Chicago police say Facebook ‘secret groups’ traffic in guns and drugs

Chicago Police Superintendent Eddie Johnson speaks about the latest police districts to start wearing body cameras, during a news conference at the 20th District Chicago Police Department in Chicago, Illinois, U.S. October 30, 2017.

By Bernie Woodall

(Reuters) – Police in Chicago said on Thursday they have arrested 50 people suspected of using “secret groups” on Facebook to deal in guns and drugs, and have teamed up with the world’s largest social media network to crack down on criminal trafficking online.

Announcing the arrests at a news conference, Police Superintendent Eddie Johnson initially criticized Facebook as being unhelpful during a 10-month investigation by his department.

“Quite frankly, they haven’t been very friendly to law enforcement to prevent these things,” he told reporters.

However, police later said the department and the California-based company agreed to work collaboratively “to target any illegal activity on the platform.”

Police did not detail charges facing the 50 men and women arrested through Thursday, but said there were “dozens and dozens” of private Facebook groups being used for illegal drug and weapons transactions. Arrest warrants for 18 more suspects have been signed, and most have prior criminal histories, police said.

Among the illicit sites monitored by police was one offering a “Thanksgiving special” on cocaine baggies discounted to $40 from a normal street price of $60.

In an emailed statement on Thursday, Facebook Inc, which boasts 2 billion users worldwide, said it had only just been alerted to the arrests in Chicago.

“We do not allow the sale of guns or drugs on our platform. We routinely work with law enforcement and outline how officials may submit a request on our site,” Facebook added.

Among those arrested was an elementary school teacher taken into custody at his Chicago school in possession of scales often used for weighing drugs, according to Anthony Riccio, chief of the police department’s organized crime unit.

Since a confidential informant alerted investigators about alleged criminal trade on Facebook in February, police detectives working undercover arranged for the purchase of 17 different types of drugs and 18 different illegal firearms, Riccio said.

Riccio said investigators created covert identities on Facebook and were invited into private groups, which are closed unless the user-administrator allows someone to join. Police then monitored messages and contacted those in the group via Facebook to make buys.

Chicago has been singled out by President Donald Trump as one of the most violent U.S. cities. In 2016, the number of murders there exceeded 760.

(Reporting by Bernie Woodall in Fort Lauderdale, Florida; Editing by Leslie Adler and David Gregorio)

U.S. Supreme Court weighs major digital privacy case

U.S. Supreme Court weighs major digital privacy case

By Lawrence Hurley

WASHINGTON (Reuters) – The U.S. Supreme Court on Wednesday takes up a major test of privacy rights in the digital age as it weighs whether police must obtain warrants to get data on the past locations of criminal suspects using cellphone data from wireless providers.

The justices at 10 a.m. (1500 GMT) are due to hear an appeal by a man named Timothy Carpenter convicted in a series of armed robberies in Ohio and Michigan with the help of past cellphone location data that linked him to the crime locations. His American Civil Liberties Union lawyers argue that without a court-issued warrant such data amounts to an unreasonable search and seizure under the U.S. Constitution’s Fourth Amendment.

Law enforcement authorities routinely request and receive this information from wireless providers during criminal investigations as they try to link a suspect to a crime.

Police helped establish that Carpenter was near the scene of the robberies of Radio Shack and T-Mobile stores by securing from his cellphone carrier his past “cell site location information” tracking which cellphone towers had relayed his calls.

The legal fight has raised questions about the degree to which companies protect their customers’ privacy rights. The big four wireless carriers, Verizon Communications Inc, AT&T Inc, T-Mobile US Inc and Sprint Corp, receive tens of thousands of these requests annually from law enforcement.

Verizon was the only one of those four companies to tell the Supreme Court that it favors strong privacy protections for its customers, with the other three sitting on the sidelines.

There is growing scrutiny of the surveillance practices of U.S. law enforcement and intelligence agencies amid concern among lawmakers across the political spectrum about civil liberties and authorities evading warrant requirements.

The Supreme Court twice in recent years has ruled on major cases concerning how criminal law applies to new technology, both times ruling against law enforcement. In 2012, the court held that a warrant is required to place a GPS tracking device on a vehicle. Two years later, the court said police need a warrant to search a cellphone seized during an arrest.

Carpenter’s bid to suppress the evidence failed and he was convicted of six robbery counts. On appeal, the Cincinnati-based 6th U.S. Circuit Court of Appeals upheld his convictions, finding that no warrant was required for the cellphone data.

The ACLU said in court papers that police need “probable cause,” and therefore a warrant, in order to meet Fourth Amendment requirements.

Based on a provision of a 1986 federal law called the Stored Communications Act, the Justice Department said probable cause is not needed to obtain customer records. Instead, it argues, prosecutors must show only that there are “reasonable grounds” for the records to be provided and that they are “relevant and material” to an investigation.

President Donald Trump’s administration said in court papers the government has a “compelling interest” in acquiring the data without a warrant because the information is particularly useful at the early stages of a criminal investigation.

Civil liberties groups said the 1986 law did not anticipate the way mobile devices now contain a wealth of data on each user.

A ruling is due by the end of June.

(Reporting by Lawrence Hurley; Editing by Will Dunham)

U.S. Supreme Court to settle major cellphone privacy case

People speak on their cell phones near a blocked off area after a speeding vehicle struck pedestrians in Times Square in New York City, May 18, 2017. REUTERS/Brendan Mcdermid

By Lawrence Hurley

WASHINGTON (Reuters) – Police officers for the first time could be required to obtain warrants to get data on the past locations of criminal suspects based on cellphone use under a major case on privacy rights in the digital age taken up by the U.S. Supreme Court on Monday.

The justices agreed to hear an appeal by a man convicted in a series of armed robberies in Ohio and Michigan with the help of past cellphone location data who contends that without a warrant from a court such data amounts to an unreasonable search and seizure under the U.S. Constitution’s Fourth Amendment.

Cellphone location records are becoming increasingly important to police in criminal investigations, with authorities routinely requesting and receiving this information from wireless providers.

Police helped establish that the man at the center of the case, Timothy Carpenter, was near the scene of the robberies at Radio Shack and T-Mobile stores by securing past “cell site location information” from his cellphone carrier that tracked which local cellphone towers relayed his calls.

The case reaches the high court amid growing scrutiny of the surveillance practices of U.S. law enforcement and intelligence agencies amid concern among lawmakers across the political spectrum about civil liberties and police evading warrant requirements.

The legal fight has raised questions about how much companies protect the privacy rights of their customers. The big four wireless carriers, Verizon Communications Inc<VZ.N>, AT&T Inc<T.N>, T-Mobile US Inc<TMUS.O> and Sprint Corp<S.N>, receive tens of thousands of requests a year from law enforcement for what is known as “cell site location information,” or CSLI. The requests are routinely granted.

The Supreme Court has twice in recent years ruled on major cases concerning how criminal law applies to new technology, on each occasion ruling against law enforcement. In 2012, the court held that a warrant is required to place a GPS tracking device on a vehicle. Two years later, the court said police need a warrant to search a cellphone that is seized during an arrest.

The information that law enforcement agencies can obtain from wireless carriers shows which local cellphone towers users connect to at the time they make calls. Police can use historical data to determine if a suspect was in the vicinity of a crime scene or real-time data to track a suspect.

Carpenter’s bid to suppress the evidence failed and he was convicted of six robbery counts. On appeal, the Cincinnati, Ohio-based 6th U.S. Circuit Court of Appeals upheld his convictions, finding that no warrant was required for the cellphone information.

Civil liberties lawyers have said that police need “probable cause,” and therefore a warrant, in order to avoid constitutionally unreasonable searches.

‘LONGSTANDING PROTECTIONS’

“Because cellphone location records can reveal countless private details of our lives, police should only be able to access them by getting a warrant based on probable cause,” said Nathan Freed Wessler, a staff attorney with the American Civil Liberty Union’s Speech, Privacy and Technology Project who represents Carpenter.

“The time has come for the Supreme Court to make clear that the longstanding protections of the Fourth Amendment apply with undiminished force to these kinds of sensitive digital records,” Wessler added.

But, based on a provision of a 1986 federal law called the Stored Communications Act, the government said it does not need probable cause to obtain customer records. Instead, the government said, prosecutors must show only that there are “reasonable grounds” for the records and that they are “relevant and material” to an investigation.

The case will be heard and decided in the court’s next term, which starts in October and ends in June 2018.

The Trump administration said in court papers the government has a “compelling interest” for acquiring the records without a warrant because the information is particularly useful at the early stage of a criminal investigation.

“Society has a strong interest in both promptly apprehending criminals and exonerating innocent suspects as early as possible during an investigation,” the administration said in a brief.

David LaBahn, president of the Association of Prosecuting Attorneys, said warrants can be obtained quickly from judges but police may have problems getting the evidence needed to show probable cause.

“They may not be able to get over that legal hurdle, so the court couldn’t issue the warrant,” LaBahn said.

Civil liberties groups assert that the 1986 law did not anticipate the way mobile devices now contain a wealth of data on each user.

Steve Vladeck, a national security and constitutional law professor at the University of Texas, said the case will have “enormous implications” over how much data the government can obtain from phone companies and other technology firms about their customers without a warrant.

“Courts and commentators have tried to figure out exactly when individuals will have a continuing expectation of privacy even in data they’ve voluntarily shared with a third party,” Vladeck said. “This case squarely raises that question.”

(Reporting by Lawrence Hurley; Additional reporting by Dustin Volz; Editing by Will Dunham)

Document spells out FBI rules to get journalists’ phone records: article

FBI headquarters

By Dustin Volz

WASHINGTON (Reuters) – The Federal Bureau of Investigation is allowed to seek journalists’ phone records with the approval of two government officials through a secretive surveillance process that does not require a warrant, The Intercept website reported on Thursday, citing a classified document.

The document, which The Intercept published without citing sources, was described as a classified appendix of the FBI’s Domestic Investigations and Operations Guide (DIOG) and was dated Oct. 16, 2013. The related document is at http://bit.ly/295HIpY.

Reuters could not verify the authenticity of the document.

FBI spokesman Christopher Allen said in an emailed reply to a Reuters request for comment, “We post a redacted version of the DIOG on our website. I am not in a position to comment or authenticate any other version.” Allen referred to an FBI website regarding the agency’s Domestic Investigations and Operations Guide. http://1.usa.gov/1QleO9n

“Because the DIOG governs sensitive operations and investigations, not all of its contents can be released,” Allen wrote.

“As a result I am not able to comment on how, or whether, the DIOG is updated as laws, Guidelines, or technology change. However, the FBI periodically reviews and updates the DIOG as needed,” he said.

Allen said the FBI’s DIOG remained consistent with guidelines from the U.S. attorney general.

The Intercept is an online publication launched in 2014 by First Look Media, which was created and funded by eBay founder Pierre Omidyar. The editors are Glenn Greenwald, Laura Poitras and Jeremy Scahill, who were all involved in breaking the Edward Snowden story.

The Intercept reported that, according to the document, pursuing a journalist’s call data with a national security letter requires the consent of the FBI’s general counsel and the executive assistant director of its national security branch, in addition to normal chain-of-command approval.

A national security letter is a type of government order for communications data sent to service providers. It is usually issued with a gag order, meaning the target is often unaware that records are being accessed.

There are several proposals in Congress to broaden the scope of national security letters, or NSLs. Privacy advocates, however, have said the authority is used too often, circumvents judicial oversight and lacks adequate transparency safeguards.

The Intercept reported that an added layer of review by the U.S. Justice Department’s assistant attorney general for national security is necessary to use an NSL to seek a journalist’s records if they are being sought “to identify confidential news media sources.”

National security letters have been available as a law enforcement tool since the 1970s. But their frequency and breadth expanded under the USA Patriot Act enacted shortly after the Sept. 11, 2001, attacks on the United States.

The FBI made 48,642 requests for data via NSLs in 2015, according to a Justice Department memo seen by Reuters in May.

Currently, national security letters can only compel sharing of phone billing records, according to a 2008 legal memo written by the U.S. Justice Department. Still, the FBI has used the letters since then to request internet records during national security investigations.

The U.S. Senate last week fell two votes short of advancing legislation that would broaden the type of records the FBI can compel a company to hand over under an NSL to include email metadata and some browsing history.

(Reporting by Dustin Volz; Editing by Dan Grebler, Toni Reinhold)