SlideShare a Scribd company logo
1 of 43
Surveillance Technology and
How Police Are Using It
Blake Feldman
Fall Public Defender Conference
October 27, 2016
2
Historical Insight
“ . . . [U]nder ordinary and normal circumstances wire-tapping
by government agents should not be carried on for the
excellent reason that it is almost bound to lead to abuse of
civil rights.”
 President Franklin D. Roosevelt (1940)
“Drug arrests are disproportionately black because of police
department surveillance patterns. [S]tudies prove that our
drug enforcement efforts result in black city-dwellers being
disproportionately arrested for activity both races engage in,
simply because they are more easily subject to surveillance.”
 Judge Robert L. Carter (2000)
3
Surveillance has been used by governments throughout
history to suppress free speech and intimidate the
leaders of political movements.
Civil Rights Leaders:
 The Nation’s Betty Medsger
reported that under J. Edgar
Hoover, who led the FBI for 48
years, “directives . . . required
FBI field offices to watch
African-Americans wherever
they went—in churches, in
classrooms, on college
campuses, in bars, in
restaurants, in bookstores, in
their places of employment, in
stores, in any social setting, in
their neighborhoods and even
at the front doors of their
homes.”
Black Lives Matter:
 NYPD systemically surveilling
Muslims since 9/11
 Chicago PD systemically
surveilling meetings post-
Ferguson.
 Sophisticated aerial
surveillance of Baltimore
protests.
4
5
Surveillance Technology
An Overview
 Common Types of Surveillance Technology
 What the technology does
 Why the ACLU is concerned
6
Automatic License Plate Readers
 Function(s): ALPRs
(fixed or mobile) take
photographs of license
plates, digitize them, and
enable the captured data
to be searched, stored or
processed in real time or
historically.
7
Automatic License Plate Readers
 Issue(s):
 Retention: The data collected by them, which should in
the absence of a warrant be processed and deleted in
matter of days, is often kept for months or even years. This
allows the government to track where people travel in their
cars.
 Privatization: Private companies providing ALPRs to
localities free of charge in return for access to the data
they collect, which they then monetize.
 Unknown: Due to a lack of data, it is hard to ascertain if
ALPRs are being deployed discriminatorily.
8
Closed-Circuit Television Cameras
 Function(s): CCTV cameras
are video cameras that
transmit their signal to a
limited number of external
monitors or computers. They
are frequently used by the
police to monitor public
spaces remotely. CCTV is
also widely used by private
entities for security and
monitoring purposes.
9
Closed-Circuit Television Cameras
 Issue(s):
 CCTV allows police to monitor public activities virtually
24/7 without a real justification or public benefit.
 The cameras are over-deployed in areas that are deemed
by police to be “high crime,” which often really means
communities of color.
 A growing area of concern is with police departments
seeking to voluntarily gain remote access to private CCTV
systems.
 We are also increasingly concerned about the placement
of cameras directly outside of private homes.
10
Biometric Surveillance Technology
 Function(s): These
technologies allow a person
to be identified using a
physical trait (e.g.,
fingerprints, DNA, facial
features, voice, iris, gait).
11
Biometric Surveillance Technology
 Issue(s):
 This is no longer limited to fingerprints and DNA, which
could only be obtained voluntarily or following an arrest.
 It completely undermines the ability of person to travel in
public or gather with friends anonymously.
 These systems are imperfect, which can produce a lot of
false-positives that result in innocent people unjustifiably
drawing the attention of law enforcement.
 Due to technological limitations and biased engineering
practices, these false-positives are far more likely to occur
with non-whites than with whites.
12
Gunshot detection and location
hardware and services
 Technology Name(s):
ShotSpotter
 Function(s): Gunshot
detectors, like
ShotSpotter, are
essentially
microphones that are
designed to detect the sound of a gunshot. By placing
them throughout an area, the microphones are able to
triangulate a gunshot and provide police with a limited
geographic location from which a gunshot emanated.
13
Gunshot detection and location
hardware and services
 Issue(s): If these secretly
operated microphones can
be remotely activated and
used to listen in on the
communities in which they
are placed, they can
represent another form of
general, mass surveillance.
Only with strict limitations and auditing can we be sure this
technology is not abused, and such oversight commonly does
not exist.
14
X-ray Vans
 Technology Name(s):
Z Backscatter Vans
 Function(s): The
technology, much like the
now retired backscatter
machines used by TSA at
airport security checkpoints,
uses x-ray radiation to do
what no human eye can do,
like see through clothing and
car exteriors.
15
X-ray Vans
 Issue(s): We don't know exactly how government
purchasers of these vans are using them, but if they are in
fact being used on public streets in non-emergencies and
without a warrant, that would be a major violation of the
Constitution (not to mention a possible threat to public health).
Unless they have probable cause to search a specific vehicle,
government agencies should not be roaming U.S. streets
conducting backscatter X-ray scans of vehicles and their
occupants (much less pedestrians, cyclists, etc.) without their
knowledge or consent.
16
Surveillance Enabled Lightbulbs
 Function(s): While posing
as energy efficient
upgrades to existing
incandescent lightbulbs,
LED surveillance lightbulbs
actually conceal tiny
cameras and microphones
that can stealthy monitor
their surroundings and
transmit their feeds back to
a central monitoring station
or computer.
17
Surveillance Enabled Lightbulbs
 Issue(s):
 LED surveillance lightbulbs, if installed on municipal
streetlamps, would throw a net of almost unprecedented
scope over entire communities or cities.
 What is particularly troubling with surveillance bulbs is the
stealthy way in which they are being marketed and pitched
to the press; to wit, as an energy efficient light bulb with
built-in monitoring technology.
 What the product really appears to be is a mass
surveillance device being disguised as an LED light bulb.
18
Hacking Software and Hardware
 Function(s): This technology allows law enforcement to
access a person’s personal computing equipment
(including desktops, laptops, cell phones, tablets, etc.) or
password-protected websites or accounts (such as cloud
storage or a social media account), either in person or
remotely, without the permission of either the account-
holder or the operator of the service.
19
Hacking Software and Hardware
 Issue(s):
 When a government hacks into a private computer or
account, is does so with the specific intent of surveilling
the private contents of that computer or account without
the person’s permission or knowledge.
 Hacking tools depend on vulnerabilities that can be
targeted by criminals as well as law enforcement. A
government that invests in hacking tools has a perverse
incentive to avoid shoring up the infrastructure the public
depends on, weakening its role as a promoter of the public
good.
20
Social Media Monitoring Software (SMMS)
 Technology Name(s):
 Digital Stakeout
 XI Social Discovery
 Geofeedia
 Dataminr
 Dunami
 SocioSpyder
21
Social Media Monitoring Software (SMMS)
 Function(s):
 covertly monitor, collect, and analyze individual’s social media
data from platforms like Twitter, Facebook, and Instagram.
 perform highly sophisticated fishing expeditions across the
internet by using complex algorithms to analyze/organize data.
 geographically track people as they communicate.
 chart people’s relationships, networks, and associations.
 monitor protests, identify the leaders of political and social
movements, and measure a person’s influence.
 It is also promoted as a predictor of future events, including
threat assessment, and as an instrument for manipulating public
opinion.
22
Social Media Monitoring Software (SMMS)
 Issue(s):
 SMMS improperly blankets a whole range of innocent
people without any evidence of wrongdoing.
 SMMS has the potential to chill free speech.
 The imprecise and privacy-violating manner in which it
sweeps in the postings of scores of innocent people, and
the degree to which it is over-focused on persons of color,
has earned it the description of a “21st century stop and
frisk.”
 SMMS has been used extensively and aggressively
against Black Lives Matter leaders and protestors.
23
Surveillance has been used by governments throughout
history to suppress free speech and intimidate the
leaders of political movements.
Civil Rights Leaders:
 The FBI and NSA
routinely spied on civil
rights leaders, including
Martin Luther King Jr.
and Cesar Chavez. The
FBI used information
from secret surveillance
of civil rights leaders to
discredit and intimidate
them.
Black Lives Matter:
 Fresno, CA police have for
years systematically
monitored social media
activity related to the BLM
movement.
 An investigator at the Oregon
DOJ racially profiled Twitter
users using the hashtag
#BlackLivesMatter.
 A cybersecurity firm with ties
to law enforcement monitored
prominent BLM leaders and
labeled them “threat actors.”
24
Through-the-wall Sensors/Radar
 Function(s): This technology uses radar or similar
technology to peer through to walls of a building.
 Currently the technology is precise enough to ascertain
how many people are in a particular room within a dwelling
unit.
 Over time, the clarity of the image produced by wall-
penetrating technologies may become precise enough to
determine the identities of a building’s occupants.
25
Through-the-wall Sensors/Radar
 Issue(s):
 While this technology may have beneficial uses, such as
allowing a SWAT team to learn the number of occupants in
a home, and whether or not they are armed, prior to a raid,
any such use is only appropriate pursuant to a warrant.
 Because this technology can be used stealthy, as it
advances, it may increasingly (and improperly) be used as
a way to look into private dwellings without court oversight.
26
Body-worn Cameras
 Function(s): BWCs are intended to capture police
interactions with the public from an angle approximating
a police officer’s point of view. .
 Issue(s): While wearable cameras have the potential to
provide greater police transparency and accountability,
they can also present a significant threat to privacy.
 With the wrong policies in place, body cameras can be
turned from a transparency and accountability tool into a
police propaganda and mass surveillance tool.
27
Predictive Policing Software
 Function(s):
 Predictive policing software uses mathematical and
analytical techniques to attempt to predict future criminal
activity (a sci-fi version of its use is the basis for the film
“Minority Report”).
 Predictive policing software is claimed to be helpful in
predicting crimes, predicting offenders, predicting
perpetrators’ identities, and predicting victims of crime.
28
Predictive Policing Software
 Issue(s):
 Inputting historically biased data into a computer and then
crunching it through an algorithm will merely produce
biased results that instruct the police to continue to over-
police poor communities and communities of color.
 This highly untested technology raises numerous
additional questions, including how accurate the
algorithms are in extracting information from data.
 These tools are often proprietary, with algorithms, data
inputs, and source code shielded from review or oversight.
29
30
Stingrays
The Most Common Surveillance Tool the
Government Won’t Tell You About
 What are they?
 Why the ACLU is concerned?
 Who has them?
 A Guide For Criminal Defense Attorneys
31
Stingrays
 Other Name(s): Cell-site simulators; International
mobile subscriber identity (IMSI) catchers.
 Function(s): It mimics a cell
phone communications tower,
causing your cell phone to
communicate with it. This
communications link gives the
Stingray the ability to track your
location and intercept data from
your phone, including voice
and typed communications.
32
Stingrays
 Issue(s):
 When it grabs information off a targeted phone, it also
sweeps in information about 100s or 1,000s of additional
non-targeted phones.
 The technology is often used without a warrant, or
pursuant to a warrant issued by a judge who has been
misled about what technology is being used or what its
capabilities and limitations are.
 It is very difficult to detect when it is being used and to
ensure that it is not being deployed in a discriminatory
manner.
33
LAYOUT 2
34
Stingrays
A guide for public defenders
 What kind of court authorization, if any, does the
government currently obtain to use the device?
 What guidance have courts offered on Stingrays?
 How can you determine whether a Stingray was used in
your case?
 What are the best arguments for suppression?
35
Court authorization for IMSI catchers
 What kind of court authorization, if any, does the
government currently obtain to use the device?
 No court authorization (e.g., Milwaukee, Tucson,
Sacramento, etc.)
 Pen Register/Trap and Trace order?
 Necessary or “best practice”? Seeking ESN/MIN or location?
 Hybrid Order?
 Combining Pen/Trap Statute w/ Stored Communications Act?
 Warrant?
36
Guidance from courts on IMSI catchers
 In re Application for an Order Authorizing Installation and
Use of a Pen Register and Trap and Trace Device, 890
F. Supp. 2d 747 (S.D. Tex. 2012)
37
How to determine if IMSI catcher was used
in your case
 Terminology
 Digital analyzer, cell site simulator, cell site emulator, cell
site monitor, triggerfish, kingfish, amberjack, hailstorm,
WITT
 Mobile tracking device, pen register, confidential source
 If gov’t obtained an order for a wiretap or carrier call
records, how did the gov’t first find out your client’s cell
phone number?
 If cryptic reference to “confidential source of information,”
pursue issue of IMSI catcher in discovery
38
How to determine if IMSI catcher was used
in your case
 If at any point in the investigation, the gov’t was able to ID
the location of your client, considering pursuing IMSI in
discovery, even if gov’t provides alternative explanation.
Email from an FBI Special Agent
in U.S. v. Rigmaiden
39
Arguments for suppression when IMSI
catcher was used
 IMSI catchers trigger Fourth Amendment scrutiny
 Use in connection with a residence. See Kyllo (2001);
Compare Knotts (1983) with Karo (1984).
 Distinguish from In re Application for Historical Cell Site Data,
724 F.3d 600 (5th
Cir. 2013) (holding that a warrant is not
required for historical CSLI)
• (1) Not using a 3rd
party, (2) literally forced, rather than
“voluntary”; (3) reasonable expectation of privacy in
home; (4) property rationale arguments (e.g., device
used while in curtilage; electronic signal penetrating
walls of residence)
40
Arguments for suppression when IMSI
catcher was used
 IMSI catchers trigger Fourth Amendment scrutiny
 Use in public.
 Seizure: IMSI essentially “captures” your client’s phone,
“forces” it to disconnect form the carrier’s base station, and
“forces” it to register with the IMSI catcher.
 Search: While the DOJ has made clear that capabilities of
collecting private communications, it is unclear what state
and local LEAs are collecting. It’s essential to obtain
discovery concerning the type of data collected.
 Search: If an IMSI catcher was used to monitor your client’s
location for a prolonged period of time, it may constitute a
search.
41
Arguments for suppression when IMSI
catcher was used
 IMSI catchers engage in the electronic equivalent of a
“general search,” in violation of Fourth Amendment.
 Statutory orders don’t suffice to authorize IMSI catcher
use.
 Even if a warrant was secured, the warrant is invalid
because it either misled the judge or because the judge,
if adequately informed of IMSI catcher capabilities,
issued a facially invalid warrant.
42
For more information, contact:
Blake Feldman: bfeldman@aclu-ms.org
or read more on our website at:
www.aclu.org/issues/privacy-
technology
www.aclu-ms.org

More Related Content

What's hot

Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensicssdavis532
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks PresentationEmily Blegvad
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftSteph Cliche
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 

What's hot (20)

Drone forensics
Drone forensics Drone forensics
Drone forensics
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 
Cctv ip surveillance system
Cctv ip surveillance systemCctv ip surveillance system
Cctv ip surveillance system
 
Catching IMSI Catchers
Catching IMSI CatchersCatching IMSI Catchers
Catching IMSI Catchers
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 

Viewers also liked

Tarea 3 jazmin davila desarrollo turistico
Tarea 3 jazmin davila  desarrollo turisticoTarea 3 jazmin davila  desarrollo turistico
Tarea 3 jazmin davila desarrollo turisticoJazmin Davila
 
La velocidad en el futbol
La velocidad en el futbolLa velocidad en el futbol
La velocidad en el futboljimmy pozo
 
Plantable coffee cup
Plantable coffee cupPlantable coffee cup
Plantable coffee cupsumika613
 
Diapositivas de informatica 1 2-3
Diapositivas de informatica 1 2-3Diapositivas de informatica 1 2-3
Diapositivas de informatica 1 2-3danielahernandez03
 
CURRICULUM VITAE Fien INGLES update
CURRICULUM VITAE Fien INGLES updateCURRICULUM VITAE Fien INGLES update
CURRICULUM VITAE Fien INGLES updateFien Desmet
 
Textual analysis
Textual analysis Textual analysis
Textual analysis JackMcGee1
 
Actividad 5 investigación documental sobre la legislación informática
Actividad  5 investigación documental sobre la legislación informáticaActividad  5 investigación documental sobre la legislación informática
Actividad 5 investigación documental sobre la legislación informáticaElisa Torres Esparza
 
Línea de tiempo tecnología e informática
Línea de tiempo tecnología e informáticaLínea de tiempo tecnología e informática
Línea de tiempo tecnología e informáticaAlonsochivatau
 

Viewers also liked (11)

CareerLeaderReport
CareerLeaderReportCareerLeaderReport
CareerLeaderReport
 
Tarea 3 jazmin davila desarrollo turistico
Tarea 3 jazmin davila  desarrollo turisticoTarea 3 jazmin davila  desarrollo turistico
Tarea 3 jazmin davila desarrollo turistico
 
La velocidad en el futbol
La velocidad en el futbolLa velocidad en el futbol
La velocidad en el futbol
 
Plantable coffee cup
Plantable coffee cupPlantable coffee cup
Plantable coffee cup
 
Diapositivas de informatica 1 2-3
Diapositivas de informatica 1 2-3Diapositivas de informatica 1 2-3
Diapositivas de informatica 1 2-3
 
Portfolio of Chameleon
Portfolio of ChameleonPortfolio of Chameleon
Portfolio of Chameleon
 
CURRICULUM VITAE Fien INGLES update
CURRICULUM VITAE Fien INGLES updateCURRICULUM VITAE Fien INGLES update
CURRICULUM VITAE Fien INGLES update
 
Textual analysis
Textual analysis Textual analysis
Textual analysis
 
Actividad 5 investigación documental sobre la legislación informática
Actividad  5 investigación documental sobre la legislación informáticaActividad  5 investigación documental sobre la legislación informática
Actividad 5 investigación documental sobre la legislación informática
 
Línea de tiempo tecnología e informática
Línea de tiempo tecnología e informáticaLínea de tiempo tecnología e informática
Línea de tiempo tecnología e informática
 
La resta ppt
La resta pptLa resta ppt
La resta ppt
 

Similar to Surveillance Tech Used by Police

Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weaponFernando Alcoforado
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Speck&Tech
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 

Similar to Surveillance Tech Used by Police (20)

Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
Sc po some-05
Sc po some-05Sc po some-05
Sc po some-05
 
Surveillance
SurveillanceSurveillance
Surveillance
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Surveillance Tech Used by Police

  • 1. Surveillance Technology and How Police Are Using It Blake Feldman Fall Public Defender Conference October 27, 2016
  • 2. 2 Historical Insight “ . . . [U]nder ordinary and normal circumstances wire-tapping by government agents should not be carried on for the excellent reason that it is almost bound to lead to abuse of civil rights.”  President Franklin D. Roosevelt (1940) “Drug arrests are disproportionately black because of police department surveillance patterns. [S]tudies prove that our drug enforcement efforts result in black city-dwellers being disproportionately arrested for activity both races engage in, simply because they are more easily subject to surveillance.”  Judge Robert L. Carter (2000)
  • 3. 3 Surveillance has been used by governments throughout history to suppress free speech and intimidate the leaders of political movements. Civil Rights Leaders:  The Nation’s Betty Medsger reported that under J. Edgar Hoover, who led the FBI for 48 years, “directives . . . required FBI field offices to watch African-Americans wherever they went—in churches, in classrooms, on college campuses, in bars, in restaurants, in bookstores, in their places of employment, in stores, in any social setting, in their neighborhoods and even at the front doors of their homes.” Black Lives Matter:  NYPD systemically surveilling Muslims since 9/11  Chicago PD systemically surveilling meetings post- Ferguson.  Sophisticated aerial surveillance of Baltimore protests.
  • 4. 4
  • 5. 5 Surveillance Technology An Overview  Common Types of Surveillance Technology  What the technology does  Why the ACLU is concerned
  • 6. 6 Automatic License Plate Readers  Function(s): ALPRs (fixed or mobile) take photographs of license plates, digitize them, and enable the captured data to be searched, stored or processed in real time or historically.
  • 7. 7 Automatic License Plate Readers  Issue(s):  Retention: The data collected by them, which should in the absence of a warrant be processed and deleted in matter of days, is often kept for months or even years. This allows the government to track where people travel in their cars.  Privatization: Private companies providing ALPRs to localities free of charge in return for access to the data they collect, which they then monetize.  Unknown: Due to a lack of data, it is hard to ascertain if ALPRs are being deployed discriminatorily.
  • 8. 8 Closed-Circuit Television Cameras  Function(s): CCTV cameras are video cameras that transmit their signal to a limited number of external monitors or computers. They are frequently used by the police to monitor public spaces remotely. CCTV is also widely used by private entities for security and monitoring purposes.
  • 9. 9 Closed-Circuit Television Cameras  Issue(s):  CCTV allows police to monitor public activities virtually 24/7 without a real justification or public benefit.  The cameras are over-deployed in areas that are deemed by police to be “high crime,” which often really means communities of color.  A growing area of concern is with police departments seeking to voluntarily gain remote access to private CCTV systems.  We are also increasingly concerned about the placement of cameras directly outside of private homes.
  • 10. 10 Biometric Surveillance Technology  Function(s): These technologies allow a person to be identified using a physical trait (e.g., fingerprints, DNA, facial features, voice, iris, gait).
  • 11. 11 Biometric Surveillance Technology  Issue(s):  This is no longer limited to fingerprints and DNA, which could only be obtained voluntarily or following an arrest.  It completely undermines the ability of person to travel in public or gather with friends anonymously.  These systems are imperfect, which can produce a lot of false-positives that result in innocent people unjustifiably drawing the attention of law enforcement.  Due to technological limitations and biased engineering practices, these false-positives are far more likely to occur with non-whites than with whites.
  • 12. 12 Gunshot detection and location hardware and services  Technology Name(s): ShotSpotter  Function(s): Gunshot detectors, like ShotSpotter, are essentially microphones that are designed to detect the sound of a gunshot. By placing them throughout an area, the microphones are able to triangulate a gunshot and provide police with a limited geographic location from which a gunshot emanated.
  • 13. 13 Gunshot detection and location hardware and services  Issue(s): If these secretly operated microphones can be remotely activated and used to listen in on the communities in which they are placed, they can represent another form of general, mass surveillance. Only with strict limitations and auditing can we be sure this technology is not abused, and such oversight commonly does not exist.
  • 14. 14 X-ray Vans  Technology Name(s): Z Backscatter Vans  Function(s): The technology, much like the now retired backscatter machines used by TSA at airport security checkpoints, uses x-ray radiation to do what no human eye can do, like see through clothing and car exteriors.
  • 15. 15 X-ray Vans  Issue(s): We don't know exactly how government purchasers of these vans are using them, but if they are in fact being used on public streets in non-emergencies and without a warrant, that would be a major violation of the Constitution (not to mention a possible threat to public health). Unless they have probable cause to search a specific vehicle, government agencies should not be roaming U.S. streets conducting backscatter X-ray scans of vehicles and their occupants (much less pedestrians, cyclists, etc.) without their knowledge or consent.
  • 16. 16 Surveillance Enabled Lightbulbs  Function(s): While posing as energy efficient upgrades to existing incandescent lightbulbs, LED surveillance lightbulbs actually conceal tiny cameras and microphones that can stealthy monitor their surroundings and transmit their feeds back to a central monitoring station or computer.
  • 17. 17 Surveillance Enabled Lightbulbs  Issue(s):  LED surveillance lightbulbs, if installed on municipal streetlamps, would throw a net of almost unprecedented scope over entire communities or cities.  What is particularly troubling with surveillance bulbs is the stealthy way in which they are being marketed and pitched to the press; to wit, as an energy efficient light bulb with built-in monitoring technology.  What the product really appears to be is a mass surveillance device being disguised as an LED light bulb.
  • 18. 18 Hacking Software and Hardware  Function(s): This technology allows law enforcement to access a person’s personal computing equipment (including desktops, laptops, cell phones, tablets, etc.) or password-protected websites or accounts (such as cloud storage or a social media account), either in person or remotely, without the permission of either the account- holder or the operator of the service.
  • 19. 19 Hacking Software and Hardware  Issue(s):  When a government hacks into a private computer or account, is does so with the specific intent of surveilling the private contents of that computer or account without the person’s permission or knowledge.  Hacking tools depend on vulnerabilities that can be targeted by criminals as well as law enforcement. A government that invests in hacking tools has a perverse incentive to avoid shoring up the infrastructure the public depends on, weakening its role as a promoter of the public good.
  • 20. 20 Social Media Monitoring Software (SMMS)  Technology Name(s):  Digital Stakeout  XI Social Discovery  Geofeedia  Dataminr  Dunami  SocioSpyder
  • 21. 21 Social Media Monitoring Software (SMMS)  Function(s):  covertly monitor, collect, and analyze individual’s social media data from platforms like Twitter, Facebook, and Instagram.  perform highly sophisticated fishing expeditions across the internet by using complex algorithms to analyze/organize data.  geographically track people as they communicate.  chart people’s relationships, networks, and associations.  monitor protests, identify the leaders of political and social movements, and measure a person’s influence.  It is also promoted as a predictor of future events, including threat assessment, and as an instrument for manipulating public opinion.
  • 22. 22 Social Media Monitoring Software (SMMS)  Issue(s):  SMMS improperly blankets a whole range of innocent people without any evidence of wrongdoing.  SMMS has the potential to chill free speech.  The imprecise and privacy-violating manner in which it sweeps in the postings of scores of innocent people, and the degree to which it is over-focused on persons of color, has earned it the description of a “21st century stop and frisk.”  SMMS has been used extensively and aggressively against Black Lives Matter leaders and protestors.
  • 23. 23 Surveillance has been used by governments throughout history to suppress free speech and intimidate the leaders of political movements. Civil Rights Leaders:  The FBI and NSA routinely spied on civil rights leaders, including Martin Luther King Jr. and Cesar Chavez. The FBI used information from secret surveillance of civil rights leaders to discredit and intimidate them. Black Lives Matter:  Fresno, CA police have for years systematically monitored social media activity related to the BLM movement.  An investigator at the Oregon DOJ racially profiled Twitter users using the hashtag #BlackLivesMatter.  A cybersecurity firm with ties to law enforcement monitored prominent BLM leaders and labeled them “threat actors.”
  • 24. 24 Through-the-wall Sensors/Radar  Function(s): This technology uses radar or similar technology to peer through to walls of a building.  Currently the technology is precise enough to ascertain how many people are in a particular room within a dwelling unit.  Over time, the clarity of the image produced by wall- penetrating technologies may become precise enough to determine the identities of a building’s occupants.
  • 25. 25 Through-the-wall Sensors/Radar  Issue(s):  While this technology may have beneficial uses, such as allowing a SWAT team to learn the number of occupants in a home, and whether or not they are armed, prior to a raid, any such use is only appropriate pursuant to a warrant.  Because this technology can be used stealthy, as it advances, it may increasingly (and improperly) be used as a way to look into private dwellings without court oversight.
  • 26. 26 Body-worn Cameras  Function(s): BWCs are intended to capture police interactions with the public from an angle approximating a police officer’s point of view. .  Issue(s): While wearable cameras have the potential to provide greater police transparency and accountability, they can also present a significant threat to privacy.  With the wrong policies in place, body cameras can be turned from a transparency and accountability tool into a police propaganda and mass surveillance tool.
  • 27. 27 Predictive Policing Software  Function(s):  Predictive policing software uses mathematical and analytical techniques to attempt to predict future criminal activity (a sci-fi version of its use is the basis for the film “Minority Report”).  Predictive policing software is claimed to be helpful in predicting crimes, predicting offenders, predicting perpetrators’ identities, and predicting victims of crime.
  • 28. 28 Predictive Policing Software  Issue(s):  Inputting historically biased data into a computer and then crunching it through an algorithm will merely produce biased results that instruct the police to continue to over- police poor communities and communities of color.  This highly untested technology raises numerous additional questions, including how accurate the algorithms are in extracting information from data.  These tools are often proprietary, with algorithms, data inputs, and source code shielded from review or oversight.
  • 29. 29
  • 30. 30 Stingrays The Most Common Surveillance Tool the Government Won’t Tell You About  What are they?  Why the ACLU is concerned?  Who has them?  A Guide For Criminal Defense Attorneys
  • 31. 31 Stingrays  Other Name(s): Cell-site simulators; International mobile subscriber identity (IMSI) catchers.  Function(s): It mimics a cell phone communications tower, causing your cell phone to communicate with it. This communications link gives the Stingray the ability to track your location and intercept data from your phone, including voice and typed communications.
  • 32. 32 Stingrays  Issue(s):  When it grabs information off a targeted phone, it also sweeps in information about 100s or 1,000s of additional non-targeted phones.  The technology is often used without a warrant, or pursuant to a warrant issued by a judge who has been misled about what technology is being used or what its capabilities and limitations are.  It is very difficult to detect when it is being used and to ensure that it is not being deployed in a discriminatory manner.
  • 34. 34 Stingrays A guide for public defenders  What kind of court authorization, if any, does the government currently obtain to use the device?  What guidance have courts offered on Stingrays?  How can you determine whether a Stingray was used in your case?  What are the best arguments for suppression?
  • 35. 35 Court authorization for IMSI catchers  What kind of court authorization, if any, does the government currently obtain to use the device?  No court authorization (e.g., Milwaukee, Tucson, Sacramento, etc.)  Pen Register/Trap and Trace order?  Necessary or “best practice”? Seeking ESN/MIN or location?  Hybrid Order?  Combining Pen/Trap Statute w/ Stored Communications Act?  Warrant?
  • 36. 36 Guidance from courts on IMSI catchers  In re Application for an Order Authorizing Installation and Use of a Pen Register and Trap and Trace Device, 890 F. Supp. 2d 747 (S.D. Tex. 2012)
  • 37. 37 How to determine if IMSI catcher was used in your case  Terminology  Digital analyzer, cell site simulator, cell site emulator, cell site monitor, triggerfish, kingfish, amberjack, hailstorm, WITT  Mobile tracking device, pen register, confidential source  If gov’t obtained an order for a wiretap or carrier call records, how did the gov’t first find out your client’s cell phone number?  If cryptic reference to “confidential source of information,” pursue issue of IMSI catcher in discovery
  • 38. 38 How to determine if IMSI catcher was used in your case  If at any point in the investigation, the gov’t was able to ID the location of your client, considering pursuing IMSI in discovery, even if gov’t provides alternative explanation. Email from an FBI Special Agent in U.S. v. Rigmaiden
  • 39. 39 Arguments for suppression when IMSI catcher was used  IMSI catchers trigger Fourth Amendment scrutiny  Use in connection with a residence. See Kyllo (2001); Compare Knotts (1983) with Karo (1984).  Distinguish from In re Application for Historical Cell Site Data, 724 F.3d 600 (5th Cir. 2013) (holding that a warrant is not required for historical CSLI) • (1) Not using a 3rd party, (2) literally forced, rather than “voluntary”; (3) reasonable expectation of privacy in home; (4) property rationale arguments (e.g., device used while in curtilage; electronic signal penetrating walls of residence)
  • 40. 40 Arguments for suppression when IMSI catcher was used  IMSI catchers trigger Fourth Amendment scrutiny  Use in public.  Seizure: IMSI essentially “captures” your client’s phone, “forces” it to disconnect form the carrier’s base station, and “forces” it to register with the IMSI catcher.  Search: While the DOJ has made clear that capabilities of collecting private communications, it is unclear what state and local LEAs are collecting. It’s essential to obtain discovery concerning the type of data collected.  Search: If an IMSI catcher was used to monitor your client’s location for a prolonged period of time, it may constitute a search.
  • 41. 41 Arguments for suppression when IMSI catcher was used  IMSI catchers engage in the electronic equivalent of a “general search,” in violation of Fourth Amendment.  Statutory orders don’t suffice to authorize IMSI catcher use.  Even if a warrant was secured, the warrant is invalid because it either misled the judge or because the judge, if adequately informed of IMSI catcher capabilities, issued a facially invalid warrant.
  • 42. 42 For more information, contact: Blake Feldman: bfeldman@aclu-ms.org or read more on our website at: www.aclu.org/issues/privacy- technology

Editor's Notes

  1. Franklin D. Roosevelt, Confidential Memorandum for the Attorney General of May 21, 1940 (as reproduced in United States v. White, 401 U.S. 745, 766 (1971) (Douglas, J., dissenting)). Robert L. Carter, Discrimination in the New York Criminal Justice System, 3 N.Y. City L. Rev. 267 (2000) (Judge Robert L. Carter (1) argued part of Brown v. Board of Education, (2) later succeeded Thurgood Marshall as General Counsel of the NAACP, and (3) was appointed to the U.S. District Court for the Southern District of New York by Richard Nixon).
  2. Note that this is not historical data. This is real time. This also isn’t through a third party. Thus, the 5th Circuit (3-1) decision in 2013 regarding historical Cell Site Data is not on point. In that decision, the Court held that no warrant is required for historical CSLI.
  3. Step 3: How to Close Your Presentation Give them my contact, the URL for more info, & Tell your audience how to access your PowerPoint presentation.