Since then, it’s almost a decade.Reason Your cell phone is spying on your. Property of the People has discovered a 2019 FBI document. It is from the “Cellular Analysis Survey Team” project.
Investigators are instructed on cell phone surveillance by the 139-slide paper. The document details what information cops may obtain by a subpoena. This includes “call-to-destination search”, “payment information,” and IP addresses. It also explains what warrants require (such as text or a trap/trace to all of the numbers you are calling or receiving calls from). You can refer to it when you ask your mobile service provider to spy upon you. Agents should be aware of details like the number that was called the most in the morning as well as those called the least at night. The police are reminded they can not only find the location of a particular number, but all numbers that have been called near that specific tower.
CAST provides mapping software to assist investigators in visualizing what cell data they have. They warn that they should not take the information to court without it being verified for accuracy. You will find many pointers in the presentation on Google Earth’s use for tracking and identifying places. The surveillance web does not rely on mobile phones. Cops have the option to add “license plates readers” and the original federal tracking device, the Social Security Number, into Google Earth.
This presentation also explains what agents can obtain from Facebook. It includes “basic subscribers information” via subpoena. Also, it contains messages for the past 180 day via “court order.” Photos, private messaging, search warrants, and friends lists. Both individuals and groups can access this information. These realities makes recent discussion of encryption on Facebook all the more relevant.
Thank you for reminding investigators that cell service providers can refuse to provide instant information to “exigent” requests. This could be because the request allegedly involves an “emergency that involves danger of serious bodily injury or death.” However, these rejections may be overruled by an authority as high as a deputy attorney general.
That’s only a part of what is in the document. You can find more information here. Vice Reports,
It also explains the process for data requests by Mobile Virtual Network Operators, such as Boost Mobile, and explains how location data is obtained from what FBI calls “burner phones”. Also, it explains how information can be obtained from OnStar (General Motors’ in-vehicle computer system). This document provides information on the costs of certain data that law enforcement can request.
This presentation gives more information on the retention periods of telecoms data. AT&T holds onto data such as call records, cell site, and tower dumps for 7 years. T-Mobile has similar data for 2 years while Verizon keeps it for 1 Year.
We live in an age of concern over “domestic terrorism”—and if there’s one thing the years since 9/11 have taught us, it’s that terror investigations often entail the harrassment and surveillance of Americans who have not actually committed a crime but are being probed for the company they keep. It’s important to remember how dangerous that tiny device can be.