{"id":9570,"date":"2015-11-16T12:10:24","date_gmt":"2015-11-16T18:10:24","guid":{"rendered":"http:\/\/hcstx.org\/?p=9570"},"modified":"2015-11-16T12:10:24","modified_gmt":"2015-11-16T18:10:24","slug":"where-americans-can-be-tracked-without-a-warrant","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/11\/16\/where-americans-can-be-tracked-without-a-warrant\/","title":{"rendered":"Where Americans Can Be Tracked Without A Warrant"},"content":{"rendered":"<p><em><strong>Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via &#8220;Dark Comms&#8221; or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the &#8220;Surveillance&#8221; net wider to compensate, meaning more civilians will most likely start being monitored as a result. Stay Alert.-SF<\/strong><\/em><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-9571\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/11\/nextgov-large.jpg\" alt=\"nextgov-large\" width=\"620\" height=\"284\" \/><\/p>\n<p>Smartphones handle the jobs of many other objects: walkie-talkies, calculators, cameras. They pretend to be landlines and laptops and lightbulbs. They accomplish much of this multi-purposeness by tying into networks far vaster than any single device: into the GPS network, into the Internet, and into the cell network.<\/p>\n<p>Many Americans don\u2019t know that as they tote their phone around,\u00a0<a href=\"https:\/\/www.propublica.org\/article\/verizons-zombie-cookie-gets-new-life\">some of those networks are watching<\/a>. The cell network, specifically, creates a kind of record as a phone goes about its day.\u00a0Every time a phone takes a call, exchanges a text, or uses an app to access the Internet, the cell provider takes notes, generating what\u2019s called \u201ccell site location information,\u201d or CSLI. It records which cell tower was pinged by the phone, when that happened, and what direction its signal was coming from\u2014and sometimes more information than that, too, depending on the newness of the phone and the tower.<\/p>\n<p>Right now, in much of the U.S., law-enforcement agencies can access any CSLI from the past without getting a warrant. This is an extremely common practice: Between January and June 2015, Verizon said it received more than 20,000 of these police requests for location information nationwide. And in all of 2014, AT&amp;T got more than 64,000 similar requests, or about 177 requests per day.<\/p>\n<p>As I wrote in August,\u00a0<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2015\/08\/warrantless-cell-phone-location-tracking\/400775\/\">the legal status of CSLI is messy<\/a>. There\u2019s multiple kinds of CSLI, for one: Authorities often don\u2019t need a warrant to see where your phone was yesterday (which is \u201chistorical CSLI\u201d), but they\u00a0<em>do<\/em>\u00a0need one to find out where you phone is right now (a.k.a., \u201creal-time CSLI\u201d).<\/p>\n<p>Read the Remainder at<strong><a href=\"http:\/\/www.nextgov.com\/mobile\/2015\/11\/where-americans-can-be-tracked-without-warrant\/123639\/?oref=defenseone_today_nl\"> NextGov<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via &#8220;Dark Comms&#8221; or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the &#8220;Surveillance&#8221; net wider to compensate, meaning more&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,13,1317,883,2378,1814,1132,1189,65,10],"tags":[2992,2993,2994,2995,2996,2997,1083,1684,2998],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9570"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=9570"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9570\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=9570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=9570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=9570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}