Friday, November 04, 2011

Warrantless Gov Surveillance of Cell Phones

New technology called 'Stingray' allows the Federal government  to identify, log, and record all calls, text messages, and digital information on your cell phone.  The Feds can also remotely turn on your cell phone an listen to everything being said within a ten foot radius of the cell phone in question.



The 'Stingray' device actually mimics the nearest cellphone tower causing cellphones, laptops, tablets, basically any wireless devices in the area to  force connect to the 'Stingray' device.   The 'Stingray' force connects all wireless devices in a classified range.  Then, instantly the 'Stingray'  device records user specific  ID numbers, data traffic, and GPS coordinates.  This allows the Feds to know where you are, when you are there, what you are saying, who you are saying it too, and any other tidbit of digital information you may have on your mobile device.

In order to fool tech savvy liberty minded individuals the 'Stingray' device sends bogus data to the nearest real tower so that no one is the wiser that the Feds have been eavesdropping in on your private conversation.

One of the problems with the Feds using the 'Stingray' device is that it doesn’t just capture digital info from the targeted individual's phone.   It gobbles up digital info from every  wireless device in the targeted area being scanned by the Feds.   So, the digital info of every law abiding citizen is suddenly up for grabs by the Feds.  Who's to say they are not running a secondary program looking for wanted individuals, people who owe back taxes, fathers who are late with their child support payments, etc.  Who's to say the Feds are not running a third program looking for certain words and phrases which might alert them to anyone who might not agree with the Feds agenda.   The Feds give lip service about protecting non-targeted individual's digital information with an FBI policy requiring Federal agents to purge all data stored in the 'Stingray' device at the conclusion of an operation.

My question is how do we know what the Feds are actually doing with all this data that stumbled upon while using the 'Stingray' device.

Where is the oversight?

Where is the constitutional protection from illegal search and seizure of law abiding US citizens digital property?