'Going Dark' Is Bullshit, Says Yet Another Report Detailing All The Ways Law Enforcement Can Obtain Evidence

from the in-the-land-of-the-deliberately-blind,-the-no-eyed-agitator-is-king dept

Going dark” is a “problem” that appears to be localized almost entirely at the federal level. While numerous options have presented themselves over the years, the FBI, DOJ, and the president’s law enforcement commission continue to claim encryption poses insurmountable problems to law enforcement. With the exception of one Manhattan prosecutor, no one else seems to believe encryption is much of a problem.

Encryption may be limiting access to the contents of a few devices and a handful of IMs, but it’s really not stopping investigators from securing evidence or prosecutors from securing convictions. Time after time after time after time it’s been pointed out a wealth of options are available to law enforcement. And every new iteration of “smart” things just gives them more. Encrypted phones may eliminate the most direct route to evidence, but the number of workarounds is nearly infinite.

People are tracking their movements and actions with more accuracy than ever. Smart meters track utility use with an intense amount of detail. Citizens are installing cameras in their homes and granting access to devices that record their conversations and log their interactions with any number of services. The only way the FBI, DOJ, et al can say anything is “dark” is if they’re walking around with their eyes closed. And that appears to be the case.

Yet another lengthy report on the “golden age of surveillance” has been released, highlighting the surveillance side doors available to law enforcement if the “front door” appears to be locked. “We can’t get any evidence!” claim consecutive FBI directors, pointing to the agency’s uncounted pile of locked devices.

Meanwhile:

In New Hampshire, for instance, a man was accused of shooting his brother in the arm in a dispute in a driveway. Footage of the altercation was captured by several Ring cameras owned by neighbors, who provided their footage to police. A judge allowed audio of the incident to come in, ruling that the defendant should have expected the driveway communications between himself and his brother to be publicly exposed.

Connected devices have also been used to contradict an account of events. A Pennsylvania woman who alleged she was raped was later charged with making false statements and tampering with evidence after Fitbit data she voluntarily provided to police suggested she had been moving around her home during the time she claimed to be asleep.

In other instances, police have obtained warrants to access data from connected devices. In Arkansas, unusual water usage tracked by a smart meter was used to substantiate claims that a defendant attempted to clean up a murder scene. Prosecutors also sought to obtain a warrant for recordings of the defendant’s Amazon Echo, but the man eventually voluntarily disclosed the recordings.

And in the case of a Connecticut man currently facing trial for the murder of his wife, police have obtained warrants for the victim’s Fitbit and several other connected devices throughout the house that revealed movements and other information contradicting his account of events.

That’s just a small part of the Brennan Center’s report, which covers nearly every evidentiary avenue law enforcement has access to, as well as the concerns raised by always-on surveillance… even if citizens are willingly participating in their own surveillance. There’s a lot of Fourth Amendment questions yet to be answered, but a lot of the answers will come down to whether or not courts view willingly sharing data with companies the same as willingly sharing it with the government.

Any law enforcement official complaining about encryption is being disingenuous. The lack of direct access to things sought by warrants isn’t the same as working blindly in the dark. Cops have tons of options they’ve never had before — options that replace jackboots on the ground, mind-numbingly long stakeouts, and hanging out in a nondescript van hoping to overhear something incriminating. The investigative cost — at least in terms of personnel and man hours — has steadily been decreasing. Reams of data are often only a subpoena away. And for a few thousand dollars, private contractors are on tap to turn data firehoses into useful streams of information.

How many attack vectors are there for evidence? An insane amount. Onboard vehicle communication systems like OnStar have eavesdropped on conversations for years. The addition of Bluetooth connections to in-car entertainment systems has provided another point of access for data that may otherwise be locked inside an encrypted phone. Built-in navigation systems track drivers and their favorite destinations.

Smart gadgets in homes record conversations, track movements, and give investigators clues as to whether anyone was in a home at certain points in time. Fitbits and similar devices track people’s movements in areas where cars can’t go. They also provide handy biometric info that has never been available to investigators prior to this point in time.

And that only covers the surveillance citizens aim at themselves. Law enforcement has plenty of always-on options of its own that provide it streams of useful data and evidence investigators need no warrants to access. Agencies have augmented their aerial surveillance with powerful cameras capable of tracking movements across entire cities. Low-cost drones provide more aerial surveillance without the expense of keeping manned aircraft aloft. Millions of license plate records are gathered every day by thousands of plate readers. Interlinked databases allow law enforcement to track people’s movements across the country if need be.

Then there’s the more personally-invasive efforts. Cops are using cheap facial recognition tech to identify suspects and seem largely unconcerned when the software picks the wrong person out of the lineup. Entire communities are subjected to additional scrutiny thanks to flawed analytic systems that turn garbage, racist data into “predictions” about upcoming criminal activity. And this tech is being introduced to schools, turning minors with their whole lives ahead of them into minors whose future has been predetermined by an Excel spreadsheet.

This hasn’t replaced anything law enforcement has already had warrantless access to, like utility records, trash pulls, pole-mounted camera footage, etc. This is in addition. To claim the only useful evidence hides in the static storage of a locked phone is bullshit. To their credit, most law enforcement agencies realize this. It’s only those up top pretending this isn’t the case.

Filed Under: , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “'Going Dark' Is Bullshit, Says Yet Another Report Detailing All The Ways Law Enforcement Can Obtain Evidence”

Subscribe: RSS Leave a comment
13 Comments

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

James Burkhardt (profile) says:

Re: Re: FIRST ZOMBIE OF THE YEAR!

You see, 7-10 years ago mike was so concerned he was being exposed by OOTB and created a bunch of sockpuppet accounts to astroturf support for Techdirt’s positions. Then he did nothing with them for years so they would seem like long time supporters until the exposure got to be too much and he finally started making a tepid post or two.

Astroturfing!

/Sarcasm

This comment has been flagged by the community. Click here to show it.

Antibody to the Techdirt plague says:

January 6, 2021. It's not the 1950s when only in novels, kids!

Every time police use "high-tech" surveillance, it’s as though Techdirt just woke up from last century and is SHOCKED.

Meanwhile, never a word of objection to GOOGLE and FACEBOOK gathering every bit of information that can, never a mention that they too provide "law enforcement" with it.

Techdirt loves surveillance capitalism but foolishly, childishly, believes it has no drawbacks for them.

bhull242 (profile) says:

Re: January 6, 2021. It's not the 1950s when only in novels, kid

Every time police use "high-tech" surveillance, it’s as though Techdirt just woke up from last century and is SHOCKED.

No. As noted, this is just another report that shows that law enforcement isn’t going dark like the Feds like to claim. It says so right in the article. The headline even says “‘Going Dark’ Is Bullshit, Says Yet Another Report Detailing All The Ways Law Enforcement Can Obtain Evidence” (emphasis added). Seriously, you couldn’t even read the headline?

The entire tone of the article is that this is just another piece of evidence that supports what we already knew.

Meanwhile, never a word of objection to GOOGLE and FACEBOOK gathering every bit of information that can, never a mention that they too provide "law enforcement" with it.

Seriously, are you new here? There’s been a lot of discussion about that on this site. It doesn’t get discussed as often only because little new really happens there. If there’s a new report/incident, they cover it.

Techdirt loves surveillance capitalism but foolishly, childishly, believes it has no drawbacks for them.

Again, they have expressly said otherwise.

ECA (profile) says:

Anyone get the idea,

That most of these agencies, have forgotten that there are TECH people out in the world that could make their Lives easier?

In ALL of this, there is a strange fact. You need permission/warrant, to do something LEGALLY that can be taken to court.
Illegally, there is very little restriction. as long as its not required in court.
And this is about HOW the old system worked.

ECA (profile) says:

Re: Fixed.

I love understanding and living thru the Old tech days, and watching Programmers TRY to keep their Programs LOCKED and Un-pirated.
The Hardest program protection took 2 years to crack on a floppy disk.
It was a very interesting trick. They gave each sector and error, then gave Each Track an error. And the raw game was in the center. The Protection check, only looked out tot he disk, randomly look at a track.sector, to see if there was an error.
The hardest part was that you had to Find the Program(all of it) even if it was on one of those track/sectors. And you couldnt tell if you had it all. There was no encoding on the program, it just had an error check, but we couldnt read the disk to make sure until we could read EAch track/sector to make sure there wasnt any program there.

The hard part for any of these agencies is 2 parts.
What they did, and could do in the past, and trying to do the same NOW.
Then thinking that Digital makes it any worse. And not needing to learn the OLD WAYS.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...