Federal Prosecutors Encouraging Localities to “Cast a Bigger .Net”

Screen Shot 2014-12-02 at 10.04.17 AM Last month, Ars Tecnica reported on the Federal role in encouraging a data sharing agreement among a number of Virginia localities called the Hampton Roads Telephone Analysis Sharing Network.

The idea behind the program was to help localities do more sophisticated data analysis, both by (apparently) bringing the overall cost paid — both to telecoms, but also for shared licenses for the analytical software — down, but also by training and providing them with more sophisticated analytical tools. The article relied on a presentation liberated under open records act showing that this sharing was proposed by an investigative analyst in the Eastern District of VA US Attorney’s office.

One thing the presentation emphasized was how the latest version of the Lincoln Pen-Link software would permit the police departments to “cast a bigger .net” than earlier versions. It pointed to the advent of smart phones and asked,

If law enforcement intercepted just the telephone aspect of your “communication device” what would we be missing?

The next slide answers that question: the cops would be missing “Internet intercepts.” That is, in addition to telephone calls and text messages (plus some things no one uses anymore), it would be missing:

  • VoIP
  • Email
  • Instant messaging
  • Chats/forums/blogs
  • File transfers/file sharing
  • Video conferencing
  • Web cam

Another slide boasts that Pen-Link 8 can conduct:

  • Mobile intelligence
  • GPS mapping
  • Internet investigations
  • Digital multimedia
  • Live electronic surveillance
  • Statistical and graphical analysis

I note this not just to raise concerns about the intrusive tools local cops are using to hunt drug dealers. But also to reiterate a point I made about USA Freedom Act.

We know, from documents like this and from Hemisphere, that federal law enforcement officials are using and encouraging localities to use CALEA equipment to obtain and analyze not just phone call metadata, but a whole slew of other things available via smart phones. Not just calls, but location and email and VOIP and phone cam information.

Call me crazy, but I think that suggests there is less than zero chance that they are also not also using these authorities under FISA to pursue terrorists and spies. And (as I’ll show later) because they claim (and FISC permits them to claim) the Fourth Amendment is weaker for national security investigations, they do it with a much weaker standard of suspicion.

When the government adopts — and Congress ratifies — the notion of “connection chaining” via smart phones, there is a very very high likelihood this is the kind of analysis they are engaging in.

image_print
2 replies
  1. orionATL says:

    “..I note this not just to raise concerns about the intrusive tools local cops are using to hunt drug dealers…”

    who says local cops are using these technological crime-buster tools for hunting drug dealers (or solely for such):

    plan and “execute” swat raids?

    seize legal bank account withdrawals – so the cops can steal the money to place it into local gov treasury, pay themselves bonuses, buy suped-up gunnery, military equipment.

    my suspicion is that the fbi/dea/ice are encouraging local cops to work with them to overcome historic local resistance. they are doing this by dangling money in front of small town (or non-metropolitan) police forces.

  2. Anon says:

    Marcy do you think that it is also possible that they are encouraging localities to get it as a way of doing an end run around their own limitations? If a local cop shop decides to collect data and then launders it through the local “fusion center” then the details of its collection are not necessarily an issue in a federal court or at least not as easy for a federal suspect to track down. At that point it just becomes a clean part of the mosaic.

Comments are closed.