{"id":11060,"date":"2018-01-10T10:45:18","date_gmt":"2018-01-10T18:45:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/10\/news-4831\/"},"modified":"2018-01-10T10:45:18","modified_gmt":"2018-01-10T18:45:18","slug":"news-4831","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/01\/10\/news-4831\/","title":{"rendered":"How the Government Hides Secret Surveillance Programs"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a551a6bf2f0d136bb6f47f1\/master\/pass\/hemisphere-648755154.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Wed, 10 Jan 2018 01:10:10 +0000<\/strong><\/p>\n<p><span class=\"lede\">In 2013, 18-year-old <\/span>Tadrae McKenzie <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing\/2015\/02\/22\/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html?utm_term=.ca77be53f1f4\" target=\"_blank\">robbed a marijuana dealer<\/a> for $130 worth of pot at a Taco Bell in Tallahassee, Florida. He and two friends had used BB guns to carry out the crime, which under Florida law constitutes robbery with a deadly weapon. McKenzie braced himself to serve the minimum four years in prison.<\/p>\n<p>But in the end, a state judge offered McKenzie a startlingly lenient plea deal: He was ordered to serve only six months\u2019 probation, after pleading guilty to a second-degree misdemeanor. The remarkable deal was related to evidence McKenzie\u2019s defense team uncovered before the trial: Law enforcement had used a secret surveillance tool often called Stingray to investigate his case.<\/p>\n<p>Stingrays are devices that behave like fake cellphone towers, tricking phones into believing they\u2019re pinging genuine towers nearby. By using the device, cops can determine a suspect\u2019s precise location, outgoing and incoming calls, and even <a href=\"https:\/\/www.wired.com\/2015\/10\/stingray-government-spy-tools-can-record-calls-new-documents-confirm\/\">listen-in on a call<\/a> or see the content of a text message.<\/p>\n<p>Many people may have been convicted using techniques that violated their rights.<\/p>\n<p>McKenzie\u2019s lawyers suspected cops had used a Stingray because they knew exactly where his house was, and knew he left his home at 6 a.m. the day he was arrested. The cops had obtained a court order from a judge to authorize Verizon to hand over data about the location of Mckenzie\u2019s phone. But cell tower data isn\u2019t precise enough to place a device at a specific house.<\/p>\n<p>The cops also said they used a database that lets law enforcement agencies locate individuals by linking them with their phone numbers. But the phone McKenzie was using was a burner, and not associated with his name. Law enforcement couldn\u2019t adequately explain their extraordinary knowledge of his whereabouts.<\/p>\n<p>The state judge in the case ordered police to show the Stingray and its data to McKenzie\u2019s attorneys. They refused, because of a non-disclosure agreement with the FBI. The state then offered McKenzie, as well as the two other defendants, plea deals designed to make the case go away.<\/p>\n<p>The cops in McKenzie\u2019s case had ultimately failed to successfully carry out a troubling technique called \u201cparallel construction.\u201d<\/p>\n<p>First described in government documents obtained by <a href=\"https:\/\/www.reuters.com\/article\/us-dea-sod\/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805\" target=\"_blank\">Reuters<\/a> in 2013, parallel construction is when law enforcement originally obtains evidence through a secret surveillance program, then tries to seek it out again, via normal procedure. In essence, law enforcement creates a parallel, alternative story for how it found information. That way, it can hide surveillance techniques from public scrutiny and would-be criminals.<\/p>\n<p>A new <a href=\"https:\/\/www.hrw.org\/report\/2018\/01\/09\/dark-side\/secret-origins-evidence-us-criminal-cases\" target=\"_blank\">report<\/a> released by Human Rights Watch Tuesday, based in part on 95 relevant cases, indicates that law enforcement is using parallel construction regularly, though it\u2019s impossible to calculate exactly how often. It\u2019s extremely difficult for defendants to discern when evidence has been obtained via the practice, according to the report.<\/p>\n<p>\u201cWhen attorneys try to find out if there\u2019s some kind of undisclosed method that\u2019s been used, the prosecution will basically stonewall and try not to provide a definitive yes or no answer,\u201d says Sarah St. Vincent, the author of the report and a national security and surveillance researcher at Human Rights Watch.<\/p>\n<p>In investigation reports, law enforcement will describe evidence obtained via secret surveillance programs in inscrutable terms. \u201cWe\u2019ve seen plenty of examples where the police officers in those reports write \u2018we located the suspect based on information from a confidential source;\u2019 they use intentionally vague language,\u201d says Nathan Freed Wessler, a staff attorney at the ACLU\u2019s Speech, Privacy, and Technology project. \u201cIt sounds like a human informant or something else, not like a sophisticated surveillance device.\u201d<\/p>\n<p>Sometimes, when a savvy defense attorney pushes, an unbelievable plea deal is offered, or the the case is dropped entirely. If a powerful, secret surveillance program is at stake, a single case is often deemed unimportant to the government.<\/p>\n<p>\u201cParallel construction means you never know that a case could actually be the result of some constitutionally problematic practice,\u201d says St. Vincent. For example, the constitutionality of using a Stingray device without a warrant is still up for debate, according to the Human Rights Watch report. Some courts <a href=\"https:\/\/www.engadget.com\/2017\/09\/21\/court-stingray-without-warrant-violates-fourth-amendment\/\" target=\"_blank\">have ruled<\/a> that the devices do in fact violate the Fourth Amendment.<\/p>\n<p>Hemisphere, a massive telephone-call gathering operation <a href=\"http:\/\/www.nytimes.com\/2013\/09\/02\/us\/drug-agents-use-vast-phone-trove-eclipsing-nsas.html\" target=\"_blank\">revealed by <em>The New York Times<\/em> in 2013<\/a>, is one of the most well-documented surveillance programs that government officials attempt to hide when they use parallel construction. The largely secret program provides police with access to a vast database containing call records going back to 1987. Billions of calls are added daily.<\/p>\n<p>In order to create the program, the government forged a lucrative partnership with AT&amp;T, which owns three-quarters of the US\u2019s landline switches and much of its wireless infrastructure. Even if you change your number, Hemisphere\u2019s sophisticated algorithms can connect you with you new line by examining calling patterns. The program also allows law enforcement to have temporary access to the location where you placed or received a call.<\/p>\n<p>The Justice Department billed Hemisphere as a counter-narcotics tool, but the program has been used for everything from Medicaid fraud to murder investigations, according to documentation obtained in 2016 by <a href=\"https:\/\/www.thedailybeast.com\/atandt-is-spying-on-americans-for-profit\" target=\"_blank\">The Daily Beast<\/a>.<\/p>\n<p class=\"article-list-item-embed-component__title\">Trump Now Inherits an Expansive Surveillance State<\/p>\n<p class=\"article-list-item-embed-component__title\">Congress Is Debating Warrantless Surveillance in the Dark<\/p>\n<p class=\"article-list-item-embed-component__title\">Apple\u2019s FaceID Could Be a Powerful Tool for Mass Spying<\/p>\n<p>\u201cWhat Hemisphere\u2019s capabilities allow it to do is to identify relationships and associations, and to build people\u2019s social webs,\u201d says Aaron Mackey, staff attorney at the Electronic Frontier Foundation (EFF). \u201cIt\u2019s highly likely that innocent people who are doing completely innocent things are getting swept up into this database.\u201d<\/p>\n<p>The EFF filed Freedom of Information Act and Public Records Act requests in 2014 seeking info about Hemisphere, but the government only provided heavily redacted files. So the EFF filed a lawsuit in 2015. It\u2019s currently waiting for a California judge to decide whether more information can be made public without impeding law enforcement\u2019s work.<\/p>\n<p>\u201c[The government] is obscuring what we believe to be warrantless or otherwise unconstitutional surveillance techniques, and they\u2019re also jeopardizing a defendant\u2019s ability to obtain all the evidence that\u2019s relevant,\u201d says Mackey.<\/p>\n<p>Parallel construction can also involve a simple event like a traffic stop. In these instances, local law enforcement follows a suspect and then pulls them over for a mundane reason, like failing to use a turn signal. While the stop is meant to look random, cops are often working on a tip they received from a federal agency like the DEA.<\/p>\n<p>\u201cSometimes when tips come through, the federal authorities don\u2019t even tell the local authorities what they\u2019re looking for,\u201d says St. Vincent. The tip could be as simple as to watch out for a car at a specific place and time.<\/p>\n<p>These stops are referred to as \u201cwall off\u201d or \u201cwhisper\u201d stops, according to the Human Rights Watch report. In these instances, local law enforcement has to find probable cause for pulling the suspect over to avoid disclosing the tip. The tip is then never mentioned in court, and instead the beginning of the investigation is said to be the \u201crandom\u201d stop.<\/p>\n<p>The Human Rights Watch report concludes that Congress should pass legislation forbidding the use of parallel construction because it impedes on the right to a fair trial. Some representatives, like Republican Senator Rand Paul, have also called for banning the practice.<\/p>\n<p>Opponents of parallel construction believe it should be outlawed because it prevents judges from doing their jobs. \u201cIt really gives a lot of power to the executive branch,\u201d says St. Vincent. \u201cIt cuts judges out of the role of deciding whether something was legally obtained.\u201d<\/p>\n<p>One of the most concerning aspects of the practice is it shields government surveillance technology from public scrutiny. Stingrays, the cellphone-tracking device used in the Florida robbery case, have existed for years, but have only recently been disclosed to the public. Lawyers and legal scholars haven\u2019t yet conclusively decided whether their use without a warrant violates the Fourth Amendment, in part because so little is known about them. That means many people may have been convicted using technology that violated their rights.<\/p>\n<p>In the future, if the government hides new surveillance technology like facial recognition, the public will be unable to discern if it\u2019s biased or faulty. Unless judges and citizens understand how surveillance techniques are used, we also can\u2019t evaluate their constitutionality.<\/p>\n<p>The public needs to determine if hiding surveillance programs is something it\u2019s comfortable with at all. On one hand, keeping certain techniques secret likely helps authorities apprehend criminals. But if we don\u2019t know at least the basic contours of how a program works, it\u2019s hard to have any discussion at all.<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/stingray-secret-surveillance-programs\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a551a6bf2f0d136bb6f47f1\/master\/pass\/hemisphere-648755154.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Wed, 10 Jan 2018 01:10:10 +0000<\/strong><\/p>\n<p>A new report from Human Rights Watch sheds light on a troubling law enforcement practice called \u201cparallel construction.\u201d<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11060","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11060"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11060\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}