Google Search

Tuesday, August 7, 2012

Judge says it's OK to use your seized phone to impersonate you and entrap your friends



By Cory Doctorow

A federal judge has upheld the practice of police using seized phones to impersonate their owners, reading messages and sending sending entrapping replies to contacts in the phone's memory, without a warrant. The judge reasoned that constitutional privacy rights don't apply to messages if they appear on a seized device -- even if the messages originated with someone who has not been arrested or is under suspicion of any crime:
A federal appeals court held that the pager owner's Fourth Amendment rights against unreasonable search and seizure were not violated because the pager is "nothing more than a contemporary receptacle for telephone numbers," akin to an address book. The court also held that someone who sends his phone number to a pager has no reasonable expectation of privacy because he can't be sure that the pager will be in the hands of its owner.

Judge Penoyar said that the same reasoning applies to text messages sent to an iPhone. While text messages may be legally protected in transit, he argued that they lose privacy protections once they have been delivered to a target device in the hands of the police. He claimed that the same rule applied to letters and e-mail. (Police would still need to seize or search a phone or computer legally, and phones are much easier for cops to seize than computers, which generally require a warrant.)

"On his own iPhone, on his own computer, or in the process of electronic transit, Hinton's communications are shielded by our constitutions," he wrote, referring to both the state and federal constitutions. "But after their arrival, Hinton's text messages on Lee's iPhone were no longer private or deserving of constitutional protection." Penoyar rejected Roden's privacy arguments on similar grounds.

It's legal: cops seize cell phone, impersonate owner

(function(d, s, id) {var js, fjs = d.getElementsByTagName(s)[0];if (d.getElementById(id)) return;js = d.createElement(s); js.id = id;js.src = "//connect.facebook.net/en_US/all.js#xfbml=1";fjs.parentNode.insertBefore(js, fjs);}(document, 'script', 'facebook-jssdk'));

Latest Big Brother/Orwellian
- Sandra Cortez's Ordeal: Once You're On The Terrorist "Watch List," You Can't Get Off
- TSA Agents Allegedly Strip-Search Woman, Fiddle with Feeding Tube
- TSA TROUBLE: Disabled Man Points Finger At TSA
- Australian Government Moves to Expand Surveillance Powers
- Pro-Copyright Judges Never Drop Cases Over Conflicts, So Why Does Megaupload Judge Have To Step Down?
- DOJ Tries To Explain How It Can Get Around Requirement To Serve Megaupload In The US
- FDA Spied On Emails To Try To Silence Critics
- TSA agents to staff UK airports during Olympics

This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (found at the U.S. Copyright Office) and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.
About Us - Disclaimer - Privacy Policy



View the original article here