.

xxx

Total Pageviews

Friday, September 13, 2019

PETITION: Ban Facial Recognition

 BAN FACIAL RECOGNITION 
Facial recognition technology is unreliable , biased and a threat to basic rights and safety. Fill out the Form below to tell your Congressional and local lawmakers to ban the government from using this dangerous technology.
 

PARTICIPATING ORGANIZATIONS
MEDIA JUSTICE
RESTORE THE FOURTH
DEFENDING RIGHTS AND DISSENT
COLOR OF CHANGE
DEMAND PROGRESS
FREE PRESS
Black Alliance for Just Immigration
MIJENTE
OPEN MEDIA
EPIC
X-Lab
Fight for the Future
Detroit Community Technology Project
Constitutional Alliance
RootsAction
Media Alliance
Oakland Privacy
Popular Resistance
18 Million Rising
CAIR
Presente
Daily Kos
Consumer Action
Muslim Justice League
American-Arab Anti-Discrimination Committee
Privacy Times
United We Dream
MoveOn
Greenpeace USA
Detroit Digital Justice Coalition
MPower Change
Secure Justice
National Lawyers Guild
Tor

Thursday, September 12, 2019

Facial Recognition Technology / Civil Rights and Liberties

“Facial Recognition Technology (Part 1): Its Impact on our Civil Rights and Liberties”
Date: Wednesday, May 22, 2019 - 10:00am
Location: 2154 Rayburn House Office Building, Washington, DC 20515



PURPOSE 


The hearing will examine the use of facial recognition technology by government and commercial entities and the need for oversight on how this technology is used on civilians.  Read More: Here 


Facial Recognition Technology (Part II): Ensuring Transparency in Government Use

Date: Tuesday, June 4, 2019 - 10:00am
Location: 2154 Rayburn House Office Building, Washington, DC 20515
PURPOSE

The hearing will examine the use of facial recognition technology by federal law enforcement entities and the need for oversight and regulation of how this technology is used on American citizens. Read more: Here






Wednesday, August 28, 2019

Cell-Site Simulators / IMSI Catchers

Cell-Site Simulators/IMSI Catchers

Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. 
Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.  Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies. Cell-site simulators can also log IMSI numbers (unique identifying numbers) of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications or even alter the content of communications.

How Cell-Site Simulators Work


Generally, there are two types of device used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers), and active devices (which we will call cell-site simulators.) Passive devices, as a rule, do not transmit any signals. They work by plucking cellular transmissions out of the air, the same way an FM radio works. They then decode (and sometimes decrypt) those signals to find the IMSI of the mobile device and track it.
Active cell-site simulators work very differently from their passive cousins. Cellular devices are designed to connect to the cell site nearby with the strongest signal. To exploit this, cell-site simulators broadcast signals that are either stronger than the legitimate cell sites around them, or are made to appear stronger. This causes devices within range to disconnect from their service providers’ legitimate cell sites and to instead establish a new connection with the cell-site simulator. Cell-site simulators also have passive capabilities, such as identifying legitimate cell sites and mapping out their coverage areas. For the purposes of this article we will primarily discuss active cell-site simulators.
It is difficult for most people to know whether or not their phone’s signals have been accessed by an active cell-site simulator, and it is impossible for anyone to know if their phone’s signals have been accessed by a passive IMSI catcher. Apps for identifying the use of cell-site simulators, such as SnoopSnitch, may not be verifiably accurate. Some more advanced tools have been built, which may be more accurate. For instance, security researchers at the University of Washington have designed a system to measure the use of cell-site simulators across Seattle. There are other researchers, including those at EFF, looking into this further.

What Kinds of Data Cell-Site Simulators Collect

Data collected by cell-site simulators can reveal intensely personal information about anyone who carries a phone, whether or not they have ever been suspected of a crime. 


Once your cellular device has connected to a cell-site simulator, the cell-site simulator can determine your location and read identifying data such as IMSI or ESN numbers directly from your mobile device. It can also intercept metadata (such as information about calls made and the amount of time on each call), the content of unencrypted phone calls and text messages and some types of data usage (such as websites visited).  Additionally, marketing materials produced by the manufacturers of cell-site simulators indicate that they can be configured to divert calls and text messages, edit messages, and even spoof the identity of a caller in text messages and calls.   

How Law Enforcement Uses Cell-Site Simulators

Police can use cell-site simulators to try to find a suspect when they already know their phone’s identifying information, or to scoop up data on anyone in a specific area. Some cell-site simulators are small enough to fit in a police cruiser, allowing law enforcement officers to drive to multiple locations, capturing from every mobile device in a given area—in some cases up to 10,000 phones at a time. These indiscriminate, dragnet searches include phones located in traditionally protected private spaces, such as homes and doctors’ offices.
Law enforcement officers have used information from cell-site simulators to investigate major and minor crimes and civil offenses. Baltimore Police, for example, have used their devices for a wide variety of purposes, ranging from tracking a kidnapper to trying to locate a man who took his wife’s phone during an argument (and later returned it to her). In one case, Annapolis Police used a cell-site simulator to investigate a robbery involving $56 worth of submarine sandwiches and chicken wings. In Detroit, U.S. Immigration and Customs Enforcement used a cell-site simulator to locate and arrest an undocumented immigrant. 
Police have even deployed cell-site simulators at protests. The Miami-Dade Police Department apparently first purchased a cell-site simulator in 2003 to surveil protestors at a Free Trade of the Americas Agreement conference
Cell-site simulators are used by the FBI, DEA, NSA, Secret Service, and ICE, as well as the U.S. Army, Navy, Marine Corps, and National Guard. U.S. Marshals and the FBI have attached cell-site simulators to airplanes to track suspects, gathering massive amounts of data about many innocent people in the process. The Texas Observer also uncovered airborne cell-site simulators in use by the Texas National Guard.
A recent Congressional Oversight Committee report called on Congress to pass laws requiring a warrant before using cell-site simulators. Some states, such as California, already require a warrant, except in emergency situations.

Who Sells Cell-site Simulators

Harris Corporation is the most prevalent company providing cell-site simulators to law enforcement. Their Stingray product has become the catchphrase for these devices, but they have subsequently introduced other models, such as Hailstorm, ArrowHeadAmberJack, and KingFish. Digital Receiver Technology, a division of Boeing, is also a common supplier of the technology, often referred to as “dirtboxes.” 
Other sellers of cell-site simulators include Atos, Rayzone, Martone Radio Technology, Septier Communication, PKI Electronic Intelligence, Datong (Seven Technologies Group), Ability Computers and Software Industries, Gamma Group, Rohde & Schwarz, Meganet Corporation. Manufacturers Septier and Gamma GSM both provide information on what the devices can capture. The Intercept published a secret, internal U.S. government catalogue of various cellphone surveillance devices, as well as an older cell-site simulator manual made available through a Freedom of Information Act request.

Threats Posed by Cell-Site Simulators

 Cell-site simulators invade the privacy of everyone who happens to be in a given area, regardless of the fact that the vast majority have not been accused of committing a crime. 
The use of cell-site simulators have been shrouded in government secrecy. Police have used cell-site simulators to track location data without a warrant, by deceptively obtaining “pen register” orders from courts without explaining the true nature of the surveillance. In Baltimore, a judge concluded that law enforcement had intentionally withheld the information from the defense, in violation of their legal disclosure obligations. For a while, police departments tried to keep the use of cell-site simulators secret from not just the public but also the court system, withholding information from defense attorneys and judges—likely due to non-disclosure agreements with Harris Corporation. Prosecutors have accepted plea deals to hide their use of cell-site simulators and have even dropped cases rather than revealing information about their use of the technology. U.S. Marshalls have driven files hundreds of miles to thwart public records requests. Police have tried to keep information secret in Sarasota, Florida, Tacoma, Washington, Baltimore, Maryland, and St. Louis, Missouri.
In light of this secrecy, the FBI told police officers to recreate evidence from the devices, according to a document obtained by the nonprofit investigative journalism outlet Oklahoma Watch. 
Cell-site simulators often disrupt cell phone communications within as much as a 500-meter radius of the device, interrupting important communications and even emergency phone calls.  Cell-site simulators have been shown to disproportionately affect low-income communities and communities of color. In Baltimore, the use of cell-site simulators disproportionately impacted African-American communities, according to a map included in an FCC complaint that overlaid where Baltimore Police were using stingrays over census data on the city’s black population.
Cell-site simulators rely on a vulnerability in our communications system that the government should help fix rather than exploit. 

EFF’s Work on Cell-Site Simulators 

For the reasons above, EFF opposes police use of cell site simulators. Insofar as law enforcement agencies are using cell-site simulators in criminal investigations, EFF argues that use should be limited in the following ways:
  1. Law enforcement should obtain individualized warrants based on probable cause;
  2. Cell-site simulators should only be used for serious, violent crimes;
  3. Cell-site simulators should only be used for identifying location;
  4. Law enforcement must minimize the collection of data from people who are not the targets of the investigation.

Litigation

We filed a Freedom of Information Act lawsuit to expose and shine light on the U.S. Marshals Service’s use of cell-site simulators on planes. 
Along with the ACLU and ACLU of Maryland, we filed an amicus brief in the first case in the country where a judge threw out evidence obtained as a result of using a cell-site simulator without a warrant. 
We filed an amicus brief, along with the ACLU, pointing a court to facts indicating that the Milwaukee Police Department secretly used a cell-site simulator to locate a defendant through his cell phone without a warrant in U.S. vs. Damian Patrick. (The government then admitted to having used it.) 

Legislation

We were original co-sponsors of the California Electronic Communications Privacy Act (CalECPA), along with the ACLU and the California Newspaper Publisher Association. This bill requires California police to get a warrant before using a cell-site simulator. Any evidence obtained from a cell-site simulator without a warrant is inadmissible in court. 
EFF supported S.B. 741, which requires transparency measures regarding the use of cell-site simulators. We are in the process of collecting these policies.

Further Research 

EFF has been investigating the use of cell-site simulators against Water Protectors and their allies at the Dakota Access Pipeline at the Standing Rock Sioux Reservation in North Dakota. We are currently doing further research on the technical aspects of cell-site simulators.

EFF Cases


For More Information









Saturday, April 22, 2017

Do Not Resist (2016)



Published on Oct 11, 2016 

"WINNER of the Grand Jury Prize for BEST DOCUMENTARY at the Tribeca Film Festival. An urgent and powerful exploration of the rapid militarization of the police in the United States. DO NOT RESIST– the directorial debut of Detropia cinematographer Craig Atkinson – offers a stunning look at the current state of policing in America and a glimpse into the future. 

The film takes viewers from a ride-along with a South Carolina SWAT team and inside a police training seminar that teaches the importance of “righteous violence” to the floor of a congressional hearing on the proliferation of military equipment in small-town police departments – before exploring where controversial new technologies, including predictive policing algorithms, could lead the field next."

Liberty at the movies: Do Not Resist

Quote" Anyone who doubts that America is well on its way to becoming a police state should watch Do Not Resist, a new documentary available for free download at Amazon.com. Do Not Resist examines the militarization of police. Like the best documentaries, Do Not Resist makes its points by showing, not telling. There is no narrator telling you how what you witnessed makes the case for policy change. The only time the filmmakers intrude is a few factual statements imposed on the screen.
The move examines various aspects of police militarization. One of the things I found startling was the clips of a speech at a police conference where the speaker justified police militarization by claiming that police were on the front lines of the war on terror. This scene was preceded by footage from the Ferguson, Missouri riots that resembled confrontation between U.S. military and civilian populations in Iraq rather than domestic law enforcement.
The speech is followed by clips of a New Hampshire town hall meeting where citizens in a town that has had two murders since 2004 debate accepting a $250,00 grant from Homeland Security to buy military equipment. The opponents of the grant argue getting police equipment built for military operations threaten liberty, not just by increasing the potential for police abuses, but by increasing federal spending on the military-industrial complex.
The way police militarization provides a new "market" for the military-industrial complex is not developed in the movie, but it does spend a fair amount of time on the ridiculousness of small towns arming themselves with military equipment.
The film also provides a look into how militarization affects the mindset of law enforcement. For instance, one police officer discusses how the military equipment is needed to control "unruly" crowds -- note he does not say violent, just unruly. Another LAPD officer says one of the benefits of the thousands of cameras enable them to know when a protest is occurring. Another police office says citizens sacrifice their right to privacy when they go out in public. Citizens just need to hope that the person looking up their information is doing so for the right reasons.
The movie shows an individual whose house was destroyed because the police mistakenly believed a drug dealer was living there. The man is told that he will not receive any compensation from the government for their mistakes. Adding insult to injury, the police confiscated cash the suspected dealer was planning to use to buy a lawnmower.
The film ends with a focus on what is to come. The filmmakers interview the founder and CEO of a company developing surveillance technology that can allow police to identify and track anyone within a certain radius of a crime scene. The CEO states use of his technology cannot just help solve major crimes, but can prevent lower-level crimes -- he never addresses the cost to liberty, or the potential for abuse of his product. He goes on to say he only wants to watch the parts of the world where crimes occur. But couldn't that be anywhere, so doesn't he need to watch everywhere?
The filmmakers also interview a professor who is developing a system to identify people likely to commit crimes. The professor claims his system can even tell if an unborn child is likely to commit a crime by looking at the parents' backgrounds! The professor expresses no concern for the civil liberties implications of his system.
Do Not Resist shows why ending police militarization, and the laws that justify it, should be a focus of the liberty movement. This is why Campaign for Liberty is working to repeal federal laws that support police militarization, as well as working to end civil asset theft.
The film also shows how laws criminalizing peaceful behaviors lead to authoritarianism. This is why Campaign for Liberty supports ending all unconstitutional laws that criminalizing peaceful behavior. We are also working to stop expanding the federal police state by criminalizing online gambling.
It is particularity important we keep reminding our representatives, such as House Judiciary Chairman Bob Goodlatte, that supporting federal laws criminalizing online gamingdrinking raw milk, or other peaceful activities are inconsistent with their pledge to support limited federal government and federalism." End quote