal powers in the Supreme Court, which has rejected the Administration’s arguments unanimously 9 times since January 2012.
5. Sued Louisiana to stop school vouchers and keep low income minorities trapped in failing schools.
6. Threatened to arrest military priests for practicing their faith during the partial government shutdown.
7. Muzzled the speech of military chaplains.
8. Sued fire departments saying their multiple choice, open book written employment tests were racially discriminatory..
9. Gave 23,994 tax refunds worth more than $46 million to aliens here illegally using the same address in Atlanta, GA.
Stingrays, also known as "cell site simulators" or "IMSI catchers," are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. When used to track a suspect's cell phone, they also gather information about the phones of countless bystanders who happen to be nearby.
(emphasis mine)
The map below tracks what we know, based on press reports and publicly available documents, about the use of stingray tracking devices by state and local police departments. Following the map is a list of the federal law enforcement agencies known to use the technology throughout the United States. But because many agencies continue to shroud their purchase and use of stingrays in secrecy, this map dramatically underrepresents the actual use of stingrays by law enforcement agencies nationwide.
As we suspected, local law enforcement officials are borrowing cell phone tracking devices known as “stingrays” from the U.S. Marshals Service—and police are deliberately concealing the use of stingrays in court documents submitted to judges in criminal investigations.
The ACLU of Florida released a set of internal police emails obtained today through a public records request with the subject line “Trap and Trace Confidentiality.” The documents confirm that local police, working on state court matters, hide behind the sham cloak of the U.S. Marshals’ office to keep the information about stingray use out of court files—and beyond even a court’s custody and reach.
The sergeant also wrote, “In the past, and at the request of the U.S. Marshalls [sic], the investigative means utilized to locate the suspect have not been revealed so that we may continue to utilize this technology without the knowledge of the criminal element. In reports or depositions we simply refer to the assistance as ‘received information from a confidential source regarding the location of the suspect.’ To date this has not been challenged…”
In a later email, a North Port PD official wrote, “We have implemented within our detective bureau to not use this investigative tool on our documents in the future.”
Concealing the use of stingrays deprives defendants of their right to challenge unconstitutional surveillance and keeps the public in the dark about invasive monitoring by local police.
Stingray, also known as an International Mobile Subscriber Identity, or IMSI, catcher, works like this. The cell network is designed around triangulation and whenever possible your phone is in constant contact with at least three towers. As you move, one tower “hands off” your signal to the next one in your line of motion. Stingray electronically inserts itself into this process as if it was a (fake; “spoofed”) cell tower itself to grab location data before passing your legitimate signal back to the real cell network. The handoffs in and out of Stingray are invisible to you. Stingrays also “inadvertently” scoop up the cell phone data of anyone within several kilometers of the designated target person. Though typically used to collect location metadata, Stingray can also capture conversations, texts and mobile web use if needed.
Stingray offers some unique advantages to a national security state: it bypasses the phone company entirely, which is handy if laws change and phone companies no longer must cooperate with the government, or simply if the cops don’t want the phone company or anyone else to know they’re snooping.
The device itself is made by the Harris Corporation. Harris makes electronics for commercial use and is a significant defense contractor. For Stingray, available only to law enforcement agencies, Harris requires a non-disclosure agreement that police departments around the country have been signing for years explicitly prohibiting them from telling anyone, including other government bodies, about their use of the equipment “without the prior written consent of Harris.”
....
A price list of Harris’ spying technology, along with limited technical details, was leaked online[link to info in source link above], but that’s about all we know.
Though the non-disclosure agreement includes an exception for “judicially mandated disclosures,” there are no mechanisms for judges even to learn that the equipment was used at all, thus cutting off any possibility they could know enough to demand disclosure. In at least one case in Florida, a police department revealed that it had decided not to seek a warrant to use the technology explicitly to avoid telling a judge about the equipment. It subsequently kept the information hidden from the defendant as well. The agreement with Harris goes further to require law enforcement to notify Harris any time journalists or anyone else files a public records request to obtain information about Stingray and also demands the police department assist Harris in deciding what information to release.
The ACLU, which earlier in 2014 filed a Florida state-level FOIA-type request with the Sarasota police department for information detailing its use of Stingray, had an appointment with the local cops to review documents. The local police agreed to the review. However, the June 2014 morning of the ACLU’s appointment, U.S. Marshals arrived ahead of them and physically took possession of the files. The Marshals barred the Sarasota police from releasing them. The rationale used by the federal government was that having quickly deputized a Sarasota cop, all Sarasota records became federal property.
“This is consistent with what we’ve seen around the country with federal agencies trying to meddle with public requests for Stingray information,” an ACLU spokesperson said, noting that federal authorities have in other cases invoked the Homeland Security Act to prevent the release of such records. “The feds are working very hard to block any release of this information to the public.”
originally posted by: Kratos40
a reply to: CloudsTasteMetallic
This quote made me laugh:
"Stingray offers some unique advantages to a national security state". I think they meant "A Police security state". Isn't this the same company that makes those fast license readers mounted inside cop cars and can look up your information within seconds?
The days of having a burnt out rear light and getting pulled over for a warning are over. If you owe court fees or a ticket in some adjacent county, they will find you and haul you to jail.
....
But one company behind this Orwellian tracking system is determined to stay out of the news. How determined? Vigilant Solutions, founded in 2009, claims to have the nation’s largest repository of license-plate images with nearly 2 billion records stored in its National Vehicle Location Service (NVLS). Despite the enormous implications of the database for the public, any law enforcement agency that signs up for the service is sworn to a vow of silence by the company’s terms of service.
Vigilant is clear about the reason for the secrecy: it’s to prevent customers from “cooperating” with media and calling attention to its database.
The agreement law enforcement signs, which was uncovered by the Electronic Frontier Foundation, reads in part: You shall not create, publish, distribute, or permit any written, electronically transmitted or other form of publicity material that makes reference to LEARN or this Agreement without first submitting the material to LEARN-NVLS and receiving written consent from LEARN-NVLS. This prohibition is specifically intended to prohibit users from cooperating with any media outlet to bring attention to LEARN or LEARN-NVLS. Breach this provision may result in LEARN-NVLS immediately termination of this Agreement upon notice to you [sic].1 LEARN stands for Law Enforcement Archival and Reporting Network and is Vigilant’s online portal where license plate data and images are aggregated and analyzed for law enforcement to access.
The database would aggregate license plate data captured by readers owned by law enforcement agencies, border-crossing cameras and toll booths, as well as by commercial repo-men, who are one of the primary creators and users of license plate images. The latter use vehicles equipped with license plate recognition systems to trawl through streets and parking lots to grab images of plates and cars.