Tag Archives: network

Government Can Track Cellphones Without Warrants

Mostly everyone has a cell phone.  A lot of smartphones have GPS capabilities.  This can be handy when you are looking for directions and you are lost.  However, what about being tracked?  For instance, unless you change your privacy settings, your photos will keep track of where you took the picture and what time.

The question the Fifth Circuit Court of Appeals decided is whether the government needs a warrant to track you.  In In re: Application of the U.S.A. for Historical Cell Site Data (July 30, 2013 5th Cir. Ct.), the court ruled that obtaining cell-location information without a warrant  did not violate the Fourth Amendment.

When we think of the Fourth Amendment we remember that a search and seizure may require a warrant.  If there is no expectation of privacy, i.e. in a garbage bag we got rid of, then the government wouldn’t need a warrant.  However, if we have an expectation of privacy, i.e. to enter your house, then the government must have a warrant.

An expectation of privacy usually is the crux of a search and seizure case.  Here, the ACLU argued that people have a reasonable expectation of privacy when they are being tracked for a long period of time and the data gathered is collected in great detail.

In this case, this argument was not discussed by the court.

Why would this not be discussed?  The Fourth Amendment deals with government actions.  In other words,  the seizure or search has to be collected by the government.  In a similar case, the Supreme Court had decided that the government must obtain a warrant if it wants to install a GPS tracking device.  See United States v. Jones (2012).

However, this case was found to be different.  The reason for this is because the Fifth Circuit Court of Appeals found that the information was collected by a third-party, i.e. the cell phone carrier.  The court explained,

Where a third party collects information in the first instance for its own purposes, the Government claims that it can obtain this information later with a [section] 2703(d) order, just as it can subpoena other records of a private entity.  We agree.

Id. (citations omitted).

Here, the government was not installing a GPS tracking device.  The Government was accessing a business record owned by carriers.  The court stated:

… cell site information is clearly a business record.  The cell service provider collects and stores historical cell site data for its own business purposes, perhaps to monitor or optimize service on its network or to accurately bill its customers for the segments of its network that they use.   The Government does not require service providers to record this information or store it.  The providers control what they record and how long these records are retained.

Consequently, the court found that the Government did not need a warrant.

via Cops Can Track Cellphones Without Warrants, Appeals Court Rules | Threat Level | Wired.com.

Advertisements

Leave a comment

Filed under civil rights, courts, discovery, electronic discovery, federal, legal decision, legal research, Privacy Rights, technology

Wireless networks and the FCC

The Federal Communication Commission has proposed the creation of the Advanced Wireless Services (AWS) H Block, which would extend the Personal Communications Services (PCS) band by 10 megahertz, for flexible use. The PCS is heavily used by Verizon, Sprint, AT&T and T-Mobile, the nations big four providers, as well as their rural counterparts.

The additional spectrum is meant to help maintain the speed and capacity of the nations wireless networks amid the unprecedented demand for mobile service.

If approved, the new rule would mark the FCCs first step in implementing a Congressional directive in the Middle Class Tax Relief and Job Creation Act of 2012, more widely known as the “payroll tax cut.”  The act calls for an establishment of a national public safety broadband network, which will expand high-speed wireless broadband and give better access to first responders, such as fire and police, in an emergency.

“Wireless broadband is a key component of economic growth, job creation and global competitiveness because consumers are increasingly using wireless broadband services to assist them in their everyday lives,” the FCC said in its bandwidth proposal.

The FCC plans to grant new initial licenses for the 1915-1920 MHz and 1995-2000 MHz bands, known as the lower H block and the upper H block, respectively. A system of competitive bidding will determine who is granted the commercial use licenses.

The plan to extend the bandwidth includes licensing the H block as paired five-megahertz blocks, with the upper block used for high-power base stations and the lower block for mobile and low power fixed operations. The licensing will also be based on a geographic and economic area scheme.

“We seek to adopt a service area size for the H Block that meets several statutory goals,” the FCC said in its bandwidth proposal. “These include facilitating access to spectrum by both small and large providers, providing for the efficient use of the spectrum, encouraging deployment of wireless broadband services to consumers, especially those in rural areas, and promoting investment in and rapid deployment of new technologies and services consistent with our obligations under section 309j of the Communications Act.”

via Courthouse News Service.

Leave a comment

Filed under Uncategorized

Proposed “Cloud Computing Act of 2012”

Sen. Amy Klobuchar has introduced a new bill, the “Cloud Computing Act of 2012” (S.3569), that purports to “improve the enforcement of criminal and civil law with respect to cloud computing.”

The Cloud Computing Act seeks to amend 18 USC 1030 by purporting:

  • It is a separate offense to have unauthorized access (including exceeding the authorized access) to a cloud computing account, or even conspiring to have unauthorized access.
  • Defining “cloud computing account” as “information stored on a cloud computing service that requires a password or similar information to access and is attributable to an individual”
  • Defining “cloud computing service” as a service that “enables convenient, on-demand network access to a shared pool of configurable computing resources (including networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or interaction by the provider of the service.”
  • The losses are (1) the value of the loss of use, information, or aggregated loss to 1 or more persons; or (2) the product obtained by multiplying the number of cloud computing accounts accessed by $500.”

As a reminder, 18 USC 1030, a person who acts or conspires to act in violation of the Act is to be

  • (1) fined or imprisoned for not more than 10 years or both, when the conviction does not occur after another offense under the section; or
  • (2) fined or imprisoned for not more than 20 years or both, when the conviction occurs after another offense

 

The problems with this proposed bill are alarming due to the vagueness of the definitions.  In employment, I can see this Act (if it goes through) being used against employees.

For example, say if your authorized access is limited to “work” use.  If an employee uses the computer network to go to a social network, how would this pan out?  The employee, in this case, uses a password to get into the network of the employer.

Or say that authorized access is limited to using email for work purposes only.  What if the employee sends a personal email or an email to an attorney using the work email?  The email account is, after all, protected by a password and it is in the alleged protected network of the employer.

Or say that authorized access is limited to accessing the email at work.  Yet, the employee and other employees, and say even management, use their smartphones to keep up with work.

I can see potential issues in employment law, where the situation does not arise out of the purported intent of the Act.  None of these cases involve a person getting into a network or service to steal information.  None of these cases involve a disgruntled employee accessing information they are not supposed to have access to.

It is my guess that if the Act gets through, there will be a need for a lot of updates on employee policies, manuals, and trainings.

3 Comments

Filed under Pending Legislation, technology