Daily Archives: August 11, 2019

HuffPo: Newark’s Surveillance System Puts Communities Of Color Under Constant Watch

HuffPo: Newark’s Surveillance System Puts Communities Of Color Under Constant Watch by Kiara Alfonseca: The Citizen Virtual Patrol, a 24/7 public surveillance system, lets anyone watch the city’s streets from anywhere at any time, through as many as 127 cameras.

Posted in Pole cameras, Surveillance technology | Comments Off on HuffPo: Newark’s Surveillance System Puts Communities Of Color Under Constant Watch

CNBC: Amazon is developing high-tech surveillance tools for an eager customer: America’s police

CNBC: Amazon is developing high-tech surveillance tools for an eager customer: America’s police by John Schuppe: Amazon’s Ring subsidiary doesn’t just make the wireless security cameras — it also accesses police data to alert residents of potential crimes, encourages users … Continue reading

Posted in Surveillance technology | Comments Off on CNBC: Amazon is developing high-tech surveillance tools for an eager customer: America’s police

Wired: Hackers Could Decrypt Your GSM Phone Calls

Wired: Hackers Could Decrypt Your GSM Phone Calls by Lily Hay Newman: Most mobile calls around the world are made over the Global System for Mobile Communications standard; in the US, GSM underpins any call made over AT&T or T-Mobile’s … Continue reading

Posted in Cell phones, Surveillance technology | Comments Off on Wired: Hackers Could Decrypt Your GSM Phone Calls

Quartz: A California police robot is flagging “blacklisted” people and cars

Quartz: A California police robot is flagging “blacklisted” people and cars by Justin Rohrlich: An autonomous police robot patrolling the streets of Huntington Park, California is scanning license plates, logging IP addresses, and using facial recognition technology that alerts cops … Continue reading

Posted in Surveillance technology | Comments Off on Quartz: A California police robot is flagging “blacklisted” people and cars

Reason: No Probable Cause Required for Cops To Access User Data From Popular Apps

Reason: No Probable Cause Required for Cops To Access User Data From Popular Apps by Ben McDonald: Only three states require police to obtain a warrant before requesting private user data from companies.

Posted in Social media warrants | Comments Off on Reason: No Probable Cause Required for Cops To Access User Data From Popular Apps

OH2: No RS for stop of driver parked in car in Wendy’s parking lot at 1pm that others came up to

There was no reasonable suspicion of drug activity with defendant’s car in a Wendy’s parking lot at 1 pm. An anonymous caller concerned about “drug activity” called the police and reported that people walked up to the car, talked to … Continue reading

Posted in Reasonable suspicion | Comments Off on OH2: No RS for stop of driver parked in car in Wendy’s parking lot at 1pm that others came up to

CA2: Govt doesn’t get GFE in forfeiture search and seizure for overbreadth and particularity problem it created

In a forfeiture case initiated with a search warrant, defects in the warrant process denied the government resort to the good faith exception for failure to apprise all the officers what they were looking for and not attaching exhibits to … Continue reading

Posted in Forfeiture, Good faith exception, Overbreadth, Particularity | Comments Off on CA2: Govt doesn’t get GFE in forfeiture search and seizure for overbreadth and particularity problem it created

D.Kan. Throwing a pouch onto a roof when climbing a fence in flight from the police is abandonment

Throwing a black pouch onto the roof of a building in flight from the police as he climbed over a fence was abandonment. United States v. Gaines, 2019 U.S. Dist. LEXIS 134303 (D. Kan. Aug. 9, 2019).* The search warrant … Continue reading

Posted in Abandonment, Scope of search | Comments Off on D.Kan. Throwing a pouch onto a roof when climbing a fence in flight from the police is abandonment

D.Kan.: Recusal motion can’t be used as subterfuge just to get rehearing of denied motion to suppress

This second recusal motion looks like defendant is just trying to get rehearing of the denial of his motion to suppress in front of a different judge, and it’s denied. United States v. Williamson, 2019 U.S. Dist. LEXIS 133111 (D. … Continue reading

Posted in Reasonable suspicion, Staleness, Suppression hearings | Comments Off on D.Kan.: Recusal motion can’t be used as subterfuge just to get rehearing of denied motion to suppress

OH10: Carpenter not shown to be retroactive for post-conviction purposes

Defendant’s post-conviction petition seeking to apply Carpenter is denied. It’s a successor petition and untimely, and Carpenter isn’t shown to be retroactive. State v. Teitelbaum, 2019-Ohio-3175, 2019 Ohio App. LEXIS 3268 (10th Dist. Aug. 8, 2019).* Defendant consented to talk … Continue reading

Posted in Cell site location information, Consent | Comments Off on OH10: Carpenter not shown to be retroactive for post-conviction purposes

CA11: Officer has discretion to let another take vehicle or impound it with inventory, and he can change his mind

Allowing defendant’s vehicle to be taken by another instead of impounding it was within the officer’s discretion. At first he said he would do that, then changed his mind. That doesn’t make the inventory unreasonable. United States v. Sibert, 2019 … Continue reading

Posted in Informant hearsay, Inventory | Comments Off on CA11: Officer has discretion to let another take vehicle or impound it with inventory, and he can change his mind

CA9: Info of illegal search was put into second SW affidavit and independent PC was shown

In a felon in possession case, there was a prior illegal search by state troopers. ATF picked up the case immediately and applied for a search warrant that included the information from the illegal search, and there was independent evidence … Continue reading

Posted in Independent source, Plain view, feel, smell, Reasonableness | Comments Off on CA9: Info of illegal search was put into second SW affidavit and independent PC was shown

Vice: These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

Vice: These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer by Joseph Cox: It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your … Continue reading

Posted in Surveillance technology | Comments Off on Vice: These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

LA4: Def has no REP in his shooting victim’s Instagram account

Defendant was accused of a murder. The state got a search warrant for the victim’s Instagram account, and he moved to suppress. [Remember, Louisiana gives broad standing, but, still] He has no reasonable expectation of privacy in the place searched. … Continue reading

Posted in Social media warrants, Stop and frisk | Comments Off on LA4: Def has no REP in his shooting victim’s Instagram account

WSJ: When battlefield surveillance comes to your town

WSJ: When battlefield surveillance comes to your town by Christopher Mims: All-seeing 24/7 video surveillance technology, first developed for use in war, is now affordable enough to be used domestically to fight crime and terrorism. Some lawmakers are wary.

Posted in Surveillance technology | Comments Off on WSJ: When battlefield surveillance comes to your town