Tag Archive: Cell Phone Tracking


Local Judge Unseals Hundreds Of Highly Secret Cell Tracking Court Records

 

 

 

 

” A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device.

  According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used.

  The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time.

  Relatively little is known about precisely how stingrays are used by law enforcement agencies nationwide, although more and more documents have surfaced showing how they’ve been purchased and used in limited instances. Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, security researcher Kristin Paget famously demonstrated a homemade device built for just $1,500.

  Worse still, local cops have lied to courts (at the direction of the United States Marshals Service) about the use of such technology. Not only can stingrays be used to determine a phone’s location, but they can also intercept calls and text messages. While they do target specific phones, they also sweep up cell data of innocents nearby who have no idea that such data collection is taking place. “

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

AT&T Stops Adding Web Tracking Codes On Cellphones

” AT&T Mobility, the nation’s second-largest cellular provider, said Friday it’s no longer attaching hidden Internet tracking codes to data transmitted from its users’ smartphones. The practice made it nearly impossible to shield its subscribers’ identities online.

  The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users’ identities based on their browsing habits.

  Verizon Wireless, the country’s largest mobile firm, said Friday it still uses this type of tracking, known as “super cookies.” Verizon spokeswoman Debra Lewis said business and government customers don’t have the code inserted. There has been no evidence that Sprint and T-Mobile have used such codes.

” As with any program, we’re constantly evaluating, and this is no different,” Lewis said, adding that consumers can ask that their codes not be used for advertising tracking. But that still passes along the codes to websites, even if subscribers say they don’t want their data being used for marketing purposes.

  The tracking codes are part of the latest plan by the cellular industry to keep tabs on users and their devices. While the codes don’t explicitly contain personal information, they’re unique and nonetheless sent to websites alongside personal details that a user may submit voluntarily — like a name or a phone number.

  That means enough data can transform a large chunk of random digits into a digital fingerprint that’s as identifying as a Social Security number. AT&T said Friday its tracker was part of a testing project that’s been phased off of its network.

” This is more like a license plate for your brain,” said Jacob Hoffman-Andrews, a senior staff technologist with the Electronic Frontier Foundation, a civil liberties organization that opposed the practice. “Everything you wonder about, and read, and ask the Internet about gets this header attached to it. And there are ad agencies out there that try to associate that browsing history with anything that identifies you.”

AP News

Kimmel’s Joke About Crazy Tin-Foil Hat People Has A Surprising Punchline

 

 

 

   Jimmy Kimmell makes a surprising admission on the Tin Foil Hat Brigade’s contention that the Government is tracking their every move … Gee , those crazy , conspiracy theorists that have been subject to nothing but scorn and ridicule by the intelligentsia for all these years were right all along … and he gets in a well-deserved shot at Obamacare to boot .

 

 

 

 

 

 

 

 

 

 

 

 

OFFICIAL SIDESTEPS QUERIES ON CELLPHONE LOCATIONS

 

 

” The head of the National Security Agency sidestepped questions Thursday from a senator about whether the NSA has ever used Americans cellphone signals to collect information on their whereabouts that would allow tracking of the movements of individual callers.

Asked twice by Sen. Ron Wyden, D-Ore., if NSA had ever collected or made plans to collect such data, NSA chief Gen. Keith Alexander answered both times by reading from a letter provided to senators who had asked the same question last summer. He also cited a classified version of the letter that was sent to senators and said, “What I don’t want to do … is put out in an unclassified forum anything that’s classified.”

Wyden promised to keep asking.

“I believe this is something the American people have a right to know, whether NSA has ever collected or made plans to collect cell site information,” Wyden said.”

 

 

 

 

 

 

 

 

DHS Built Domestic Surveillance Tech Into Predator Drones

 

 

” Homeland Security’s specifications for its drones, built by San Diego-based General Atomics Aeronautical Systems, say they “shall be capable of identifying a standing human being at night as likely armed or not,” meaning carrying a shotgun or rifle. They also specify “signals interception” technology that can capture communications in the frequency ranges used by mobile phones, and “direction finding” technology that can identify the locations of mobile devices or two-way radios.

The Electronic Privacy Information Center obtained a partially redacted copy of Homeland Security’s requirements for its drone fleet through the Freedom of Information Act and published it this week. CNET unearthed an unredacted copy of the requirements that provides additional information about the aircraft’s surveillance capabilities.

Concern about domestic use of drones is growing, with federal legislation introduced last month that would establish legal safeguards, in addition to parallel efforts underway from state and local lawmakers. The Federal Aviation Administration recently said that it will “address privacy-related data collection” by drones.

The prospect of identifying armed Americans concerns Second Amendment advocates, who say that technology billed as securing the United States’ land and maritime borders should not be used domestically. Michael Kostelnik, the Homeland Security official who created the program, told Congress that the drone fleet would be available to “respond to emergency missions across the country,” and a Predator drone was dispatched to the tiny town of Lakota, N.D., to aid local police in a dispute that began with reimbursement for feeding six cows. The defendant, arrested with the help of Predator surveillance, lost a preliminary bid to dismiss the charges.”

 

 

—–

Evidence: FBI Tracking And Monitoring Americans Via Smart Phones

 

  “Hacker group Antisec has leaked what it says is evidence that the FBI is actively monitoring the communications of every American using an iPhone.

The hackers released a statement  Tuesday claiming that it had obtained detailed information on some 12 million iphone users, taken from an FBI agent’s laptop.”