New Mexico Senate Passes Bill to Strengthen Electronic Communications Privacy Act

Fight Censorship, Share This Post!

SANTA FE, N.M. (Feb. 18, 2020) – On Sunday, the New Mexico Senate passed a bill that would expand protections under the Electronic Communications Privacy Act. Passage of the bill would not only increase data privacy in the state; it would also further hinder the federal surveillance state.
Sen. Daniel Ivey-Soto (D-Albuquerque) introduced Senate Bill 270 (SB270) on Feb. 4. The legislation would expand provisions of the Electronic Communications Privacy Act that passed last year to limit the retention and use of incidentally collected data.

The Electronic Communications Privacy Act helps block the use of cell-site simulators, known as “stingrays.” These devices essentially spoof cell phone towers, tricking any device within range into connecting to the stingray instead of the tower, allowing law enforcement to sweep up communications content, as well as locate and track the person in possession of a specific phone or other electronic device. Under the law, police must obtain a search warrant or wiretap order before using a stingray in most situations. The law also bars law enforcement agencies from compelling a service provider or any person other than the owner of the device without a warrant or wiretap order. This includes actual communication content such as phone conversations, text messages and email, location information and other metadata such as IP addresses pertaining to a person or device participating in the communication.

SB270 would require police to seal any information obtained through the execution of the warrant that is unrelated to the objective of the warrant, or is not exculpatory to the target of the warrant. The information could not be subject to further review, used, or disclosed, except pursuant to a court order or to comply with discovery. The proposed law would also require the destruction of any Information obtained through the execution of a warrant or order that is unrelated to the objective of the warrant as soon as feasible after the termination of the current investigation and related investigations or proceedings.

On Feb. 16, the Senate passed SB270 by a 39-0 vote.

IMPACT ON FEDERAL SURVEILLANCE PROGRAMS

The federal government funds the vast majority of state and local stingray programs, attaching one important condition. The feds require agencies acquiring the technology to sign non-disclosure agreements. This throws a giant shroud over the program, even preventing judges, prosecutors and defense attorneys from getting information about the use of stingrays in court. The feds actually instruct prosecutors to withdraw evidence if judges or legislators press for information. As the Baltimore Sun reported in April 2015, a Baltimore detective refused to answer questions on the stand during a trial, citing a federal non-disclosure agreement.

Defense attorney Joshua Insley asked Cabreja about the agreement.

“Does this document instruct you to withhold evidence from the state’s attorney and Circuit Court, even upon court order to produce?” he asked.

“Yes,” Cabreja said.

As privacysos.org put it, “The FBI would rather police officers and prosecutors let ‘criminals’ go than face a possible scenario where a defendant brings a Fourth Amendment challenge to warrantless stingray spying.”

The experience of a Pinellas County, Florida, man further highlights the shroud of secrecy around the use of stingray devices, along with the potential for abuse of power inherent in America’s law enforcement community.

The feds sell the technology in the name of “anti-terrorism” efforts. With non-disclosure agreements in place, most police departments refuse to release any information on the use of stingrays. But information obtained from the Tacoma Police Department revealed that it uses the technology primarily for routine criminal investigations.

Some privacy advocates argue that stingray use can never happen within the parameters of the Fourth Amendment because the technology necessarily connects to every electronic device within range, not just the one held by the target. And the information collected by these devices undoubtedly ends up in federal databases.

The feds can share and tap into vast amounts of information gathered at the state and local level through fusion centers and a system known as the “information sharing environment” or ISE. In other words, stingrays create the potential for the federal government to track the movement of millions of Americans with no warrant, no probable cause, and without the people even knowing it.

Fusion centers were sold as a tool to combat terrorism, but that is not how they are being used. The ACLU pointed to a bipartisan congressional report to demonstrate the true nature of government fusion centers: “They haven’t contributed anything meaningful to counterterrorism efforts. Instead, they have largely served as police surveillance and information sharing nodes for law enforcement efforts targeting the frequent subjects of police attention: Black and brown people, immigrants, dissidents, and the poor.”

Fusion centers operate within the broader ISE. According to its website, the ISE “provides analysts, operators, and investigators with information needed to enhance national security. These analysts, operators, and investigators…have mission needs to collaborate and share information with each other and with private sector partners and our foreign allies.” In other words, ISE serves as a conduit for the sharing of information gathered without a warrant. Known ISE partners include the Office of Director of National Intelligence which oversees 17 federal agencies and organizations, including the NSA. ISE utilizes these partnerships to collect and share data on the millions of unwitting people they track.

The federal government encourages and funds stingrays at the state and local level across the U.S., thereby undoubtedly gaining access to a massive data pool on Americans without having to expend the resources to collect the information itself. By placing restrictions on stingray use, state and local governments limit the data available that the feds can access.

In a nutshell, without state and local cooperation, the feds have a much more difficult time gathering information. Passage of SB199 strikes a major blow to the surveillance state and is a win for privacy.

PARALLEL CONSTRUCTION

By allowing defendants to suppress information obtained in violation of the law, SB199 will hinder one practical effect of NSA spying in New Mexico.

Reuters revealed the extent of such NSA data sharing with state and local law enforcement in an August 2013 article. According to documents obtained by the news agency, the NSA passes information to police through a formerly secret DEA unit known Special Operations Divisions and the cases “rarely involve national security issues.” Almost all of the information involves regular criminal investigations, not terror-related investigations.

In other words, not only does the NSA collect and store this data, using it to build profiles, the agency encourages state and local law enforcement to violate the Fourth Amendment by making use of this information in their day-to-day investigations.

This is “the most threatening situation to our constitutional republic since the Civil War,” Binney said.

WHAT’S NEXT

SB270 will now move to the House for further consideration. At the time of this report, it had not been referred to a House committee. Once it receives a committee assignment, it must pass by a majority vote before moving forward in the legislative process.

 


This post has been republished with implied permission from a publicly-available RSS feed found on Tenth Amendment Center. The views expressed by the original author(s) do not necessarily reflect the opinions or views of The Libertarian Hub, its owners or administrators. Any images included in the original article belong to and are the sole responsibility of the original author/website. The Libertarian Hub makes no claims of ownership of any imported photos/images and shall not be held liable for any unintended copyright infringement. Submit a DCMA takedown request.


Fight Censorship, Share This Post!

-> Click Here to Read the Original Article <-

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.