from the just-get-it-all,-you-never-know-when-you'll-need-it dept
Our founding fathers understood the problems with overly-broad warrants and the dangers posed by unreasonable searches and seizures. These were the sort of things kings did because the populace had no way to check that power. So, when they decided the US wouldn't be run like a patriarchal state, they built in protections for the new nation's inhabitants.
But they also understood that these checks on government power might be inconvenient for law enforcement and security agencies, which is why they built in extensive waivers and exceptions that would allow these entities to bypass the limits in order to pursue criminals, terrorists and whistleblowers. As the wording clearly states in the Bill of Rights, the people are guaranteed certain protections "unless, you know, we're trying to catch bad guys."
It's true.** Our founding fathers would be amazed to observe the ruckus being raised by so-called "defenders" of rights in the wake of the NSA leaks or the rising amount of evidence showing government agencies are willing to exploit every loophole (mainly the Third Party Doctrine) to seize tons of data completely unrelated to the investigations at hand.
**It absolutely fucking isn't.
Jess Remington at Reason points out another of these "non-events" being carried out under the name of law enforcement.
Police officers in Richland County, South Carolina are currently defending the use of a controversial investigation method that grants their departments access to thousands of cell phone users’ data in the search for criminals.How does one's info end up being swept up in a tower dump? Does one have a cellphone with a signal? Yeah, that's how. Checking your email? Surfing the web? Making a call? Sending a text message? It all goes in the dump. And South Carolina cops are helping themselves to all of this data because, hey, it makes capturing bad guys a little easier. (CAUTION: AUTOPLAY IN EFFECT)
The technique, in which law enforcement officials rely on what are known as “tower dumps,” is an increasingly common policing tactic in local departments across the country. Following a crime, law enforcement officials locate nearby cell towers and request all of the call, text, and data transmissions that occurred during the crime from the tower’s provider. The majority of the data collected belongs to individuals with no connection to the crime.
The Richland County Sheriff's Department used Tower Dumps during the investigation into a string of car breakins, where weapons and computers were stolen. They combined the Tower Dump information with DNA evidence and in 2011 arrested Phillip Tate on three counts of "breaking and entering a motor vehicle" and one count of "larceny."Cops seeking to use these tower dumps just can't call up the provider and ask for them. But neither do they have to jump through the probable cause hoops a warrant entails. All they need is a court order, which is considerably easier to obtain than a warrant, thanks to the (somewhat ironically-named) Electronic Communications Privacy Act of 1986.
"He did break and enter into both of those vehicles, one of them being the vehicle of Sheriff Lott. It was parked at his house," said Fifth Circuit Solicitor Joanna McDuffy in court. "It was his sheriff department issued vehicle. Weapons were taken from that vehicle your honor."
Search warrants we found say Richland Sheriff's investigators requested dumps on two cell phone towers during their investigation.
The Richland PD is just one of several law enforcement entities making frequent use of these untargeted, unminimized data dumps. And the numbers keep increasing every year.
In 2011, AT&T and Verizon received 1.3 million requests for cell phone data (many of which were tower dumps) and filled more than 500,000 of them. Verizon estimates that over the last 5 years, law enforcement’s tower dump requests have increased by 15% annually. T-Mobile reported increases of approximately 12%-16%.Thanks to the ease of obtaining tower dumps, it's becoming a go-to tool for law enforcement. Not only can they collect these without needing to show probable cause, they're also under no obligation to inform any of the millions of unrelated cellphone customers whose information they've obtained that they've swept up their data.
Oddly enough, someone from the counterterrorism community is being the voice of reason in all this.
"In recognizing that it's not just the CIA or FBI tracking a terrorist that may have flown over here, this is local law enforcement. As citizens, we sort of have a question: how often is this happening?" said Keith Pounds, president of counterrorism consulting firm Countercon…This obviously isn't being implemented anywhere at the moment, or we would have heard of it. Law enforcement agencies are understandably in no hurry to tell innocent citizens that they're sweeping up their data in order to sift through it for potential signs of wrongdoing. They seem to be taking their cues from our nation's intelligence agencies, which only begrudgingly inform the public about their data hauls, and then only after former employees splash them all over the front pages of newspapers.
He supports Tower Dumps, but only if a search warrant is signed, the data is purged after an investigation is complete and law enforcement notify subscribers included in the database.
"Inform us," Pounds said. "Or at least those couple of hundred or couple of thousand people, innocent people, inform them that hey we acquired your information for this particular crime. We're going to purge the data and get rid of it."
Making this worse (especially for South Carolina residents) is that local laws regarding this data tie retention rates to whether the suspect apprehended using tower dumps is convicted or not.
South Carolina evidence control laws say if a suspect is convicted or pleads guilty, police could keep everything they get from a Tower Dump for up to seven years.So, your data's stay in SC police databases isn't subject to any minimization by process of elimination. It isn't even purged once a guilty verdict (or entered plea) is obtained. Instead, SC law enforcement has nearly a decade (or longer -- no mention of what happens if the suspect is found not guilty) to play connect-the-dots with data on non-criminals.
Even worse, this is a state that at least has some sort of policy in place to deal with this data. Most states have very little in the way of guidelines or privacy protection. Usually, these are developed post-public uproar. And if no one has to inform the public about the gathering of their data, this delays the (almost inevitable) exposure of these practices and increases the chances of abuse.