Court: If Violating Your Privacy Helps The Police, It's Not Violating Your Privacy
from the say-what-now? dept
In a horrifyingly bad ruling, the 6th Circuit appeals court has said that the owner of a prepaid phone has no 4th Amendment rights in protecting his location info from law enforcement. There have been a number of cases touching on this subject, with a few different rulings back and forth, including more than a few in the federal courts that argue tracking someone's location isn't a 4th Amendment violation. But, even if you grant that, this particular ruling is egregiously bad and poorly argued. The EFF highlights some of the more brain-numbing aspects of the ruling:In what can only be described as a results-oriented opinion, the court found Skinner had no reasonable expectation of privacy in the cell phone location data because "if a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal." Otherwise, "technology would help criminals but not the police." In other words, because cell phones can be used to commit crimes, there can't be any Fourth Amendment privacy rights in them. If this sounds like an over-simplistic description of the legal reasoning in an opinion we disagree with, the sad reality is that the court's conclusion really did boil down to this shallow understanding of the law.Yes, you read that right. Basically, if you've broken the law, according to the court, you have no 4th Amendment rights. And, then it goes further, by basically noting, because anyone might be a criminal, we might as well remove all of their 4th Amendment rights as well, because doing so might help the police. Of course, this goes against the very basis of the 4th Amendment.
The story involves police tracking a guy accused of being a drug runner, via the GPS in his pre-paid phone, without getting a warrant. The guy, Melvin Skinner, pointed out that this violated his 4th Amendment rights, but, as noted above, the court disagreed.
Julian Sanchez walks through the many ways the court got some rather basic things wrong in their ruling:
That's not all. The court seems equally confused about other cases, and both the EFF and Sanchez's link above details other mistakes concerning other case law. This isn't just a case of people having different interpretations. This seems like a clear case of a court not really bothering much with the details or the case law and just seeing one thing: this guy was a criminal and the GPS info was useful in finding him, therefore it must be okay. This is a very troubling precedent to have on the books no matter how you look at it.The court proceeds through a series of lazy and underdeveloped analogies:
Otherwise dogs could not be used to track a fugitive if the fugitive did not know that the dog hounds had his scent. A getaway car could not be identified and followed based on the license plate number if the driver reasonably thought he had gotten away unseen. The recent number of cell phone technology does not change this. If it did, then technology would help criminals but not the police. It follows that Skinner had no expectation of privacy in the context of this case, just as the driver of a getaway car has no expectation of privacy in the particular combination of colors of the car’s paint.
But it does not follow at all. “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection,” the Supreme Court explained in the seminal case of Katz v. United States, “But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Any member of the public can buy a dog and follow a scent. Any member of the public can view and copy down a license plate number. Any member of the public can view the external paint job of a car. But any member of the public cannot just track the GPS signal of a random cell phone—and if they could, most of us would be extremely wary about carrying cell phones. Unlike all these other examples, GPS tracking as employed here depends crucially on the ability of police to invoke state authority—a seemingly salient distinction the court fails to take any note of.
And it will impact many Americans. While the focus in the ruling is on the "but he's a criminal!!!!" aspect, it applies across the board to pre-paid mobile phone users (well, at least those covered by the 6th Circuit). And that's about a quarter of mobile phone subscriptions. As the EFF put it, in an effort to make sure criminals get no privacy location privacy rights, the court has killed such rights for everyone else as well -- which is exactly the opposite of how our system is supposed to work.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: criminal, drug dealing, gps, prepaid, privacy
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Logic Loop
That's right up there with the 'greater good' supersedes the 'rights of the few'. By that logic, because you are only one person, then the mass-rights of everybody can logically be used to suppress your rights.
Sadly, the truth of this is the 'greater good' excuse is already being employed to suppress your rights.
(For proof, see above article--just one of a large disturbing trend.)
[ link to this | view in chronology ]
Re: Logic Loop
ftfy
[ link to this | view in chronology ]
Appeal coming in 3 ... 2 ... 1 ...
Hopefully, this will be swiftly disposed of at that point.
[ link to this | view in chronology ]
Re: Appeal coming in 3 ... 2 ... 1 ...
[ link to this | view in chronology ]
Re: Re: Appeal coming in 3 ... 2 ... 1 ...
[ link to this | view in chronology ]
Re: Re: Appeal coming in 3 ... 2 ... 1 ...
> be put in front of the bar and disbarred as well.
You can't be disbarred for making a ruling that others disagree with.
The ruling sucked but it's not something that the bar can punish.
[ link to this | view in chronology ]
Re: Appeal coming in 3 ... 2 ... 1 ...
If you carry a mobile phone, you can be tracked and bugged at any time. Privacy? Get over it. If you do not like being tracked and bugged, then do not carry a mobile phone.
[ link to this | view in chronology ]
Re: Re: Appeal coming in 3 ... 2 ... 1 ...
> there is no circuit split and the supremes will not take the case.
A split is not required for the Court to grant cert. The Court has accepted many cases in the past without a circuit split.
[ link to this | view in chronology ]
Re: Re: Re: Appeal coming in 3 ... 2 ... 1 ...
[ link to this | view in chronology ]
Re: Re: Appeal coming in 3 ... 2 ... 1 ...
Because there was reversible error.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
next up
[ link to this | view in chronology ]
A Reasonable Expectation of Privacy
In my opinion, if I as a private citizen cannot "do something" to another citizen, then that citizen should expect "that something" to be reasonably private. As a private citizen, I cannot go to the cell phone company and get your location records. Therefore, I expect that such records are reasonably private, and should require a warrant.
If it were possible to extract this location information from the public airwaves as a private citizen, then I would agree that there is no reasonable expectation of privacy. For example, any transmission performed over an unencrypted wireless network such as wifi can be intercepted with tools commonly available to a private citizen. In fact, Google surreptitiously recorded and was subsequently fined for doing just that. But cell phone signals are encrypted so that they cannot be eavesdropped by third parties, with the intention of providing the caller with a reasonable expectation of privacy.
I also take exception to the statement from Judge Rogers, who said "The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools." It is disappointing to see a Judge rely on a straw man fallacy to justify his ruling; a reasonable person does not expect the tools in question to be untrackable, only that a warrant be issued if the tool cannot be reasonably tracked by private citizens.
Yes, the defendant was caught with a half-ton of illegal drugs, but I would be surprised if the police did not have enough probable cause to get a warrant for tracking. Had they done that, the defendant would be serving time right now instead of appealing his conviction based on a technicality.
[ link to this | view in chronology ]
Re: A Reasonable Expectation of Privacy
On top of that, they didn't have any idea who he was when they went looking for him. No real name to go on. So they couldn't get a warrant for him. The court hand-waves around that by suggesting that surely if they'd followed due process they would have found his identity and location eventually so what does it matter if they used a short-cut to get there. Which is obviously insane.
[ link to this | view in chronology ]
Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: A Reasonable Expectation of Privacy
Arguing that they needed further warrant to track the phone, implicitly because there's also a person at the end of that phone, is where this all falls apart.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: A Reasonable Expectation of Privacy
All search warrants are court orders, but not all court orders are search warrants.
Can you cite the page number of the judicial opinion that states it was specifically a search warrant for the cell phone information? Because Julian Sanchez explicitly states that it the court order given to the DEA was not a search warrant.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: A Reasonable Expectation of Privacy
All rectangles that have four equal sides are squares. They had to establish cause to get what they got. They didn't go further than what was ordered, good cause being shown - unless, which I've conceded already, the nature of the signal was such that they had to break a privacy barrier beyond what was authorized in order to ping and locate the phone. Others have suggested that is exactly the case. It doesn't make sense to me, but I'm open to learning more about it.
"Can you cite the page number of the judicial opinion that states it was specifically a search warrant for the cell phone information?" No, I also can't show you in todays newspaper that Abe Lincoln was our 16th president. I can show you photographic evidence that he killed vampires, though.
[ link to this | view in chronology ]
Re: Re: Re: A Reasonable Expectation of Privacy
Not according to the actual Constitution:
...no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Kinda hard to particularly describe someone you can't identify.
[ link to this | view in chronology ]
Re: Re: Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: Re: A Reasonable Expectation of Privacy
[ link to this | view in chronology ]
Re: Re: Re: Re: A Reasonable Expectation of Privacy
They didn't listen to the guy's private conversations. They traced the signal of the phone.
The only real issues remaining here are (1)whether the process used to track down the phone breaks a privacy barrier that the user had good reason to believe should be private
The man himself wasn't what was searched. The private conversations over that phone weren't tapped to find it. The court authorized them to get the GPS info on the phone, based on good cause, and they did. After they found the phone, for which due process took placen, then they had to take other steps to establish further cause to make further search and arrest.
[ link to this | view in chronology ]
GPS vs. cell phone signal?
The opinion states that there is no expectation of privacy from a signal emitted by a phone procured voluntary. However, a GPS signal is one way, from the satellite to the receiver. Cell phones do not emit GPS signals.
Cell phones do emit CDMA or GSM signals. However, both of these signals are encrypted.
So did law enforcement track him by triangulating his position based on what cell phone towers his phone pinged, or did they get the phone company to send a message to the drug runner's phone that told it to cough up its current GPS coordinates? I think it's an interesting question as to whether the phone emitted those signals only at the behest of the phone company.
[ link to this | view in chronology ]
Re: GPS vs. cell phone signal?
[ link to this | view in chronology ]
Re: GPS vs. cell phone signal?
Most modern phones don't run standalone GPS by default, mainly because it takes a ton of processing to do it (relative to the capabilities of a cheap prepaid phone), and it also drains the battery.
Most phones use AGPS, which is sending the raw GPS receiver output from the phone to a cell tower, or nearby server that has some compute power, then sends the coordinates back to the phone.
They may not have needed to ping the phone at all. If Bigfoot used his GPS, it most likely sent his GPS data directly to the cell carrier which calculated his location, and was logged.
[ link to this | view in chronology ]
Not Mike's fault
I can't say that Mike and others are being unfair, because the 6th badly confounds the issues in it's argument, but I believe the intended argument--if I can really pretend to pick it out of the fog--is actually solid. Point in interest:
"if a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal."
The reasoning here is cut far too short. If you read the rest of the ruling, what you realize is that PC was established and a court order given to release the device-specific information that allowed the police to track a publicly broadcast signal.
What the court's statement above means is that when police then tracked that publicly broadcast signal with no further order from the court does not represent a violation of the 4th Amendment because they took the right steps to get what they got and did not need to take further steps to use it.
It's basically the same reasoning as why it should be totally okay to use an open wifi hotspot. The signal is publicly available and broadcasting an open connection. Whether or not the user intends it to be broadcast does not come to bear on saying an outside user is breaking into their network. Albeit unwittingly, they made it public.
What was private was was obtained by due process, and police did not need further process to track a signal that was NOT private.
Again, the judge's wording is, I agree with Mike, horrific, but I don't think the actual argument is lost. It's not really saying that it's okay to xxx because he's a criminal. It's saying it--very specifically meaning tracking the signal--is okay because it's already being made public.
So, the analogies, try to express this too, the scent and the license plate representing what is already public, but no they don't overcome the lousy wording that does unfortunately connote a really bad view of due process.
[ link to this | view in chronology ]
Re: Not Mike's fault
[ link to this | view in chronology ]
Re: Not Mike's fault
Wrong. PC was not established. They skirted around establishing PC by getting a court order to go to the cell phone company instead of getting an actual warrant. And let's be clear, that's what's really being argued here. Not that the police have no recourse what-so-ever but that such a search would require a warrant, that's all.
Furthermore it's absolutely NOT a publicly broadcast signal. There is no public signal from the phone to track its location. They got a court order to actively ping the phone from the cell company so the phone would then reveal its location via a signal. It's not like an open wifi hotspot because there is no constant signal. It's not publicly available and it's not broadcasting an open connection. Even if it was Kyllo v US implies that that's not enough. Thermal signals coming from a house are 'broadcasting in the open' but they're still protected because there's a reasonable expectation that there's no one with thermal imaging outside your windows.
Also wrong on unwittingly making something public, as was the court. Katz v. United States: “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection, but what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” So what is covered by the 4th amendment, according to the precedent set in Katz by the supreme court, absolutely does turn on what the user intends to knowingly expose to the public.
[ link to this | view in chronology ]
Re: Re: Not Mike's fault
You're suggesting the court just up and gave them an order. They have to actually apply for that order and show cause why they should have it. In this case it would have meant a chain of probable cause sufficient to indicate that the phone itself(?of unknown ownership) was probably actively being used to commit a crime. That PC chain is actually clearly spelled out in the order above.
"Furthermore it's absolutely NOT a publicly broadcast signal." That is a really valid question that's not really well addressed by the order. The court asserts that it is public and broadcast. If that's wrong, then there's a huge hole.
"Also wrong on unwittingly making something public" Well no, that is decidedly situational. That's why the ruling in Katz says "may" rather than shall, which means your assertion that it "absolutely does turn on what the user intends to knowingly expose" is wrong. It possibly turns on it, but possibly not.
[ link to this | view in chronology ]
Re: Re: Re: Not Mike's fault
Court orders don't have the same burden of PC that warrants do. They're not the same thing and if they had enough for a warrant that's what they should have sought.
""Also wrong on unwittingly making something public" Well no, that is decidedly situational. That's why the ruling in Katz says "may" rather than shall, which means your assertion that it "absolutely does turn on what the user intends to knowingly expose" is wrong. It possibly turns on it, but possibly not."
First of all, that was not your original assertion at all, that 'it depends.' Second, what you're saying does contradict what I said at all.
[ link to this | view in chronology ]
Probably definitely mostly, nearly entirely and essentially dead wrong.
I did some more reading after the fact on this and learned of the other type of order where there is a significantly lower standard of proof.
Apparently this has been an ongoing issue with GPS tracking.
The lower standard does not require probable cause, but a lower standard that, yikes, is basically based on the relevance to the case. Sounds great if we're talking about home basic info on the device itself, not so great when we're talking about an encrypted GPS key (did some further reading on that, too) that serves as an intentionl privacy barrier.
I still think the order lays out a history that sounds like police would have had plenty to go on for probable cause to get an actual warrant in this case. BUT that's not good enough. They really needed to go and DO that.
I just can't see that giving over a private encryption key that let's people track a person shouldn't require probable cause AND the due process of showing that in getting a warrant.
Please pardon the thick-headed arrogance. No excuse there, really. Have a nice day.
[ link to this | view in chronology ]
Re: Probably definitely mostly, nearly entirely and essentially dead wrong.
[ link to this | view in chronology ]
Re: Not Mike's fault
First, a GPS signal is transmitted one-way only, from the satellite to the receiver. The phone does not give off a GPS signal. The phone company has to ping the phone and tell it to relay the GPS information back to the phone company; or the phone company has to triangulate the position using the towers that the phone is pinging itself.
Second, the GSM/CDMA cell phone signal being emitted by the phone is hardly a publicly broadcast signal akin to an "open wifi hotspot". Notice your careful use of the word "open" - by which you mean, not encrypted. GSM and CDMA transmissions are both encrypted.
Third, there are tools commonly available to the public that can be used for tracking scents and reading license plates. In contrast, there are no commonly available tools to the public that can be used for intercepting and decrypting GSM or CDMA signals.
[ link to this | view in chronology ]
Re: Re: Not Mike's fault
I just pointed out that if it is public like the court says it is, then there's a really sound argument here that the police followed the book--that completely aside from how badly they constructed it.
I would point out though that if police got the the court to authorize them to decrypt a wifi signal, then it's hard to argue that they didn't have authorization to follow up by decrypting the signal.
[ link to this | view in chronology ]
Re: Re: Re: Not Mike's fault
You also did assert the points I'm arguing against. Nowhere did you say "it's a question" - everything in your post explicitly states your belief that the signal is purely public and therefore does not deserve Fourth amendment protection. You even compared it to open wifi, and I explicitly argue against that comparison. My second point was that it's encrypted, unlike open wifi. My third point was that we generally do not have tools that can receive such signals, unlike open wifi (which can be easily eavesdropped using a modern laptop)
Finally, I would hope that the police need a search warrant to decrypt an encrypted wifi signal. The use of encryption shows a conscious effort by the owner of the signal to prevent the contents of said signal from being exposed. A court order should not be sufficient in such a case.
[ link to this | view in chronology ]
Re: Re: Re: Re: Not Mike's fault
As for whether it was a public signal or not, the reason I didn't say "It's a question," is because it wasn't a question. I assumed it was public because neither the article nor anyone else had raised the question.
It seems no one in the case did. If it was raised, then normally we'd see that decision laid out in the findings. If the prosecution argued that it was and no one in the case raised the question, then the court would be right to rule accordingly. That's what an adversarial system is. You have to argue your case for the court to rule on it.
When I said the argument seems really sound, and then restated what I thought that argument was, that's what I was doing. Restating, and agreeing with (incompetently stupid ambiguities notwithstanding) with what I had before me.
I've already conceded the point that it may not be a public signal. I don't know how many more ways to do this. I don't know enough to say one way or the other. It's a valid question, which bears considering. What the hell else do you want me to say? Some people say there's a woman to blame, but I know it could be my fault? That you should have been the guy's attorney? Yes, you would have heroically saved the drug dealer and all of our freedomses. I agree. I agree. I agree. You're the best. STFU.
As for warrant vs. order: A search warrant is a court order issued by a magistrate, judge, or Supreme Court officials to search a person or a location.
In this case they had an order from a magistrate to search for and get all of the information that they searched for and got from the phone provider. They used that to track the phone, for which PC was established as being used for a crime--that's what they had to do to get the order (read warrant).
They used the information intended to help them find the phone to...find the phone. When they got there, they didn't bust in with riot gear and say "Gimme the phone and show me your drugs!!!" They let the dogs do their thing, further PC was established, then they searched.
It's all restated there in the ruling (up there^^), but like I said before, it's not well extrapolated into the actual reasons for the decisions and where it does try to extrapolate it also seems to imply that it's safe to assume a guy is a criminal before searching. That's not really what was meant, and a careful read does show this, but it's still a bad thing. Other judges might look to this decision and rule with less scrutiny than they really ought to and make even worse rulings.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Not Mike's fault
You only "conceded" (i.e. changed your mind) that it may not be a public signal after someone said "it's not a public signal." To change your belief after the fact to "we have always been in agreement" is disingenuous at best, because we did not agree when you made your first post.
Besides that, you still haven't taken into consideration the argument regarding Kyllo and how private citizens do not typically have equipment that can access these signals. I can only interpret your lack of rebuttal on this subject as an affirmation that we still do not agree on this particular facet of the case.
I have also not seen any mention that they were able to track the suspect's phone without the cooperation of the network operator (particularly difficult given the encryption that cell phones use to communicate with the network). So you can't just say they used the phone company's info to then track the signal on their own as if it were a beacon.
Finally, I have not seen anyone claim that the DEA got a search warrant for the phone information. If that is true, I have no qualms about this at all. However, it appears that the "court order" that the DEA got was not a search warrant.
[ link to this | view in chronology ]
Re: Re: Not Mike's fault
[ link to this | view in chronology ]
Re: Not Mike's fault
If only the judge has said it that way instead of bringing in such insanity as asserting that it must be allowable because otherwise it only help criminals or it's just like physically watching the vehicle.
[ link to this | view in chronology ]
Re: Re: Not Mike's fault
For reference, please see Justice Scalia's opinion in Kyllo. Just because the thermal signal emanating from a house is publicly accessible doesn't mean that the use of thermal imaging tools is not a search under the Fourth amendment. The reason being that private citizens do not typically have thermal imaging equipment.
In the same vein, private citizens do not typically have equipment that can receive raw GSM/CDMA signals. Even if they did, private citizens do not have the commonly have the ability to spoof a signal to the cell phone that causes it to cough up its GPS coordinates; only the owner of the phone network has that power.
This also totally ignores the fact that GSM/CDMA signals are encrypted, and that decrypting them without a warrant violates at least one law.
[ link to this | view in chronology ]
Re: Re: Re: Not Mike's fault
In effect, a judge said the cops could yell out to that particular phone "where are you?" and listen to the phone's answer. That's a far cry from permission to do blanket eavesdropping.
[ link to this | view in chronology ]
Re: Re: Re: Re: Not Mike's fault
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Not Mike's fault
[ link to this | view in chronology ]
Re: Re: Re: Re: Not Mike's fault
Basically, if the information is relevant then it is released. This standard of proof probably should be used for basic information sharing, but not for breaching privacy barriers.
[ link to this | view in chronology ]
Re: Not Mike's fault
Well technically the car, truck or van that the drugs were in was the transport mechanism - not the phone. And as others have pointed out phone signals are not public like a license plate or the color of a car. This is a horrible ruling and it gives the police, at least in the 6th district, just that much more leeway in violating other civil rights.
[ link to this | view in chronology ]
This isn't a matter where law enforcement is listing in, reading or monitoring your actual phone calls or emails, they are simply following a signal that is given off by your cell phone, a type of GPS locator, as long as your cell phone is turned on.
I find it distasteful that some would find this unconstitutional, and the court was correct in ruling the way it did. If you don't want to be tracked by law enforcement, keep your cell phone turned off. If you're involved in illegal activities, then why are you using a trackable cell phone in the first place?
[ link to this | view in chronology ]
Re:
Sad
[ link to this | view in chronology ]
Re:
Let's get real here: You are a chicken livered little shit who is scared of his own damned shadow.
Terrorists have managed to kill on American soil a grand total of 5K people in 100 years.... that is less than 1/20th of the number killed by car accidents each year.
No, not a big danger and not something that we have to give up our rights about.
That law mandating those chips should be THROWN OUT. It's unconstitutional that they have a way to monitor everyone at all times without a warrant.
If they think that someone is a terrorist? Fine.... they can get a fucking warrant to monitor. If imminent danger to human life is an issue, they can even get a warrant after the fact in our legal system.
Just no reason for this bullcrap.
[ link to this | view in chronology ]
Re:
Also, the signal is not just being "given off" by your cell phone. Specifically, it requires tools that are not commonly available to the public in order to even receive the signals. And that ignores the fact that they're encrypted, which means you would need the assistance of the private business running the phone network in order to even understand what the signals are.
[ link to this | view in chronology ]
Re:
I find it distasteful that someone would use their ignorance of the situation as an instrument to label others who disagree with them on the ruling.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
I fail to see how that distinction is meaningful at all.
And again we see the argument that if you don't want to be spied upon, you must stop taking part in society.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Makes sense to me.
Someone tries to smuggle explosives in their underwear, so everyone must subject themselves to xray or pat-down search to check for explosives in their underwear.
Someone uses a cell phone to smuggle drugs, so everyone must allow their cell phone signals to be tracked.
[ link to this | view in chronology ]
That simply isn't true.
[ link to this | view in chronology ]
Re:
From where you're at.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[citation needed]
Actually it is true - for two reasons
1 Random cell phones do not emit GPS signals
2 Random cell phones do not emit GPS signals
Now I know that is only one reason - but it is such a good reason...
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
by way of explanation
Of the thirty judges on that court, twenty were appointed by Republicans, with most being appointed by Nixon and G.W. Bush. Only two of the thirty were appointed by President Obama.
The Sixth Circuit covers parts of Michigan, Ohio, Kentucky and Tennessee.
(note: this comment is offered for informational purposes only, and should not be construed as an expression of political opinion)
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Slippery Slope
In this example, the slippery slope in question is the idea that if the government has the power to screw us over then it will inevitably use it.
However, if the government doesn't have the power to overwhelm any particular individual, then they can't really do their job.
Also, the slippery slope goes two ways.
One perspective sees the progression moving further and further into oppression and tyranny, and the other slope falls into anarchy and chaos.
We Americans tend to distrust authority to an absurd level.
This is an example in my opinion. I see know particular problem with this ruling. After all, 4th amendment is NOT about Privacy. Privacy is not a constitutional right. Search and Seizure is a separate issue.
[ link to this | view in chronology ]
Re: Slippery Slope
Also you're using the same straw man as the judge. Absolutely no one is saying the police don't have the power to go to a cell phone company, ping the phone, and track the signal. What they're saying is they have to follow due process to exercise that power. What they're saying is that a court order shouldn't be enough on its own, they need a search warrant with its more stringent requirements.
You don't see a particular problem with this ruling because, as you've demonstrated in your post, you don't understand the arguments for or against it or what's really at stake. That's made amply clear by your implication it's about privacy when it's a 4th amendment case through and through.
[ link to this | view in chronology ]
Re: Slippery Slope
Perhaps you should look up the 2007 ruling from the Supreme Court, titled United States v. Ziegler. In it, the Court found that an employee has Fourth amendment privacy protections regarding the contents of his work computer (ultimately, the employer is able to waive those rights as the owner the hardware itself).
Even better: December 14, 2010, in United States v. Warshak, none other than the Sixth Circuit ruled that the government had violated Warshak's fourth amendment rights because he had a reasonable expectation of privacy in his emails, and that a warrant with probable cause is required to obtain those emails from the ISP.
Regardless of these precedents, I would also like to see your argument that finding and tracking someone via cell phone is not a search.
[ link to this | view in chronology ]
Re: Slippery Slope
I don't know about that. I distrust authority because authority has consistently demonstrated that it cannot be trusted. The absurdity is not my distrust, but that there is good reason for my distrust.
[ link to this | view in chronology ]
Re: Slippery Slope
[ link to this | view in chronology ]
Re: Slippery Slope
The current Constitutional slippery slope you are going down started in 2001 with the Patriot Act, the first law that effectively violated the Constitution with its very existence as law there are other absurds but the last one is NDAA.
This is an example in my opinion. I see know particular problem with this ruling. After all, 4th amendment is NOT about Privacy. Privacy is not a constitutional right. Search and Seizure is a separate issue.
It is, the Government shall not interfere in your private matters (ie: raid your house, track your location whatever the means used, wiretap you) without a warrant. Read the damn 4th Amendment, educate yourself.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Fixed that for you. Of course, the problem is that not everyone agrees on how much goverment is too much so I don't think there will be much real progress be done to address goverment overreach.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
srsly this guys name is "(A)" what meaning could that be besides the "modern" anarchist sign?
--monkyyy the (fellow?)anarchist
[ link to this | view in chronology ]
At this rate they may as well start manufacturing TVs without power buttons and telling us we've always been at war with Eastasia.
[ link to this | view in chronology ]
I've heard this before, and it never made sense. How is prohibiting the state from searching and seizing my person, home, papers, and effects without probable cause NOT a demand for them to respect my privacy?
[ link to this | view in chronology ]
Re:
I think there is a group of people who despise individual privacy, though, and are really hoping that they can talk us all out of it.
[ link to this | view in chronology ]
GPS devices only receive GPS signals to calculate position, they don't broadcast anything or require a connection with any kind of server, so how does this work?
[ link to this | view in chronology ]
Re:
This tracking could not have been achieved without the cooperation of the network operator.
[ link to this | view in chronology ]
Re: Re:
Certainly doesn't sound like something the phone would be doing during normal operation. It would have to be intentionally "pinged" to cause it to send it's location.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
No, they are not listening to your calls. No, they are not tracking you with a gps unit that they installed on your car. They are tracking you with a device that you willingly carry with you, and that could have very easily been disabled if you wanted. It's your choice.
The same results would have been obtained by having undercover police tracking the guy. It's not really that big of a deal. The level of PC required shouldn't be any higher.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
Likewise, private citizens do not typically have access to equipment that can receive and understand GSM and CDMA signals emitted from a cell phone.
Additionally, even though the signal is broadcast, it is encrypted. Do you have a reasonable expectation of privacy when using WPA2 to communicate wirelessly with your router?
Furthermore, the method in question did not involve the phone broadcasting its location on a regular basis. It involved the phone company instigating the drug courier's phone into revealing that information. The phone would not have revealed it without the phone company issuing the command to it.
It is also impossible for an undercover officer to track the guy, being that the DEA had no idea who he was or even where he was at all. The only information they had was the phone number.
Finally, do you think a private citizen can go up to the phone company and ask them for the location info of a random cell phone number? If the answer to that question is no, then why would you believe there is no reasonable expectation of privacy?
[ link to this | view in chronology ]
Re: Re:
Yet, if you walk past a drug sniffing dog at the airport, and he smells the kilo of coke you have in your bag, you can be arrested. Did the dog trigger the event?
"Additionally, even though the signal is broadcast, it is encrypted. Do you have a reasonable expectation of privacy when using WPA2 to communicate wirelessly with your router?"
Yes, but the presence of the signal (and any unencrypted parts broadcast) could be received outside the property and dealt with. As an example, you might be able to determine the presence of a given MAC address (laptop or phone, example). It's not clear that the unencrypted parts are really protected in any way.
Here's another example: Let's say that police park near a suspect's home, and set up a series of open wi-fi connections. As the guy drives by, his wi-fi enabled laptop or cell phone queries those open wi-fi sets. Now, did the police FORCE him to do anything?
"Finally, do you think a private citizen can go up to the phone company and ask them for the location info of a random cell phone number? If the answer to that question is no, then why would you believe there is no reasonable expectation of privacy?"
A private citizen does not have any reason to ask, no compelling reason to know. Police do have compelling reasons to know, and obtain information which is general in nature and does not specifically divulge any communications with any other parties. The only communication is with the cell phone company, saying "my phone is here".
If he didn't want to be tracked, he probably should have turned off the phone.
Put it another way: with some reasonable suspicions, the police could very likely get a warrant for all of the location information for however long back it was tracked, and could probably just as easily obtain a wiretap. Don't you think that the level of suspicions for a wiretap, which divulges personal communications, should be higher than just knowing what 3 or 4 square mile area a phone is located in?
[ link to this | view in chronology ]
Re: Re: Re:
Failed analogy. The dog hints on the evidence that there's coke on your bag. Then they proceed to check it. And they will not go into your bank account, cellphone data, private notebook or any other of privacy invasion. They also don't keep tracking you everywhere you are in the airport just because you might have drugs with you. Unless there's an investigation undergoing on you and they have warrants.
It has been like that for ages. But I'm sure you don't mind the Government following you and wiretapping your cellphone conversations since the signal is public anyway, right?
[ link to this | view in chronology ]
Re: Re: Re:
A private citizen has easy access to dogs. Dogs can be trained to smell drugs, pretty much anyone can do it. I don't see how this has any bearing on the Kyllo ruling.
It makes sense that there is no reasonable expectation of privacy in your scent. It's certainly not encrypted. And besides, airports are a terrible example because so many liberties are already curtailed there.
It's not clear that the unencrypted parts are really protected in any way.
I agree that the unencrypted parts are likely unprotected.
Here's another example: Let's say that police park near a suspect's home, and set up a series of open wi-fi connections. As the guy drives by, his wi-fi enabled laptop or cell phone queries those open wi-fi sets
You betray a misunderstanding of technology here. Laptops and cell phones do not "query" open wifi. A typical wifi chip in promiscuous mode (that's the technical term for "searching for an access point") does not transmit anything, it merely listens to the beacons being broadcast by access points. Only when it goes to establish a connection to the access point does the device begin to transmit.
A private citizen does not have any reason to ask, no compelling reason to know. Police do have compelling reasons to know, and obtain information which is general in nature and does not specifically divulge any communications with any other parties. The only communication is with the cell phone company, saying "my phone is here".
If he didn't want to be tracked, he probably should have turned off the phone. [...] Don't you think that the level of suspicions for a wiretap, which divulges personal communications, should be higher than just knowing what 3 or 4 square mile area a phone is located in?
Who are you to say that a private citizen does not have a compelling reason to ask or know? The fact is that you don't know. And herein lies my ultimate point; if a private citizen is not capable of getting access to this information, the police shouldn't have access without a warrant. Certainly I can ask the phone company for my billing information, or the billing information of my spouse (thus having access to the numbers called), but I find it hard to believe they would let me have access to location records of myself or my spouse.
And in fact, you once again betray your misunderstanding of this case. They weren't using cell phone tower pings to triangulate location (which, in my opinion, still constitutes a search under the Fourth amendment). The phone company told the phone to cough up its GPS coordinates, without any action on the part of Bigfoot. The phone then transmitted a message to the phone company, and the contents of this message - Bigfoot's GPS coordinates - were then divulged law enforcement without a search warrant. This was not merely a "3 or 4 square mile area", this was full GPS resolution down to meters.
If the police wanted to find him by using the location of his cell phone, they probably should have gotten a search warrant. Finding someone's personal location through the use of technology that requires the participation of a private entity should constitute a search just as invasive as monitoring the contents of their correspondence.
If you find that person through other means, by tracking them, it's no different than being within earshot and listening in, which also doesn't require a warrant. I am drawn once again back to Kyllo; in that case, the warrantless use of thermal imaging equipment was found unconstitutional. Wouldn't you consider the contents of your phone calls to require a higher standard than merely looking at your house with an infrared camera? And yet the use of thermal imaging equipment was found to be a search under the Fourth amendment.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re:
In other words, they specifically sent a request to the phone to cause it to transmit data it otherwise would not transmit.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
He transports his contraband within his cellphone?
That must be one hell of a cell phone.
[ link to this | view in chronology ]
Wireless Surveillance Act of 2012
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
the bill of rights should be looked at like campaign promises from current politics "oh hey, if u let us the founding fathers(bunch of rich white guys) start a new government we promise to not be evil like the king we literally fought a war to get away from a few years ago, while fixing all ur problems by spreading magic legal dust EVERYWHERE"
[ link to this | view in chronology ]
As this ruling implys, "law enforcement" means any employee of a policing agency who has a badge. A warrant implys the force of the government. Criminals with badges like Drew Peterson can mine or sell this data to private investigating services for profit. As long as they keep quiet about it there will be no political pressure to override this ruling through legislative action. This extra income could really help an officer if he has to pay child support.
[ link to this | view in chronology ]
Don't carry a phone
[ link to this | view in chronology ]
Re: Don't carry a phone
[ link to this | view in chronology ]
Land of the free eh? You just keep living in that delusional world of yours...
[ link to this | view in chronology ]
[ link to this | view in chronology ]
GPS Technology
Then the court throws this evidence out because they don't have the technology to validate certain types of information that can solve a case or prove that someone is lying.
But, on the other hand, our courts will go to the ends of the earth to bend THEIR laws to make an email, voice mail, text message, radar detector, dash cam etc. convict a citizen. They add their little side note that they have the technology to find you guilty based on the "tools" they have.
BUT God forbid you try and introduce any technology in your OWN case that could prove your innocence, or a cheating spouse, or even prove you don't owe a debt, the courts say "no way!"
Our entire Judicial System, 911 system, public safety system and other public entities are so far behind with technology that people get screwed in the courtroom every day.
It's frustrating to see how our Court System scrambles to try and stay in step with the lightning speed in which technology has evolved. Think about it from a legal standpoint. Since the Internet, cell phones and wireless technology of all kinds, the "lawmakers" are drowning in endless laws that need to be written into the books.
I doubt that lawmakers will even scratch the surface with regard to writing case law and/or rules that can keep up with the technology wave.
I'm sick and tired to watching people get screwed in life because a Judge won't let something into the courtroom yet, they will move mountains to use it against you.
[ link to this | view in chronology ]