A federal judge has upheld the practice of police using seized phones to impersonate their owners, reading messages and sending sending entrapping replies to contacts in the phone's memory, without a warrant. The judge reasoned that constitutional privacy rights don't apply to messages if they appear on a seized device -- even if the messages originated with someone who has not been arrested or is under suspicion of any crime:
A federal appeals court held that the pager owner's Fourth Amendment rights against unreasonable search and seizure were not violated because the pager is "nothing more than a contemporary receptacle for telephone numbers," akin to an address book. The court also held that someone who sends his phone number to a pager has no reasonable expectation of privacy because he can't be sure that the pager will be in the hands of its owner.
Judge Penoyar said that the same reasoning applies to text messages sent to an iPhone. While text messages may be legally protected in transit, he argued that they lose privacy protections once they have been delivered to a target device in the hands of the police. He claimed that the same rule applied to letters and e-mail. (Police would still need to seize or search a phone or computer legally, and phones are much easier for cops to seize than computers, which generally require a warrant.)
"On his own iPhone, on his own computer, or in the process of electronic transit, Hinton's communications are shielded by our constitutions," he wrote, referring to both the state and federal constitutions. "But after their arrival, Hinton's text messages on Lee's iPhone were no longer private or deserving of constitutional protection." Penoyar rejected Roden's privacy arguments on similar grounds.
It's legal: cops seize cell phone, impersonate owner
Bikram Choudhury, the millionaire accused serial rapist who popularized hot yoga in America, sued other hot yoga studios in 2003, including “open source yoga” practicioners, asserting that he held a copyright over the sequence of poses conducted in his class.
Some day, you may be the defendant in a criminal trial that turns on whether the software in a forensic device reached a reliable conclusion about a DNA test or other piece of evidence. Wouldn’t you like to have your own experts check the source code on that device?
Historically, US companies have been able to get around the (relatively stringent) European data-protection rules thanks to a “Safe Harbor” agreement between the US and the EU — but Max Schrems, an Austrian privacy activist, has successfully argued that the NSA’s mass surveillance programs violate European law and invalidates the Safe Harbor.
Watching Netflix, Hulu or other streaming services can unfortunately be difficult while traveling outside the US. Rather than bypass these restrictions with the help of a complex and slow VPN, choose a faster and simpler solution with Getflix. Instead of rerouting all your Internet traffic through a different server, this handy service only routes the […]
Shake, stir, and muddle your way to delicious homemade cocktails with this must-have bar set. Expect only the finest quality tools from MakersKit — enabling you to unleash your inner mixologist.Top 12 Favorite Things of 2014, Sunset MagazineQuart-size vintage-style Mason jar shakerRetro double jigger for accurate measurementsStrainer & spouts for a mixologist-style smooth pourHardwood muddler […]
The Lytro Illum dares to be different, boasting even more robust features than its first generation predecessor and a sleek design reminiscent of professional DSLRs. What’s so cool about it? Most cameras capture the position of light rays, producing a statoc 2D image.