Tag Archives: Fourth Amendment

Just Who Is ICE Targeting? Journalist Claims His Arrest Retaliation for Critical Reporting

At the time of his arrest while covering a protest, “I was doing my work and nothing more, like any other journalist does,” says Manuel Duran.

By Andrea Germanos, staff writer for Common Dreams. Published 7-9-2018

Manual Duran, seen on the left, is arrested by police on April 3, 2018. (Photo: screengrab/YouTube)

Amid new revelations showing that Trump’s Immigration and Customs Enforcement (ICE) appears to be increasing its indiscriminate arrests of undocumented immigrants—not prioritizing those with serious criminal records—one journalist in custody and facing possible deportation says in a new interview that he believes his arrest was absolutely the result of his reporting critical of the Memphis Police Department and Department of Homeland Security.

At the time of his arrest in April, “I was doing my work and nothing more, like any other journalist does,” 42-year-old Manuel Duran told The Daily Beast in Spanish. He said he believes he was apprehended “without a doubt” as a result of his reporting. Continue reading

Share

Cops Are Now Using Dead People’s Fingers to Unlock iPhones

By The Anti-Media. Published 3-27-2018

Screenshot: YouTube

According to Forbes, which spoke with sources close to local and federal investigations, it’s becoming standard operating procedure for cops to use dead people’s fingerprints to unlock their Apple iPhones.

FBI forensic specialist Bob Moledor detailed for Forbes the first known instance of law enforcement making such an attempt, during an investigation into the motives of an attacker killed by Ohio police back in 2016. Continue reading

Share

Uproar After Congress Sneaks Attack on Digital Privacy Rights Into Omnibus Spending Bill

Attaching it to massive spending deal, lawmakers rush through controversial bill that allows law enforcement to hand over personal data without a warrant

By Jessica Corbett, staff writer for CommonDreams. Published 3-22-2018

Critics of the CLOUD Act ” are rightfully pointing out that it jettisons current human rights protections in favor of vague standards that could gut individual rights.” (Photo: Electoric Frontier Foundation)

Buried in the 2,232-page omnibus spending bill that the U.S. House passed Thursday is a piece of legislation that digital privacy advocates warn “expands American and foreign law enforcement’s ability to target and access people’s data across international borders.”

The Clarifying Lawful Overseas Use of Data or CLOUD Act (S. 2383 and H.R. 4943) would add an official provision for U.S. law enforcement to access “the contents of a wire or electronic communication and any record or other information” for people all across the globe, regardless of where they live and what that nation’s privacy laws dictate. It would also create a “backdoor” into Americans’ data, enabling the U.S. government to bypass its citizens’ Fourth Amendment rights to access and even use their data. Continue reading

Share

‘Insidious’ and ‘Dangerous’: Digital Privacy Groups Issue Urgent Warning Over CLOUD Act

Critics say the bill, which could be pushed through Congress this week, would enable U.S. authorities to skirt Fourth Amendment rights to collect Americans’ data and use it against them

By Jessica Corbett, staff writer for CommonDreams. Published 3-19-2018

Critics warns that proposed federal legislation “would let police access our data without having to comply with the Fourth Amendment.” (Photo: Fight for the Future/Twitter)

Civil libertarians and digital rights advocates are alarmed about an “insidious” and “dangerous” piece of federal legislation that the ACLU warns “threatens activists abroad, individuals here in the U.S., and would empower Attorney General Sessions in new disturbing ways.”

The Clarifying Lawful Overseas Use of Data or CLOUD Act (S. 2383 and H.R. 4943), as David Ruiz at Electronic Frontier Foundation (EFF) explains, would establish a “new backdoor for cross-border data [that] mirrors another backdoor under Section 702 of the FISA Amendments Act, an invasive NSA surveillance authority for foreign intelligence gathering” recently reauthorized by Congress. Continue reading

Share

Geek Squad’s Relationship with FBI Is Cozier Than We Thought

 

By Aaron Mackey. Published 3-5-2018 by Electronic Freedom Foundation

After the prosecution of a California doctor revealed the FBI’s ties to a Best Buy Geek Squad computer repair facility in Kentucky, new documents released to EFF show that the relationship goes back years. The records also confirm that the FBI has paid Geek Squad employees as informants.

EFF filed a Freedom of Information Act (FOIA) lawsuit last year to learn more about how the FBI uses Geek Squad employees to flag illegal material when people pay Best Buy to repair their computers. The relationship potentially circumvents computer owners’ Fourth Amendment rights. Continue reading

Share

Senate Votes to Give Trump Vast Domestic Spying Powers “No President Should Have”

“Instead of instituting much needed reforms, lawmakers voted to give the Trump administration broad powers to spy on Americans and foreigners at home and abroad without a warrant.”

By Jon Queally, staff writer for CommonDreams. Published 1-18-2018

Photo: YouTube

Defenders of civil liberties and privacy advocates expressed their discontent on Thursday after the U.S. Senate passed a bill that reauthorizes and expands the ability of the goverment to spy on the digital communications without a warrant.

With a final vote of 65-34 vote in favor, the passage of the FISA Amendments Reauthorization Act of 2017—now headed to President Donald Trump’s desk for a signature—will extend for six years a provision known as Section 702 of the Foreign Intelligence Surveillance Act (FISA) which allows for call the “unconstitutional spying” on emails, text messages, and other digital communications of both Americans and foreign nationals without a warrant. Continue reading

Share

The StingRay Spy Device Is Exactly Why the 4th Amendment Was Written

At least 68 agencies in 23 different states own StingRays.

By Olivia Donaldson

Photo: The Desk

Imagine you are in the middle of your typical day-to-day activities. Maybe you are driving, spending time with family, or working. If you are like most people, your phone is at your side on a daily basis. Little do you know that, at any time, police and law enforcement could be looking at information stored on your phone. You haven’t done anything wrong. You haven’t been asked for permission. You aren’t suspected of any crime.

The StingRay

Police have the power to collect your location along with the numbers of your incoming and outgoing calls and intercept the content of call and text communication. They can do all of this without you ever knowing about it.

How? They use a shoebox-sized device called a StingRay. This device (also called an IMSI catcher) mimics cell phone towers, prompting all the phones in the area to connect to it even if the phones aren’t in use.

The police use StingRays to track down and implicate perpetrators of mainly domestic crimes. The devices can be mounted in vehicles, drones, helicopters, and airplanes, allowing police to gain highly specific information on the location of any particular phone, down to a particular apartment complex or hotel room.

Quietly, StingRay use is growing throughout local and federal law enforcement with little to no oversight. The ACLU has discovered that at least 68 agencies in 23 different states own StingRays, but says that this “dramatically underrepresents the actual use of StingRays by law enforcement agencies nationwide.”

The Violation

Information from potentially thousands of phones is being collected every time a StingRay is used. Signals are sent into the homes, bags, and pockets of innocent individuals. The Electronic Frontier Foundation likens this to the Pre-Revolutionary War practice of soldiers going door-to-door, searching without suspicion.

Richard Tynan, a technologist with Privacy International notes that, “there really isn’t any place for innocent people to hide from a device such as this.”

The Fourth Amendment of the Constitution states that, “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The StingRay clearly violates these standards. The drafters of the Constitution recognized that restricting the government from violating privacy is essential for a free society. That’s why the Fourth Amendment exists. The StingRay is creating a dangerous precedent that tells the government that it’s okay for them to violate our rights. Because of this, freedom is quietly slipping out the window.

Little Regulation

Law Enforcement is using StingRays without a warrant in most cases. For example, the San Bernardino Police Department used their StingRay 300 times without a warrant in a little over a year.

In 2010, the Tallahassee Police Department used a StingRay in a warrantless search to track down the suspect of a crime. A testimony from an unsealed hearing transcript talks about how police went about finding their target. The ACLU sums it up well:

“Police drove through the area using the vehicle-based device until they found the apartment complex in which the target phone was located, and then they walked around with the handheld device and stood ‘at every door and every window in that complex’ until they figured out which apartment the phone was located in. In other words, police were lurking outside people’s windows and sending powerful electronic signals into their private homes in order to collect information from within.”

A handful of states have passed laws requiring police and federal agents to get a warrant before using a StingRay. They must show probable cause for one of the thousands of phones that they are actually searching. This is far from enough.

Additionally, there are many concerns that agents are withholding information from federal judges to monitor subjects without approval – bypassing the probable cause standard laid out in the Constitution. They even go as far as to let criminals go to avoid disclosing information about these devices to the courts.

If the public doesn’t become aware of this issue, the police will continue to use StingRays to infringe on our rights in secret and with impunity.

Olivia Donaldson

Olivia Donaldson

Olivia Donaldson is a recent high school graduate that is currently opting out of college and participating in an entrepreneurial program called Praxis.

This article was originally published on FEE.org. Read the original article.

Editorial note: If you’d like to read about the current use of StingRays by the Trump administration, we ran an article on the subject back in May.

Share

Future of Free Speech at Risk as Supreme Court Hears Critical Digital Privacy Case

“No constitutional doctrine should presume that consumers assume the risk of warrantless government surveillance simply by using technologies that are increasingly integrated into modern life.”

By Julia Conley, staff writer for CommonDreams. Published 11-29-2017

In a Supreme Court case beginning Wednesday, the ACLU is arguing that Americans should not be expected to give up privacy rights every time they use a cell phone that pings phone towers nearby, as analog-era legal arguments would hold. (Photo: Mike Mozart/Flickr/cc)

The Supreme Court will hear the first arguments in a landmark case regarding digital privacy rights on Wednesday as civil liberties advocates, joined by tech companies and journalists, argue the court must acknowledge that privacy rights and free speech protections should align with the reality of 21st century technology.

The case, known as Carpenter vs. United States centers around Timothy Carpenter, who was convicted in 2011 of several robberies after the police, without a probable cause warrant, gathered data from his cell phone company. Months of records were turned over, showing that he had been near cell towers close to the sites of the robberies when they took place. Continue reading

Share

Trump Quietly Nominates Mass Surveillance Advocate To “Protect” Your Privacy Rights

By Carey Wedler. Published 9-1-2017 by The Anti-Media

 

Though outrage over mass surveillance swept the United States after Edward Snowden’s revelations in 2013, there is little discussion of these invasive practices just four years later

This apathy comes despite former President Barack Obama’s move to expand to information sharing between agencies just days before Trump took office and after the Trump administration signaled its desire to continue widespread surveillance.

Amid this lack of attention toward the NSA, the president recently nominated a staunch advocate of mass surveillance to chair one of the few barriers standing between intrusive government spying and the American people’s privacy. The Privacy and Civil Liberties Oversight Board (PCLOB) was created in 2004 at the recommendation of the 9/11 Commission and was intended “to help the executive branch balance national security priorities with individual rights,” the Intercept reported earlier this year. Continue reading

Share

Feds Drop Charges in Child Porn Case to Protect Secrets

By . Published 3-9-2017 by The Anti-Media

Official FBI flag. Photo: Public domain

Washington, D.C. — In a case that’s drawn criticism from multiple angles, last week federal prosecutors in Washington state dropped all charges against a man who allegedly downloaded child pornography from a website that was infiltrated, taken over, and allegedly even improved by the FBI.

The site, Playpen, operated on a platform designed to mask the real identities of its users, as Gizmodo explained Monday:

“The site in question operated on the Tor network, a system used to anonymize web activity. The network makes use of a special web browser that conceals people’s identities and location by routing their internet connections through a complex series of computers and encrypting data in the process.” Continue reading

Share