Cell Site Location Information

Slides:



Advertisements
Similar presentations
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Advertisements

Criminal Procedure for the Criminal Justice Professional 11th Edition
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
FLORIDA LEGISLATIVE HISTORY RESEARCH Florida Supreme Court Library June 3, 2009.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
SUBPOENAS v. SEARCH WARRANTS: THE CURRENT STATE OF THE LAW AMERICAN BAR ASSOCIATION WHITE COLLAR CRIME NATIONAL INSTITUTE MIAMI, FLORIDA MARCH 6, 2008.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
INTRODUCTION TO THE LAW OF EVIDENCE
Class 7 Internet Privacy Law Your Digital Afterlife.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Class 11 Internet Privacy Law Government Surveillance.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Chapter 17 E-Commerce and Digital Law
Computer Forensics Principles and Practices
Trackstar Navigations Pvt. Ltd. Presenting New Generation GPS Tracking System.
Regulation of Personal Information Sally Brierley & Emma Harvey.
FRONTLINE FERPA Strategies for Compliance with the Family Educational Rights and Privacy Act Prepared by the Office of Legal Affairs Updated November 14,
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
How to Track the Location of a Mobile Phone.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Records Management Reality
Cellular Records Review and Analysis Part 1: AT&T
Protecting PHI & PII 12/30/2017 6:45 AM
SATELLITE AND MOBILE NETWORK COMMUNICATION
Courts System Search Warrants.
Privacy and Social Media
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Cellular Records Review and Analysis Part 1: AT&T
Agenda Who is Sandler Focus on Supporting our Franchisees
Amendments in Action Search and Seizure.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Cell Site Simulators (“CSSs”)
What is it and how does it work?
Chapter 17: E-Contracts and Licensing
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
Application of the Internet
Chapter 12 Accessing Databases
What is it and how does it work?
Chapter 8 Police and Constitutional Law
Wednesday, September 19, 2018 What Is the Internet?
An Introduction to Public Records Office of the General Counsel
Cellular Records Review and Analysis Part 4: T-Mobile
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Targeted surveillance
Overview Asset Location and Tracking, using a Camera Cell Phone. The Rapid ID system will help companies automate and streamline the asset tracking. Rapid.
Social Media And What Not To Share!
Health-e Claims July 2007.
E-Contracts and Internet Law
Introduction to computers
4th Amendment According to the Fourth Amendment, the people have a right “to be secure in their persons, houses, papers and effects, against unreasonable.
Laws Governing Police Surveillance
Analyze The Exclusionary Rule
The University of Adelaide, School of Computer Science
Government Data Practices & Open Meeting Law Overview
Digital Device Searches
Texas Search and Seizure
ShotSpotter, Cellular Data, and the Future of Digital Forensics
Government Data Practices & Open Meeting Law Overview
Sadi R. Antonmattei-Goitia Sullo & Sullo, LLP February 16, 2019
COMPLETE BUSINESS TEXTING SOLUTION
ALPR What is it? Automated license plate readers (“ALPRs”) are computer-controlled, high-speed camera systems that automatically capture images of license.
On-Site Investigations
Presentation transcript:

Cell Site Location Information A cell phone’s location, whether stationary or moving, can be tracked through cell site location information (CSLI) or global positioning system (GPS) data

Cell Site Location Information (“CSLI”) A cell phone is constantly searching for the cell tower with the strongest signal to connect it to the mobile network in order to provide the user with the fastest service. Each time a cell phone connects with a cell tower, the time and duration of that connection is recorded by the cell phone service provider.

Types of CSLI: Cell phone companies store historical and prospective CSLI, along with prospective GPS data, which police may request. Historical data can be used to track past movements. 
 Prospective data allows police to track a phone in real time.

Real-time ”pinging”: In addition to the data a cell phone regularly relays to cell towers, a cell phone may be “pinged” in an emergency to force it to reveal its location to the carrier. “Ping” is another word for “contact” or “connect.” “Pinging” means to send a signal to a particular cell phone and have it respond with the requested data, typically revealing location data for the connected cell towers

Global Positioning System (“GPS”) Tracks a device’s movements using signals received from satellites at set intervals in order to determine a device’s location. The recorded location data may be stored within the device itself, or it may be transmitted to a central location database, or Internet-connected computer, using a cellular (GPRS or SMS), radio, or satellite modem embedded in the device.

Seminal CSLI Case: US v. Carpenter, 585 U.S. ___, 138 S. Ct. 2206 (2018) - SCOTUS held seizure of 7 days or more of historical CSLI is a search requiring a probable cause search warrant and that the third-party doctrine (TPD) does not defeat an individual’s reasonable expectation of privacy  in CSLI.

How do cops get CSLI? Prior to Carpenter, police routinely sought access to CSLI in criminal cases using either 2703(d) order under the Stored Communications Act (18 USC 2701, et seq.) (a “D Order”), or D Order + a pen register/trap and trace order under the Pen Register and Trap and Trace Device Act (18 USC 3121, et seq.); rather than seeking a probable cause warrant.

How do cops get CSLI? Post Carpenter, cops must obtain a probable cause warrant for 7 days or more of historical CSLI. But expect that the government will try to rely on the Leon good faith exception to avoid suppression where they failed to obtain a warrant pre-Carpenter. A number of jurisdictions also require a PC SW for real-time CSLI.

What to look for? Seizure of your client’s cell phone or other digital device with location tracking capabilities such as personal health trackers like Fitbits and Apple watches. Any mention of cell phone extraction software, like Cellebrite, Pen-Trace, Secureview, Oxygen, FTK Imager, Encase, MSAB XRY, or E-fense Helix3. This is not an exhaustive list of all possible ways to indicate the seizure of your client’s CSLI, nor does the appearance of any one factor mean that your client’s CSLI has been seized.

What to look for? Any subpoenas or search warrants addressed to cell phone service providers like AT&T, T-Mobile, Verizon, Sprint, Boost Mobile, MetroPCS, etc. that include location information. Any discovery referring to cell tower location information, GPS data, or cell phone extraction reports that include location information. Any subpoenas or search warrants seeking “accounts associated with the area near” a specified location. This is not an exhaustive list of all possible ways to indicate the seizure of your client’s CSLI, nor does the appearance of any one factor mean that your client’s CSLI has been seized.

How do I challenge CSLI evidence? File a discovery motion requesting the raw data and methodology of seizure. Where law enforcement fails to obtain a probable cause search warrant for CSLI, file a motion to suppress pursuant to US v. Carpenter, 585 U.S. ___, 138 S. Ct. 2206 (2018).

How do I challenge CSLI evidence? Where law enforcement does obtain a warrant for CSLI, refer to our strategies for How to Challenge a Digital Device Search.(eff.org/defense/DDS) Challenge the foundation and authenticity of the proffered CSLI record(s).

How do I challenge CSLI evidence? Rely on more privacy-protective state laws. Many states have enacted statutes requiring a warrant to get CSLI: California, Colorado, Maine, Minnesota, Montana, New Hampshire, New Mexico, and Utah. Other states like Illinois, Indiana, and Maryland, specifically protect real-time CSLI; while Iowa protects GPS location data. The standards for obtaining these types of warrants differs from state to state, along with what kind of CSLI is being sought.

How do I challenge CSLI evidence? California’s CalECPA not only requires law enforcement to obtain a search warrant (CA Penal Code §§ 1546.1) before obtaining CSLI, but also provides for a notice requirement (CA Penal Code section §§ 1546.2) and a statutory suppression remedy (CA Penal Code §§ 638.55, 1546.4) for violation of the state’s warrant requirement.

How do I challenge CSLI evidence? You can learn more about CalECPA by going through this Prezi presentation. And for a peek at what California police are being told about CalECPA, take look at this CA Peace Officers’ Association Fact Sheet on CalECPA.

How do I challenge CSLI evidence? The Florida and New Jersey State Supreme Courts require a warrant for real-time CSLI. A more comprehensive geo-location privacy protection bill was proposed in Illinois, but was vetoed by the Governor in September of 2017.

How do I challenge CSLI evidence? Refer to ACLU’s chart (last updated 10/13/15) for the status of state legislation on locational privacy across the country.

Where do I learn more? Visit: https://eff.org/defense/CSLI Read EFF’s Carpenter amicus brief: https://eff.org/CSLICarpenter Visit EFF’s Cell tracking issue web page: https://eff.org/celltracking   For a review of State CSLI laws:: https://eff.org/CSLIstatelaws  


Stephanie Lacambra Criminal Defense Staff Attorney 415-436-9333 x130 stephanie@eff.org