Not exact matches
Disclosure of the use of
cell site simulators in Canada is a precondition to meaningful debate — in public, in the courts and among law makers — in order to ensure that the use of invasive
technology is in compliance with s. 8 of the Charter of Rights that protects all Canadians from unreasonable search and seizure.
«While law enforcement agencies should be able to utilize
technology as a tool to help officers be safe and accomplish their missions, absent proper oversight and safeguards, the domestic use of
cell -
site simulators may well infringe upon the constitutional rights of citizens to be free from unreasonable searches and seizures, as well as the right to free association,» the report said.
D.C. Metropolitan Police's use of such
cell -
site simulator technology to nab suspect Prince Jones in 2013 «violated the Fourth Amendment,» the court decided against the U.S. government on Thursday.
Prosecutors have accepted plea deals to hide their use of
cell -
site simulators and have even dropped cases rather than revealing information about their use of the
technology.
A bipartisan Congressional committee's recent report showcases troubling details about police abuse of
cell -
site simulators, and calls on Congress to pass laws ensuring that this powerful
technology is only deployed with a court - issued probable cause warrant.
On January 1, 2016 two new laws went into effect in California: S.B. 34 requires agencies that use automated license plate recognition (ALPR) or access ALPR data to publish privacy and usage policies, while S.B. 741 requires public policies for
cell -
site simulators, a type of cellphone tracking
technology often referred to as «Stingrays» and «Dirtboxes.»
The latter of the two even went so far as to disclose that the agency was in the process of obtaining
cell -
site simulator technology and would enact a policy and post it online before officers deploy it.
These agencies were identified as potentially using
cell -
site simulator technology based on public records.
The Department of Homeland Security has finally confirmed what many security specialists have suspected for years:
cell - phone tracking
technology known as
cell -
site simulators (CSS) are being operated by potentially malicious actors in our nation's capital.
This week the Center for Media Justice, ColorOfChange.org, and New America's Open
Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using
cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network — and are doing so in a way that has a disproportionate impact on communities of color.
Cell -
site simulators, sometimes called «Stingrays» after one of the more popular models produced by the Harris Corporation, are a type of phone - surveillance
technology used by police throughout the United States.
Finally, in the interest of maintaining public oversight of law enforcement's use of such surveillance
technology, EFF recommends that Congress enact a transparency policy that requires law enforcement agencies to produce annual reports on the number of times an agency uses
cell -
site simulators, as well as against whom, when, where, and how.
Unless and until cellular
technology evolves beyond the vulnerability that makes
cell -
site simulators possible, we're advocating for strong regulation, transparency, and public oversight of the use of such
technology by law enforcement.
Please call on Congress to pass a warrant requirement for
cell -
site simulator use and other intrusive surveillance
technologies by emailing your member of Congress today.
And at the very local level, places like Alameda County, CA, and Santa Clara County, CA, are realizing that they don't want powerful
cell -
site simulator technology in the hands of law enforcement without knowing how it will be used.
While some have attributed these issues to secret surveillance
technologies like
cell -
site simulators («CSSs,» also known colloquially as Stingrays) and malware, it's been very difficult to pinpoint the true cause or causes.