Feds May Need Warrants To Search Cell Phones at the Border After All

The role of smart phones as snitches is well-established, with people paying for their handy communications capabilities while the treacherous devices track us and reveal details of our lives. Even as the government spoofs cellphone towers to locate phone users, or purchases commercial data about our movements, border agents also insist they can, at will, search the phones of Americans returning home. But last month a federal judge ruled that a free pass to probe electronic devices is too broad, and that Americans enjoy some protections at the border of the sort they have elsewhere.

In this latest case, United States v. Smith, Jatiek Smith, the subject of a federal investigation, was stopped at the airport in Newark on his return from Jamaica. As detailed by U.S. District Judge Jed S. Rakoff, federal agents “forced him to turn over his cellphone and its password. They reviewed the phone manually and created and saved an electronic copy of it as it existed as of that date and time – all without a search warrant.”

Wait. No warrant? Unfortunately, yes.

Keep reading

“Nightmare Scenario”: US Government Has Been Secretly Stockpiling Dirt On Americans Via Data Brokers

The US Government has been purchasing troves of information on American citizens from 3rd party data providers, according to Wired, which cites privacy advocates who say this constitutes a “nightmare scenario.”

The United States government has been secretly amassing a “large amount” of “sensitive and intimate information” on its own citizens, a group of senior advisers informed Avril Haines, the director of national intelligence, more than a year ago. 

The size and scope of the government effort to accumulate data revealing the minute details of Americans’ lives are described soberly and at length by the director’s own panel of experts in a newly declassified report. Haines had first tasked her advisers in late 2021 with untangling a web of secretive business arrangements between commercial data brokers and US intelligence community members. -Wired

“This report reveals what we feared most,” according to attorney Sean Vitka of the Demand Progress nonprofit. “Intelligence agencies are flouting the law and buying information about Americans that Congress and the Supreme Court have made clear the government should not have.”

The government has been using ‘craven interpretations of aging laws’ to bypass privacy rights, as prosecutors have increasingly ignored limits traditionally imposed on domestic surveillance.

I’ve been warning for years that if using a credit card to buy an American’s personal information voids their Fourth Amendment rights, then traditional checks and balances for government surveillance will crumble,” according to Sen. Ron Wyden (D-OR).

During a March 8 hearing, Wyden pressed Haines to release the panel’s report – after Haines said it should “absolutely” be read by the public. On Friday, that’s exactly what happened after the Office of the Director of National Intelligence (ODNI) released it amid a battle with the Electronic Privacy Information Center (EPIC) over various related documents.

Keep reading

Federal Agencies Routinely Spy On Phone Calls, Texts, Emails Of American Citizens, Experts Say

Despite the Constitution’s Fourth Amendment, which prohibits warrantless government searches, U.S. agencies are proving to be ever more intrusive in their routine surveillance of Americans’ speech and activities.

Often working in collaboration with private companies and banks, agencies like the FBI have been misusing laws against foreign terrorism to vacuum up and sift through the private data of millions of Americans without a warrant or any evidence of a crime.

As Congress now debates reauthorizing relevant sections of the Foreign Intelligence Surveillance Act (FISA) that are set to expire this year, the libertarian Cato Institute held a four-day conference last week, which featured calls for major legal reforms by conservative and liberal speakers alike.

“The violations that we’ve seen have not just been epic in scale, but they’ve also been persistent, over and over again,” Jake Laperruque, a deputy director at the Center for Democracy and Technology, told attendees.

“To put a human scale on this, what we’re talking about is not just random typos or wrong clicks; we’re looking at things like pulling up batches of thousands of political donors in one go, without any suspicion of wrongdoing,” Laperruque said. “We’ve had reports of journalists, political commentators, a domestic political party; these compliance violations are the most worrisome type of politically focused surveillance.”

In 2001, Congress passed the PATRIOT Act as a means to combat foreign terrorism after the Sept. 11 attacks. In 2008, Congress added an amendment to FISA, Section 702, which authorized warrantless surveillance of non-U.S. persons located outside the country. This amendment, which critics say is the source of much of the abuse, is scheduled to “sunset” on Dec. 31.

Keep reading

Why Are So Many Younger Americans Okay with Big Brother Monitoring Their Homes?

The good news is that “only” a minority of younger American adults favor Big Brother-style surveillance of our home life. The bad news is that we’re discussing this because it’s a disturbingly large share supporting such a totalitarian intrusion. Worse, the idea seems to be gaining acceptance. We either need to get a handle on what’s going on here, or else potentially suffer lives monitored by unblinking eyes of the state, imposed by popular demand.

“Americans under the age of 30 stand out when it comes to 1984‐​style in‐​home government surveillance cameras. 3 in 10 (29 percent) Americans under 30 favor ‘the government installing surveillance cameras in every household’ in order to ‘reduce domestic violence, abuse, and other illegal activity,'” the Cato Institute’s Emily Ekins and Jordan Gygi wrote last week. “Support declines with age, dropping to 20 percent among 30–44 year olds and dropping considerably to 6 percent among those over the age of 45.”

The survey in question focused on central bank digital currencies (CBDCs)—government-sponsored alternatives to such digital money as bitcoin. CBDCs would offer the convenience of digital payments, but potentially without privacy protections, and could empower the state to control what people buy and sell.

“Interestingly, more than half (53 percent) of those who support the United States adopting a CBDC are also supportive of government surveillance cameras in homes, while only 2 percent of those who oppose a CBDC feel the same,” add Ekins and Gygi. “This suggests there may be a common consideration that is prompted by both issues. Likely, it has to do with willingness to give up privacy in hopes of greater security.”

If that’s the case, it may be a growing willingness to prioritize security over privacy. Note not just the 29 percent support for in-home surveillance among the youngest cohort, but also the 20 percent support among those 30–44. Six percent support among older cohorts is the sort of random approval for any crazy idea that you’d expect to see in a population. The jump to 20 percent and then 29 percent looks like something different. But what?

Keep reading

A Connecticut Couple Challenges Warrantless Surveillance of Their Property by Camera-Carrying Bears

Mark and Carol Brault, who own 114 acres of forested land in Hartland, Connecticut, operate a private nature preserve that charges admission to visitors interested in seeing bears and other wildlife. In a 2020 lawsuit, the town of Hartland accused Mark Brault of violating a local ordinance against feeding bears, a charge that he denies. The latest wrinkle in that ongoing dispute involves the Connecticut Department of Energy and Environmental Protection (DEEP), which the Braults say has defied the Fourth Amendment by attaching a camera to a black bear that is known to frequent their property.

“Turning wildlife into unguided surveillance drones is unbearable,” Institute for Justice (I.J.) senior attorney Robert Frommer, a Fourth Amendment specialist who is not involved in this case, writes in an email. “Connecticut should paws its animal camera program so as not to infringe on Nutmeggers’ privacy and security.”

DEEP’s bear-borne camera is a twist on longstanding warrantless surveillance of private property by wildlife agents, which I.J. has challenged as a violation of state constitutional protections in Pennsylvania and Tennessee. In a complaint that the Braults filed last week in the U.S. District Court for the District of Connecticut, they argue that DEEP’s deployment of an ursine spy, identified by a state tag as Bear Number 119, violates the Fourth Amendment’s ban on unreasonable searches.

Keep reading

SCOTUS Allows IRS to Carry Out Secret, Warrantless Searches of Innocent Taxpayers’ Bank Accounts

In a unanimous opinion, the U.S. Supreme Court is allowing the IRS to go on secret, warrantless fishing expeditions through innocent taxpayers’ bank records in order to identify and collect unpaid taxes from family members and associates who have no legal interest in those bank accounts.

Despite acknowledging that “the authority vested in tax collectors may be abused, as all power is subject to abuse,” and that “Congress has given the IRS considerable power,” the Supreme Court’s 9-0 ruling in Polselli v. IRS declined to restrict the IRS’s authority. Attorneys for The Rutherford Institute and Cato Institute had filed an amicus brief in Polselli arguing that the sweeping investigatory power wielded by the IRS—to circumvent the Fourth Amendment by carrying out warrantless searches of the bank accounts and records of innocent people, who are given no notice or right to object to the search, merely because they may be associated with a delinquent taxpayer—offends every constitutional sensibility on the right to privacy.

“This practice of investigating the bank records of innocent taxpayers because they may have family members or associates who are delinquent on their taxes is merely a perverse form of guilt by association,” said constitutional attorney John W. Whitehead, president of The Rutherford Institute and author of Battlefield America: The War on the American People. “At a minimum, Fourth Amendment protections should not disappear just because sensitive information is shared with third parties, such as banks and attorneys.”

The case arose after an IRS Revenue Officer, seeking to collect underpaid federal taxes by Remo Polselli, served summonses on the banks of Polselli’s wife and attorney in order to find account and financial records concerning Polselli. The IRS agent did not notify Polselli’s wife or attorney of the summonses, but the banks voluntarily did so. Polselli’s wife and attorney subsequently filed motions in federal district court to quash the IRS’s summonses. In siding with the IRS, the district court held that Polselli’s wife and attorney are not entitled to notice of the summons and have no right to even be heard on their motions to quash the summonses.

Keep reading

Over 10,000 FBI Agents Can Access Data From Secretive Surveillance Program: Inspectors General

More than 10,000 federal employees could have access to data revealed by a secretive government surveillance program that has come under scrutiny because of alleged abuses, lawmakers were told by U.S. inspectors general.

At an April 27 House Judiciary subcommittee hearing, lawmakers heard from a panel of three witnesses associated with the U.S. Office of the Inspector General (OIG) responsible for oversight of the Foreign Intelligence Surveillance Act (FISA). The legislation gives intelligence agencies broad powers to conduct surveillance on foreigners suspected of spying for a foreign power or belonging to a terrorist group.

However, bipartisan concerns have been raised because the program also has the ability to collect information about U.S. citizens.

During the hearing, Rep. Matt Gaetz (R-Fla.) queried panelists about how many FBI agents could have access to FISA-acquired data.

A court-ordered report released in May 2022 revealed that the FBI had made more than 3.3 million queries of Americans under FISA authority. This, in turn, prompted a crisis of confidence in the FBI’s respect for civil liberties among members of both parties.

Keep reading

Over One Million Secret FBI Searches Made in Error: Watchdog

More than one million secret searches of Americans conducted by the FBI were made erroneously, a watchdog testified to Congress on April 27.

Around 30 percent of the approximately 3.4 million searches were done in error, Department of Justice Inspector General Michael Horowitz testified.

“It’s obviously very concerning that there’s that volume of searches,” Horowitz told a U.S. House of Representatives subcommittee, adding that he was particularly concerned with the high error rate.

The searches in question were conducted by FBI personnel with authority under the Foreign Intelligence Surveillance Act (FISA). The bill enables U.S. authorities to gather information on U.S. citizens suspected of being involved with possible spies or terrorists.

Some 3.39 million searches were conducted by the FBI in 2021, U.S. intelligence officials have said. That was up from just 1.2 million in 2020.

Sharon Bradford Franklin, chair of the U.S. Privacy and Civil Liberties Oversight Board, told members that Congress should pass new legislation imposing greater safeguards into the system to protect Americans. That should include requiring probable cause or court review for each query of an American, she said.

“Congress certainly has the authority to do that. And I think that’s one of the key issues for this committee in the Congress to consider,” Horowitz said. Adding new requirements, though, could increase the FBI’s workload, he said.

Rep. Jim Jordan (R-Ohio) indicated support for adding new requirements.

“The solution is simple right? Require probable cause if you’re going to query this database on American citizens,” he said.

Keep reading

Are Game Wardens Watching You? – Part 1: The Case of the Hidden Trail Camera

Imagine you go hunting one morning, on your own land, and you find a cellular trail camera that isn’t yours. Now imagine that the camera was obviously placed in such a way as to be entirely hidden from you—except for a hole cut through the brush so that it could surveil the comings and goings on your property.

You’d probably be creeped out and pull that camera down, right? That’s what Hunter Hollingsworth of Camden, Tennessee, did when he spotted an unknown trail camera pointed toward the gravel road through his family farm.

Then a few months later, he found his home surrounded by armed law-enforcement officers who threatened to kick his door down if he didn’t let them inside to search for the camera. This was just the beginning of a series of events that snowballed into a lawsuit that would eventually put a national spotlight on the near century-old practice of game wardens entering private land without a search warrant. The case would go on to fundamentally change how officers with the Tennessee Wildlife Resources Agency are able to do their jobs—and it could set precedents for similar cases in other states, too.

But no matter where you live and hunt, the Hunter Hollingsworth case—and the cases it continues to inspire—could ultimately decide whether you might one day find a camera hidden in your trees, or a game warden on your property without a warrant.

Keep reading

New Zealand spy agency uses ‘computer network exploitation’ to take digital information

One of the country’s two spy agencies has revealed it retrieves information directly from where it is stored or processed on computers.

The “computer network exploitation” operations have been a highly-classified secret at the GCSB until now.

US commentators refer to computer network exploitation as a form of cyber warfare, or the “theft of data”.

“Our legislation … allows us to access information infrastructures, which is more than just interception,” the Director-General of the Government Communications Security Bureau, Andrew Hampton, said.

It “also allows us to retrieve digital information directly from where it is stored or processed”.

The GCSB refers to this as “accessing information infrastructures”.

The spy watchdog, the Inspector-General of Intelligence and Security, Brendan Horsley, cited Hampton’s speech to the Institute of International Affairs in May, for making the revelation.

This had freed Horsley up to be able to assure the public that the exploitation operations were scrutinised, he said in his annual report released on Friday.

Previously, he had had to refer to “certain operations”.

“Although it was subject to oversight, it was not possible to provide any clear public assurance of this.”

In fact, he had conducted a review that found the compliance systems around CNE “to be generally effective and appropriate”.

However, he was still not allowed to go into details “on the bureau’s use of this important capability”.

Keep reading