White House Report: U.S. Wire taps that occur without warrants and where security organization clearly violates privacy laws!

fitz-the-wire

Fitz: “What’s up, hotshot?”

McNulty: “I got a technical question. Remember those analog units we used to use to pull cell numbers out of the air? The C.F. something-something”

Fitz: “Yeah, Cell Frequency Identification Device”.

McNulty: “The triggerfish, yeah”.

Fitz: “That one, it could flag a number. Right, but the old analog machines? We used to have to follow the guy around stay close while he used the phone New digitals bing, we just pull the number right off the cell towers”.

McNulty: “So, you got any down out at Woodlawn that daddy can borrow?”

Fitz: “What about yours? – What? City has three of ’em, I remember right.

Homeland security grant sent ’em to you every big county department in the state”

McNulty: “No fucking way. Thanks” (the Wire season 3 episode 11, 2004).

Well, so there we have it, the U.S. Security Organization that are working tirelessly to protect and arrest criminals. On the way to do so, there are questions being made and questionable approaches made by the Security Agencies as they are using technology not to attain information on their possible suspects, but at the same time going into the privacy of innocent civilians. In this way by monitoring areas where well-known criminals are staying and taking information on bystanders and such; these acts can violate their trust in the security agencies as they are using this level of intelligence to attain the suspects. This can also be seen as a violation of the Fourth Amendment as they have rights who protect innocent civilian’s privacy. At the same time, the security agencies need technics to able to get intelligence on their suspects. This is the real-life The Wire and here is what I collected for the recently dropped White House report on the matter.

“[P]eople have a reasonable expectation that their cell phones will not be used as real-time tracking devices by law enforcement, and – recognizing that the Fourth Amendment protects people and not simply areas – that people have an objectively reasonable expectation of privacy in real-time cell phone location information. Thus, we hold that the use of a cell site simulator requires a valid search warrant, or an order satisfying the constitutional requisites of a warrant, unless an established exception to the warrant requirement applies” (U.S. Committee, 2016, P: 30).

“The Department of Justice has 310 cell-site simulation devices and spent more than $71 million in fiscal years 2010-14 on cell-site simulation technology” (…) “The Department of Homeland Security has 124 cell-site simulation devices and spent more than $24 million in fiscal years 2010-14 on cell-site simulation technology” (U.S. Committee, 2016 P:5).

“Cell-site simulators are devices that effectively transform a cell phone into a real time tracking device. A cell-site simulator—also known as an “IMSI catcher”—is a device that mimics a cell phone tower. These devices are commonly referred to as “Stingrays,” which is both a generic name and also refers to a specific type of IMSI catcher that is manufactured by the Harris Corporation. When the device is activated, cell phones in the surrounding area connect to the device in a similar way that the cell phones would connect to a cell tower. Once a phone connects to the cell-site simulator, the device is capable of obtaining specific identifying information for the phone, including information that enables law enforcement to determine the location of the phone and, more importantly, its user” (U.S. Committee, 2016 P: 7).

“From April to August 2015, Committee staff met with the component agencies and officials from DOJ and DHS leadership; from those meetings, two things became clear: (1) use of these devices was widespread; and (2) there was a lack of uniformity across the agencies regarding what court authority was required to deploy cell-site simulation technology under different operating scenarios” (U.S. Committee, 2016 P: 8).

danbury-cease-and-desist-threat-jpeg-page-two

No Warrant before the surveillance:

“The Committee obtained information from federal, state, and local law enforcement that shows the majority of situations where a cell-site simulator is deployed involve the search for a specific, known cell phone. In this scenario, law enforcement first obtains the target cell phone’s number through traditional investigative methods. Once the target cell phone number is ascertained, law enforcement generally obtains the IMSI number that is associated with that cell phone number from the cellular service provider. A warrant is generally not a prerequisite to requesting the IMSI number from the service provider; in many instances, law enforcement obtains the IMSI number by issuing an administrative subpoena to a cell phone service provider” (U.S. Committee, 2016, P: 11).

Bystanders caught monitored to find the criminal phone:

“Whenever a cell-site simulator is deployed, there are collateral consequences for the non-target phones in the area. While searching for the target phone, the simulator will also make contact with other, non-target cell phones that happen to be within range of the simulator device, even if those phones’ owners are innocent bystanders who are not suspected of any criminal wrongdoing. The simulator identifies and collects these non-target phones’ unique identifiers as well. When searching for a specific IMSI number, the device identifies and drops contact with the non-targeted phones within a few seconds” (U.S. Committee, 2016, P: 12).

Difference between home and in public:

“During the course of the Committee’s investigation, it became clear the FBI was drawing a distinction between deploying cell-site simulators on targets in public places and deploying the devices to collect information when a person was in a private space, such as a home. If the device were to be deployed to detect a person when they were believed to be in their home, the FBI would obtain a warrant. When an individual was believed to be on a street or some other public space, however, the FBI relied upon an order under the Pen Register Statute” (U.S. Committee, 2016, P: 21).

IRS use of Cell phone surveillance:

“For each of the 37 investigations that the IRS reported using a cell-site simulator, the agency reported that it worked with an Assistant United States Attorney or State Prosecutor, and obtained “an order or a warrant” based on a finding of probable cause in 36 instances. On one occasion out of the 37, the IRS obtained authorization to deploy a cell-site simulator by obtaining an order pursuant to the Pen Register Statute. Ten of the federal cases resulted in indictments. Indictments were obtained in every instance where the IRS assisted a state or local police department’s investigation” (U.S. Committee, 2016, P: 25).

Use of the Technology in ill-intent:

“Cell-site simulator use inside the United States raises far-reaching issues concerning the use, extent, and legality of government surveillance authority. While the Committee’s investigation and hearing focused on law enforcement’s use of these devices, non-law enforcement and/or foreign government use of cell-site simulation technology also raises serious concerns” (…) “Law enforcement agencies are not the only groups who may use cell-site simulation technology. It is possible, if not likely, bad actors will use these devices to further their aims. Criminals and spies, however, will not be adopting the DOJ and DHS policies and procedures or any other ethics of surveillance. They will not be self-limiting in their use of these devices so as to not capture the content of others’ conversations. Criminals could use these devices to track potential victims or even members of law enforcement. One can imagine scenarios where criminals or foreign agents use this type of technology to intercept text messages and voice calls of law enforcement, corporate CEOs, or elected officials” (U.S. Committee, 2016, P: 33).

pen-register-2014

Conclusion:

“In circumstances involving dramatic technological change, the best solution to privacy concerns may be legislative. A legislative body is well situated to gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way” (U.S. Committee, 2016, P: 35)

With this in mind, the reality is that sometimes the U.S. Police Officers and Security Agencies are following innocent civilians in the hunt of criminals. These methods are also done without warrants and therefore done on free-will of the security agencies, which by all means are a violations of privacy of civilians, where the courts haven’t even been noted on the arrangement and the investigations that been done.

This should be scrutinized and should not be put under the rug, as this are common thread and done by government security organization without permission or where they didn’t follow instruction per request of the courts. Therefore the validation of their intelligence could be put under question as they we’re also taking in civilians who wasn’t doing any ill-intent.

Peace.

Reference:

U.S. Committee Staff Report – ‘Law Enforcement Use of Cell-Site Simulation Technologies:

Privacy Concerns and Recommendations’ (19.12.2016) written by Hon. Jason Chaffetz & Hon. Elijah E. Cummings.

FBI Director Comney: No changes from July, concerning the new review found nothing illegal in the Clinton E-Mails (06.11.2016)

fbi-06-11-2016

Out of the Box: The dirty tricks of the Hillary Clinton!

wikileaks-hillary

This is another batch of the leaks happening from WikiLeaks from the PodestaFiles. There been days upon days with new leaks that has happen all through October. Been hard to follow it all and the intelligence you can gather from it in the end, would be how a political machine and election procedures are happening for career politicians like Hillary Clinton. There been some scalps and misgivings in the leak.

Today is a brief spell into the Clinton Foundation first, secondly will be little about the surrogates of Clinton, third on Policy, fourth is on E-Mail Scandal and last Media. These are well-known territory, but I will let the leaks speak for themselves.

  1. On Clinton Foundation:

“Guys – Given the story yesterday about pay equity at the State Department, I wanted to flag something that came out of our research on pay equity at the Foundation. There are huge discrepancies, and it wouldn’t surprise me if they went here next. See a summary below from Karuna” [Ian Mandel to Tony Carrk and Robert Mook “Subject: Fwd: Equal Pay – Foundation” 24th February 2015].

Equal Pay problems in Clinton Foundation:

10 out of the 19 members (52%) of the Clinton Foundation’s Leadership Team, as listed on BHCCF’s website, are women, however only 3 out of the highest paid 11 employees (27%) are women.  The highest paid men average a salary of $294,157.50, while the highest paid women average a salary of $181,576.66, over $100,000 lower than the men. [Clinton Foundation Website, last accessed 12/10/14; Clinton Foundation 990, 2012; Clinton Foundation 990, 2013].

  1. Surrogates:

Use Howard Dean as Surrogate:

“Just watched him on Meet. At this time with Warren and Biden floating around he is the single best voice to speak about HRC as a surrogate. He is measured, thoughtful, talks substance not process, has run himself, the press likes him and he leans left. He was terrific this morning. I strongly suggest you get him out there more” [Gordon Griffin to John Podesta: “Subject: Howard Dean” on 05.08.2015].

Surrogate need advice:

“On April 8, I have gotten hoodwinked into doing Squawk Box on CNBC for 2 hours as a host. I may drag Al along with me. I know I will get tons of questions on the economy, the current fiscal situation, monetary policy, and of course why I’m supporting Hillary. I can’t just say I love her, although I might. What I would like to do is give some personal examples I have as to her effectiveness. But I will also need to comment on her fiscal plans and compare those to Bernie’s and whoever is left in the republican race at that time. Is it possible to get someone to send me some data and research so I can be as persuasive as possible, Thanks so much. Erskine” [Erskine sent to John Podesta on 7th March 2016].

ali-cenar

Turkish funding of DNC:

“John, heard this second hand but more than once. Seems Erdogan faction is making substantial investments in U.S. to counter opposition (CHP, Kurds, Gulenists etc.) outreach to policymakers and USG. Am told that the Erdogan crew also tries to make inroads via donations to Democratic candidates, including yours. Two names that you should be aware of are *Mehmet Celebi* and *Ali Cinar*. Happy to elaborate on the phone, provided you are not shopping at the liquor store” [Michael Werz sent to John Podesta “Subject: Flagging Turkish campaign donations” 19th August 2015].

  1. Policy:

On Cadillac tax:

Very few if any rank and file will be touched by $250K and above. I do think your point about them understanding its repeal is important…so if she says repeal, pauses and says I need some kind of pay for that still relieves this burden on the middle class and therefore folks making over $250K will take the hit…maybe the way to do it? Of course I understand she still has this decision to make” [Nikki Budzinski to Amanda Renteria “Subject: Re: Copy of HRC Memo on Cadillac Tax” on the 25th September 2015].

  1. E-Mail Scandal:

CNN: Email Scandal:

“Hey Nick, I’m writing a story about the formal request Chairman’s Gowdy office sent to David Kendall today asking that Sec. Clinton hand over her email server to the State Dept IG or another independent third party. I’d like to know whether the secretary plans to do so and if she has any response to the letter. I’m on deadline now” [Chris Frates sent to Nick Merrill “Subject: CNN deadline question” 20th March 2015].

Politico: Email Scandal.

One quick follow up– no fingerprints. As you said, there wasn’t a hell of a lot you guys could do after the Schmidt story — the emails were already deleted… etc. What action — OTR — did u advise. What were the decision points. Cheers/Thrush. Glenn Thrush” [Glenn Thrush to John Podesta “Subject: sorry to bother” 5th October 2015].

bernie-sanders

  1. Cozy relationship with Media:

Yahoo Interview:

“Well, I know you had a good weekend! We’ve been working with the campaign folks to reschedule my interview with Secretary Clinton. I wanted to write you about some of the metrics that we are getting and let you know through placement on Facebook we can guarantee 1.5 million views in addition to Yahoo engagement which has been close to 1 million for my political interviews. I’d also like to do a separate piece of business through social media along the lines of “10 things you don’t know about Hillary Clinton” that would showcase her personality and has a lot of viral potential. I know there is a lot of demands on her time, but we have been waiting patiently to schedule something and I’m sure we’ve been driving the campaign staff crazy, but the reach and engagement will be significant and I’m very much looking forward to having the opportunity to talk to her. I have been assured the campaign wants this as well. Can you help make this happen? I’d really appreciate your help” (Katie Couric to John Podesta “Subject: Re: Note from Katie Couric” 22nd February 2016).

monmoth-university

I hope you find these leaks interesting, because they say a lot about the activity and acts of the Clinton Campaign, the relationship they have and how the Democratic Party works. We can see how they together with all Surrogates, Media and others are working. This is important together with internal reports on the payment structure in Clinton Foundation proves the legitimate claims of following old-stereotype payment of men over woman. That deserves to be scrutinized, maybe be another man than me. I am sure that Hannity looks into as we speak (joking). Let’s be clear, this is another day with the same drama, as there aren’t as I’ve seen with today’s leaks many explosives inside the Clinton Campaign team. Still, interesting in the perspective of how they work on the inside. Maybe we will see next time for some more UFO’s and Bernie Sanders bashing Mails again? Peace.

#NeverEndingSaga: FBI Reopens the E-Mail case on Hillary Clinton (28.10.2016)

fbi-28-10-2016

Press Release: U.S. Citizen Deported from Uganda to Face Counterfeiting Charges in Western Pennsylvania (07.12.2015)

Counterfeit-Money

PITTSBURGH—A United States citizen has been deported from the Republic of Uganda and brought to the Western District of Pennsylvania to face charges of leading an international counterfeit currency operation headquartered in that African nation. The announcement was made today by David Hickton, U.S. Attorney for the Western District of Pennsylvania and Eric Zahren, Special Agent in Charge of the U.S. Secret Service—Pittsburgh Field Office.

Ryan Andrew Gustafson, aka Jack Farrel, aka Willy Clock, 28, is charged with conspiracy, conspiracy to launder money, and the passing and receiving of counterfeit money from December 2013 until December 2014. The indictment alleges more than $1.4 million in counterfeit Federal Reserve Notes have been seized and passed worldwide, both overseas and in the U.S. as part of this scheme.

Gustafson had been on trial in Uganda on a number of charges, including possessing counterfeit money. He was deported Dec. 3 and arrived in Pittsburgh on Friday evening. He will be presented before Chief U.S. District Magistrate Maureen Kelly today at 2:30 p.m. for an Initial Appearance. The case is assigned to United States District Judge Mark R. Hornak.

“Identifying, charging and returning Ryan Gustafson to the United States from Uganda required extensive cooperation among diverse international law enforcement partners and expert coordination among the Secret Service, Federal Bureau of Investigation, Homeland Security Investigations and the U.S. Postal Inspection Service,” stated U.S. Attorney Hickton. “As a result, a multimillion dollar international cyber counterfeiting scheme has been disrupted and its principal will face justice on American soil. This investigation demonstrates our relentless resolve to identify cyber criminals overseas and bring them back to the United States to be tried for their crimes.”

“This international counterfeit currency investigation and subsequent arrests illustrate Secret Service expertise in safeguarding the Nation’s financial infrastructure since inception,” said Special Agent in Charge Zahren. “We will continue to work closely with our network of law enforcement partners to dismantle criminal enterprises seeking to victimize innocent victims, regardless of geographic distance or borders. Special thanks to Ugandan law enforcement officials and the United States Embassy Uganda for their assistance.”

“This investigation was an excellent example of a partnership between multiple federal law enforcement agencies across the country and overseas, working together to identify and bring down those responsible for a worldwide conspiracy. The U.S. Postal Inspection Service remains vigilant, pursuing criminals like Gustafson to ensure the public’s trust in a safe and secure mail system.” added Inspector in Charge, Tommy Coke, Pittsburgh Division of the U.S. Postal Inspection Service.

Gustafson, a U.S. citizen residing in Kampala, Uganda, was originally charged by criminal complaint in December 2014. The April 1, 2015, indictment naming Gustafson also charged three additional defendants with conspiracy and conspiracy to launder money from December 2013 until December 2014. Those defendants are:

  • Zackary L. Ruiz, aka Mr. Mouse, 19, of Las Vegas, Nevada, who is pending trial;
  • Jeremy J. Miller, aka Sinner, 31, of Seattle, Washington, who is pending trial; and
  • Michael Q. Lin, aka Mlin, aka Mr. Casino, 21, of Bethlehem, Penn., who pleaded guilty on Nov. 9, and is scheduled to be sentenced on March 16, 2016.

Assistant U.S. Attorney Shardul S. Desai is prosecuting this case on behalf of the government.

U.S. Attorney Hickton commended numerous agencies and organizations for conducting the investigation leading to charges in this case, including the Directorate of Public Prosecution, the Criminal Investigations and Intelligence Department, the Special Investigations and Intelligence Unit, and Stanbic Bank in Uganda; the U.S. Secret Service; the Federal Bureau of Investigation; the U.S. Postal Inspection Service; Homeland Security Investigations; U.S. Customs and Border Protection; and the National Cyber-Forensics & Training Alliance.