It seems as though a Baltimore police officer forgot about one key feature of his bodycam: the fact that it saves the previous 30 seconds of video recorded before the camera is activated. Most bodycams record and dump constantly. The moment it’s activated, the 30 seconds preceding the activation become part of the recording.
What was apparently inadvertently captured by the camera was the officer planting drugs in a can and hiding them in an alley. All three officers then retreat to the sidewalk outside the alley before heading back in to “discover” the drug stash.
On 5 April 2017, the Norwegian government proposed an amendment to the Norwegian code of criminal proceedings to allow the police to compel the use of biometric authentication. After two quick debates, the Norwegian Parliament passed the proposition into law on 21 June. (…)
The lack of specificity of an “electronic system” means this law has an extremely wide scope. We can, for example, envision that access to a personal device such as a mobile phone, which stores the access credentials to several cloud storage services, essentially gives away a more or less complete description of a person’s life. To entrust such decision to a single police officer with no due process means that an act with very far reaching consequences may be performed in a matter of seconds. (…)
There is also no reference to proportionality of the use of force. Although there is no reason to suspect this would be used in a disproportionate way, the lack of such a limitation means that we don’t know how far the use force might be taken.
“The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia”, said Australian Prime Minister Malcolm Turnbull today. He has been rightly mocked for this nonsense claim, that foreshadows moves to require online messaging providers to provide law enforcement with back door access to encrypted messages.
Police already have access to visors with built-in face recognition and fugitive spotting. The technology was in prototype stage a few years ago, and was successfully tested when police officers walked into dark cinemas full of people and got so-called People of Interest highlighted directly onto their field of vision. The future is approaching fast, and it’s not all shiny happy rainbow unicorns.
New Zealand airport customs agents force thousands of travelers every year to hand over the passwords for their devices, in some cases inspecting files and even copying the data for the government.
This is quite interesting. Who is to be considered being a terrorist? This is an especially important question, considering all new and far-reaching anti-terror laws.
Tim Pool @ Youtube: ANTIFA listed under domestic terrorism »
US authorities intercepted and recorded millions of phone calls last year under a single wiretap order, authorized as part of a narcotics investigation.
The wiretap order authorized an unknown government agency to carry out real-time intercepts of 3.29 million cell phone conversations over a two-month period at some point during 2016, after the order was applied for in late 2015.
The Justice Department on Friday petitioned the US Supreme Court to step into an international legal thicket, one that asks whether US search warrants extend to data stored on foreign servers. The US government says it has the legal right, with a valid court warrant, to reach into the world’s servers with the assistance of the tech sector, no matter where the data is stored.
A new law allowing the German police to hack into mobile phones for even minor crimes, is expected to be passed by the German parliament this week [update: the law has now been passed]. Currently, the use of a “Staatstrojaner” – government trojan – is only permitted in order to prevent future terrorist attacks. Under the new law, the authorities will be allowed to implant surveillance malware to help secure convictions for over 70 types of crime. These include serious ones such as genocide, treason and murder, but also less serious crimes such as money counterfeiting, vehicle theft, computer fraud, rigged sports betting and tax evasion. Two kinds of trojans will be available. The first allows the authorities to eavesdrop on calls made with the mobile phone, whether using standard telephony or VoIP, while the second gives access to all information held on the device.
In a similar way that the police cannot enter your home without a court warrant, they are not supposed to look into your private communications without permission, right? Not really.
The EU is working towards easing the access to e-evidence for law enforcement authorities. The plan of the European Commission is to propose new rules on sharing evidence and the possibility for the authorities to request e-evidence directly from technology companies. One of the proposed options is that police would be able to access data directly from the cloud-based services.