Supreme Court to Decide if Cops Can Raid Homes Based on Drug-Sniffing Dog

Miami-Dade County Police Department K-9 "Franky" has discovered more than 2.5 tons of marijuana

The Supreme Court agreed Friday to decide for the first time whether judges may issue search warrants for private residences when a drug-sniffing dog outside the home reacts as if it smells drugs inside.

The case, involving a suspected Florida drug dealer, tests the limits of government intrusion into the home. The justices and lower courts have routinely sanctioned search warrants based on drug-detecting dogs responding to packages like airport luggage or vehicles stopped during routine traffic stops.

But a private residence is another story. The case pending before the court is made all the more important because the Obama administration already claims there is no privacy in one’s public movements outside a private dwelling.

The issue is being watched closely by at least 18 states that warned the Supreme Court that the Florida case “jeopardizes a widely used method of detecting illegal drugs” (.pdf).

The case tests a decade-old Supreme Court precedent in which the justices have ruled that thermal-imaging devices used outside a house to detect marijuana-growing operations inside amounted to a search and therefore required a warrant. In that case, the high court ruled in 2001 that “rapidly advancing technology” threatens the core of the Fourth Amendment “right of a man to retreat into his own home and there be free from unreasonable governmental intrusion.”

The petition before the justices stems from a Florida Supreme Court ruling last year in which Florida’s justices tossed evidence of 179 pot plants (.pdf) Miami-Dade County authorities seized from the residence of Joelis Jardines in 2006. Authorities made the bust after a trained dog “alerted,” or indicated that it detected drugs, while outside the home.

Florida’s top court said the case, which comes as studies suggest drug-sniffing dogs reflect police bias, sets a bad precedent and “invites overbearing and harassing conduct.”

Such a public spectacle unfolding in a residential neighborhood will invariably entail a degree of public opprobrium, humiliation and embarrassment for the resident, for such dramatic government activity in the eyes of many — neighbors, passers-by, and the public at large — will be viewed as an official accusation of crime. Further, if government agents can conduct a dog ’sniff test’ at a private residence without any prior evidentiary showing of wrongdoing, there is nothing to prevent the agents from applying the procedure in an arbitrary or discriminatory manner, or based on whim and fancy, at the home of any citizen. Such an open-ended policy invites overbearing and harassing conduct.

The dog used to nab Jardines was Franky, an 8-year-old chocolate Labrador. Miami-Dade County officials said the K-9 has discovered more than 2.5 tons of marijuana, 80 pounds of cocaine and millions in cash during its career.

Jardines’ attorney Howard Blumberg urged the justices to uphold the Florida Supreme Court. He said the government’s deployment of a dog was akin to the “device” (.pdf) used in the thermal-imaging case. The dog, like thermal imaging equipment, was used “to explore details of the home that would previously have been unknowable without physical intrusion.”

Pamela Jo Bondi, Florida’s attorney general, told the high court in a petition that it must undo the Florida Supreme Court decision, saying dog searches are a “valuable tool” (.pdf).

Law enforcement is significantly hampered if required to develop probable cause without the assistance of dogs. The Florida Supreme Cours decision requires that the officers have probable cause before employing a dog. It is the dog’s alert, however, that often provides the probable cause to obtain the search warrant. This Court should grant certiorari to directly hold that a dog sniff of a house is not a search and to restore this valuable tool in the detection of numerous illegal and dangerous activities to law enforcement.

The justices did not indicate when they would hear the case.

Photo: Miami-Dade County Police Department

Romanian Man Charged in $1.5 Million ATM Skimming Scam

A Romanian man has been arrested in a $1.5 million card-skimming operation that targeted 40 ATMs belonging to HSBC branches in New York.

Between May 2010 and this week Laurentiu Iulian Bulat and others allegedly installed card-skimming devices that stole card numbers and PINs on HSBC ATMs in Manhattan, Long Island and Westchester.

The devices recorded information embedded in the magnetic stripe of bank cards as customers inserted them into the ATMs. Pin-hole cameras the hackers installed in the ATMs recorded the PINs as customers typed them on the keypad. The thieves would return to the ATMs within a day or two to collect the stored data and subsequently embed it on blank cards. Then using the videotaped PINs, they withdrew about $1.5 million from customer accounts over about seven months, authorities say.

According to an affidavit filed by U.S. Secret Service Agent Eric Friedman (.pdf), Bulat was caught on bank surveillance cameras on Thursday morning – and on prior occasions – installing the skimmers and pin-hole cameras and made no attempt to hide his face.

Bulat, according to authorities, has been in the U.S. illegally on an overstayed visa. He’s charged with one count of conspiracy to commit bank fraud and one count of bank fraud. If convicted, he faces a maximum sentence of 60 years in prison.

Photo: markhillary/flickr

Hackers Get Symantec Anti-Virus Source Code

Symantec has confirmed that hackers obtained source code to two of its enterprise security products and have released portions of it on the web, portending a worst-case scenario where its security software could be perused by hackers to devise ways to circumvent it.

“Symantec can confirm that a segment of its source code has been accessed,” the company said in a statement released Friday. “Symantec’s own network was not breached, but rather that of a third party entity.”

A hacker group calling itself the Lords of Dharmaraja claimed it uncovered the source code on servers belonging to India’s military intelligence agency.

“We have discovered within the Indian Spy Program source codes of a dozen software companies which have signed agreements with Indian TANCS programme and CBI,” the hackers claimed in post published on Pastebin.

Symantec acknowledged that segments of source code that the hackers posted online and passed to reporters belonged to Symantec’s 2006 Endpoint Protection 11.0 and its discontinued Symantec Antivirus 10.2. Symantec’s Endpoint Protection is currently at version 12.0.

Although the products are not the most recent releases and are not the company’s flagship consumer products, if hackers obtained all of the source code and released it, it could be valuable to Symantec competitors and could also be used by hackers to search for vulnerabilities in the products that may be unpatched and therefore exploited.

Stuxnet, a sophisticated worm that sabotaged Iran’s uranium enrichment program, contained code that conducted extensive checks to determine what anti-virus products were installed on targeted machines in order to bypass them.

Photo: cytech/flickr

Video: A Short, Strange History of Anonymous

Anonymous has come a long way in a few short years, graduating from filling the web with Pedobears and Rickrolls to fighting oppressive regimes and trying to get revenge on the companies that cut off WikiLeaks.

Wired’s video team chronicles the lulz and attacks from the leaderless online collective in the above video — made with some fun animation.

For a longer textual take on Anonymous’s history, check out the first two parts of Quinn Norton’s Anonymous 101 series: Anonymous 101: Introduction to the Lulz and Anonymous 101 Part Deux: Morals Triumph Over Lulz.


Livestreaming Journalists Want to Occupy the Skies With Cheap Drones

Livestreaming journalist Tim Pool shows off his modified drone, dubbed the Occucopter, intended to make aerial coverage available to citizen reporters. Photo: Sean Captain

It may not sound like much: A video blogger bought a toy helicopter.

But the blogger is 25-year-old Tim Pool — an internationally known journalist who attracts tens of thousands of viewers to his live-stream broadcasts from Occupy Wall Street protests in New York, DC, LA and other cities. (His feeds and archival footage are also aired on mainstream networks such as NBC.) He and his partners hope that the toy chopper — the $300 Parrot AR Drone — will be one step toward a citizen-driven alternative to mainstream news.

Along with “general assembly” and “99 percenters,” Occupy Wall Street has brought the phrase “livestreaming” to the forefront. Rising-star reporters — known best by their Twitter and Ustream handles — such as Pool (timcast) in New York City and Spencer Mills (oakfosho) in Oakland are passionate, deeply embedded correspondents who provide live video reporting — sometimes lasting a dozen hours or more — of protests, general assemblies and other Occupy events. Instead of using a satellite truck, they broadcast live “TV” coverage from 3G- and 4G-equipped smartphones over video networks such as Ustream.com and Livestream.com.

They are real-life embodiments of Jimmy Burns, of Anthony Lappé and Dan Goldman’s 2006 online graphic novel The Shooting War about a video blogger made famous for being first to cover a major news event (a terrorist attack at a Brooklyn Starbucks).

Having thoroughly figured out how to cover giant events from ground level, they are now exploring ultra-cheap alternatives to the hundreds-of-thousands-of-dollar news choppers used for aerial reporting of big events like protest marches and police clashes. In the process, the video bloggers are discovering both how far low-cost consumer technology has come and how much farther it needs to go.

Like the HD video cameras now included in the livestreamers’ cellphones, aerial surveillance drones have progressed from ultra-expensive professional gear to impulse-buy items. What was once in the Pentagon budget is now at Toys “R” Us – in a simple form, at least.

Continue Reading “Livestreaming Journalists Want to Occupy the Skies With Cheap Drones” »

WikiLeaks Supporters Lose Court Bid to Protect Twitter Records

Three WikiLeaks supporters have lost their bid to protect their Twitter records from U.S. investigators trying to prosecute the whistleblowing site over its publication of secret and sensitive government documents.

A U.S. District judge in Alexandria, Virginia, rejected a request by Birgitta Jonsdottir, Jacob Appelbaum and Rop Gonggrijp to block prosecutors from obtaining the data while a federal appeals court considers their challenge to the government’s request for the data.

Judge Liam O’Grady wrote in his ruling that he was rejecting the request because the defendants were not likely to win their appeal, according to the court document (.pdf).

The U.S. Justice Department served Twitter with a subpoena in December 2010 as part of a Grand Jury investigation looking at possible criminal charges against WikiLeaks.

The government is seeking the records under 18 USC 2703(d), a provision of the 1994 Stored Communications Act that governs law enforcement access to non-content internet records, such as transaction information. More powerful than a subpoena, but less so than a search warrant, a 2703(d) order is supposed to be issued when prosecutors provide a judge with “specific and articulable facts” that show the information sought is relevant and material to a criminal investigation. But the people targeted in the records demand don’t have to be suspected of criminal wrongdoing themselves.

Continue Reading “WikiLeaks Supporters Lose Court Bid to Protect Twitter Records” »

Feds Want Judge to Force Suspect to Give Up Laptop Password

Federal prosecutors want a judge to order a Colorado woman to provide the password to decrypt her laptop, which the government seized with a search warrant.

With backup from digital rights groups, the woman is fighting the feds, arguing that being forced to provide her password violates the Fifth Amendment’s protection against forced self-incrimination.

Colorado U.S. District Judge Robert Blackburn is expected to rule any day on whether to force defendant Ramona Fricosu to decrypt her Toshiba Satellite M305, which authorities seized from her in 2010 with a court warrant while investigating financial fraud.

The case is being closely watched by digital rights groups, as the issue has never been squarely weighed in on by federal courts, and the Supreme Court has never addressed the issue.

But a factually similar dispute involving child pornography ended with a Vermont federal judge ordering the defendant to decrypt the hard drive of his laptop. While that case never reached the Supreme Court, it differed from the Fricosu matter because U.S. border agents already knew there was child porn on the computer because they saw it while the computer was running during a 2006 routine stop along the Canadian border.

The Electronic Frontier Foundation’s Marcia Hofmann said (.pdf) in a court filing that the very act of requiring Fricosu to input her password into the laptop would be incriminating “because it might reveal she had control over the laptop and the data there.”

Continue Reading “Feds Want Judge to Force Suspect to Give Up Laptop Password” »

No Warrant Needed for GPS Monitoring, Judge Rules

A Missouri federal judge ruled the FBI did not need a warrant to secretly attach a GPS monitoring device to a suspect’s car to track his public movements for two months.

The ruling, upholding federal theft and other charges, is one in a string of decisions nationwide supporting warrantless GPS surveillance. Last week’s decision comes as the Supreme Court is expected to rule on the issue within months in an unrelated case.

The ruling from Magistrate David Noce mirrored the Obama administration position before the Supreme Court during oral arguments on the topic in November. In short, defendant Fred Robinson, who was suspected of fudging his time sheets for his treasurer’s office job for the city of St. Louis, had no reasonable expectation of privacy in his public movements, Magistrate Noce said.

Noce ruled: (.pdf)

Here, installation of the GPS tracker device onto defendant Robinson’s Cavalier was not a ’search’ because defendant Robinson did not have a reasonable expectation of privacy in the exterior of his Cavalier. Agents installed the GPS tracker device onto defendant’s Cavalier based on a reasonable suspicion that he was being illegally paid as a ‘ghost’ employee on the payroll of the St. Louis City Treasurer’s Office.

Installation of the GPS tracker device was non-invasive; a magnetic component of the GPS tracker device allowed it to be affixed to the exterior of the Cavalier without the use of screws and without causing any damage to the exterior of the Cavalier. The GPS tracker device was installed when the Cavalier was on a public street near defendant’s residence. Installation of the GPS tracker device revealed no information to the agents other than the public location of the vehicle. Under these circumstances, installation of the GPS tracker device was not a search within the meaning of the Fourth Amendment.

The GPS tracking in 2010, Noce continued, “corroborated that Robinson’s employment time sheets were false.”

Deputy Solicitor General Michael Dreeben told the Supreme Court in November oral arguments that federal authorities employ warrantless GPS monitoring “in the low thousands annually.” Dreeben also said the government could affix GPS devices, without warrants, to the vehicles of the nine members of the Supreme Court.

Many of the justices were skeptical of the government’s position, saying the United States could evolve into a surveillance state if the Supreme Court sides with the government.

Justice Stephen Breyer told Dreeben, “If you win this case, there is nothing to prevent the police or government from monitoring 24 hours a day every citizen of the United States.”

Photo: aaronparecki/Flickr

Boston D.A. Subpoenas Twitter Over Occupy Boston, Anonymous

@p0isan0n's Twitter icon, the Antisec oenophile

On December 14, Twitter received a bizarre subpoena from the District Attorney of Suffolk County, which includes Boston.

It requested “All available subscriber information, for the account or accounts associated with the following information, including IP address logs for account creation and for the period December 8, 2011 to December 13, 2011.” The named targets included two hashtags, two accounts, and one proper name:

That subpoena, as written, ostensibly asks for whatever identifying information Twitter has on anyone who used the hashtags #bostonpd and #d0xcak3 from 12/8/2011 to 12/14/2011, which could number in the thousands.

It’s unclear if that’s what the Boston police meant to do, or if they are unfamiliar with Twitter. It seems likely the latter, given that the @occupyboston account is a year-and-a-half old fallow account with four tweets. The quasi-official Twitter account for the Occupy Boston movement that was evicted in this time frame is @occupy_boston.

@p0isan0n purports to be a participant in Antisec, the blackhat wing of Anonymous, which has targeted the Boston Police several times in document releases that have included online logins, physical addresses, and most recently, payroll information for 40 senior officers. The subpoena may also be be related to the d0xing, or document publication, of Boston Mayor Tom Menino on December 9th, as tweeted by @youranonnews:

“Boston Mayor Tom Menino d0x’d, courtesy of @DoxCak3 — http://pastebin.com/JtFqDr7G #OccupyBoston << someone order the man a pizza, stat!”

If so, the district attorney’s office mixed up their # and @ symbols.

The subpoena also includes a request for confidentiality from the Special Prosecutions Unit, but had no actual legal gag order. Without legal orders, the request for confidentially had no more enforceability than if Assistant District Attorney Benjamin Goldberger had also asked Twitter to send him a cupcake.

Continue Reading “Boston D.A. Subpoenas Twitter Over Occupy Boston, Anonymous” »

Beyond ‘Blowin’ in the Wind’: The Music of Occupy Wall Street

A movement goes nowhere without creating culture as it grows.

To wit, the fast growing Occupy movement has become a locus for cultural creation by artists and musicians, as well as technologists and political activists. It started out spare, borrowing from the past.

Back in October, while I was visiting the weary crew of Occupy Long Beach, they gathered in a circle after GA to sing together to one occupier’s guitar. But at that moment there were no songs about the Occupy movement.

Instead they sang ’60s protest standards, Blowin’ in the Wind, What’s going on, and found camaraderie in the Beatles’ With a Little Help from my Friends. But 50-year-old songs could only go so far, they couldn’t really describe the now. In the months since, Occupy music has started to flow.

Here’s a sample of some of the music generated by and about the Occupys.

  • The beautiful and folky We Are The Many (above) by Hawaiian artist Makana is not only written specifically as a song for the Occupy movement, it has the distinction have being a surprise act for the World Leaders Dinner at APEC, when Makana pulled open his jacket and shirt to reveal an undershirt with “Occupy with Aloha” handwritten on it. He started out quiet and hesitant in front of the room of dignitaries, singing We’ll occupy the streets / we’ll occupy the courts / We’ll occupy the offices of you / ‘Til you do / The bidding of the many, not the few.
  • Dear Mr. President, comes straight out of the occupy, from Gabriel Quinn Andreas of Occupy Santa Barbara. He expresses a common sentiment in the occupys, many supporters of Obama that feel he’s failed them with the whole hope-y change-y thing: We gave you a fair chance and this is how it went / Signed sincerely yours / The Other Ninety-Nine Percent.

  • Third Eye Blind did an upbeat tribute calling for the youth to rally to the Occupy movement with If Ever There Was A Time, which they’ve made available for free. Despite being overall an optimistic song, (Things only get brighter when you light a spark / Everywhere you go right now is Zuccotti park) it’s bookended by samples from police confrontations, including Iraq vet Scott Olsen’s Occupy Oakland head wound. The group has asked downloaders to donate to the Occupy movement.
  • Hip-hop artist MK-ULTRA (Not to be confused with the alternative band from the Bay Area or the Chicago punk band of the same name, both from the 1990s) appears to have joined the movement around September 26th. His track Who’s The Man was shot at Zuccotti park in New York City a month before its eviction.

  • The Roaring featuring Ari Herstand did a reggie-influenced song, Finally Here, which emphasizes the arrival and outrage of the young, much as Third Eye Blind did. There’s a pay-what-you-want Bandcamp link, and We Stand As One (#occupywallstreet), a Bob Dylan/Woody Guthrie inspired folk tune for the Occupy movement. Despite the gentle music, this song has the most violent lyrics of these occupy songs, pointed at the metaphorical 1%. And what you won’t share / Will be ripped from your hands / Your body destroyed / The way fire lands / Burning your homes

  • Miley Cyrus didn’t pen a song specifically for the Occupy, but her new video for the song Liberty Walk is made out of expertly edited footage from around marches and crackdowns on OWS around the world. It also has the distinction to be the most viewed Occupy-related music video on Youtube, clocking in at 600,000 views.

  • While this list is by no means comprehensive, no survey of occupational music overlook OWS’s first music fan, Lupe Fiasco. His new track, The End Of The World, starts talking about Rachel Corrie and Palestine, but spends some time talking about OWS, which he visited early on. He riffs on some common marching chants with lyrics like Whose streets? Our streets, it’ll never be deleted / No matter how many cops that you send to try and beat it

In the New Year, as people process the evictions of the fall and get through the winter, it will likely be culturally rich for Occupiers. It’s one advantage for OWS of the evictions– they’re driving the activist artists, technologists, and makers out of the parks and back into their studios, offices, and hackerspaces.