|
> > |
META TOPICPARENT | name="SecondPaper" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Protests, Profits, and Parallel Construction
-- By AhliaBethea - 16 Apr 2021
As videos continue to surface of police officers using excessive force against unarmed black and brown men (most recently Adam Toledo, Daunte Wright, and Lieutenant Caron Nazario), it is not surprising that cities around the country are, yet again, erupting with protests. It is known that law enforcement officials employ a variety of different means including the use of facial recognition software, cell-site simulators, and other technologies to interfere with such protests. Resources providing information about how one can safely exercise their First Amendment Right while living in a surveillance state are scattered across the Internet. The calls to be “ever vigilant” while protesting highlight the concerns for ones own safety and privacy, but also that of those who have previous convictions or are undocumented (https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/). More interestingly, however, are the stories of the ways in which law enforcement officials, from city cops to the Department of Justice are utilizing technology to maintain order while simultaneously infringing on the First and Fourth Amendment rights of American citizens. This essay seeks to explore that tension.
The Surveillance State
Parallel Construction
Stingray technology creates cell-site simulators which pretend to be cell towers that can connect to an individual’s phone signal if in close enough proximity. (https://www.cbsnews.com/news/d-c-court-rules-warrant-is-required-for-stingray-cell-phone-tracking/). In turn, this allows agencies such as the FBI, ICE, and local police officers to track and identify a person’s location. Id. In 2014, activists and protesters took to social media to bring awareness to the fact that police officers in Chicago, New York, and Los Angeles appeared to be leveraging this software during protests following the murder of Eric Garner. (https://www.rt.com/usa/212915-protesters-chicago-police-stingray/). Organizations such as the National Lawyer’s Guild, are thankfully taking action against such violations of protester’s rights. In 2017, attorney Jerry Boyle filed a suit on behalf of himself and other protesters against the City of Chicago Police Department for the use of stingray technology during protests. (The case appears to still be pending in the Northern District of Illinois. Boyle v. City of Chicago, Case No. 1:17-cv-00244, Jan. 12, 2017).
In situations where Stingray is used, however, officers are not able to disclose the source of the information they obtained using the technology. Thus they employ a technique called “parallel construction,” where officers develop alternate “stories” which follow traditional procedure to describe how information was obtained after using secret surveillance programs. In one such case involving a young man in Florida, the police provide him with a plea deal instead of sentencing him in prison when the defense attorney raised concerns about how the evidence was obtained.( https://www.wired.com/story/stingray-secret-surveillance-programs/).
While these devices are being used on protesters and in other areas of police work, that is not their “advertised” purpose. Police departments who’ve spoken on the use of this technology have alleged that these techniques are critical parts of their counter-narcotics tasks forces’ operations. (https://www.wired.com/story/stingray-secret-surveillance-programs/). Yet, reports have surfaced stating that these surveillance technologies have been employed for a variety of other matters including investigations of Medicaid Fraud. Id.
Likely to no one’s surprise, the use of these devices has been found to be unconstitutional, as it violates the Fourth Amendment. (Jones v. United States, No. 15-CF-322 (Sept. 21, 2017.) While most Americans would likely agree that efficiently capturing those engaged in illegal activities should be a priority, it is not acceptable for such actions to take place in direct conflict with our laws.
The use of other large scale surveillance programs such as, Project Hemisphere, to track citizens is equally worrisome. Hemisphere is essentially a secret program that can “search trillions of call records and analyz[e] cellular data to determine where a target is located.” (https://www.thedailybeast.com/atandt-is-spying-on-americans-for-profit). What’s startling is that in many ways it appears that such programs are a direct result of the capitalist society in which we live. Technological advancements in particular are driven by a rational desire to become more efficient, profitable, calculable and predictable, therefore allowing for a maximization of profits (See George Ritzer, The “McDonaldization of Society”). In the realm of law enforcement, technology that can be leveraged to identify criminals and their associates means more effect apprehension, and in theory a “safer” society. Large corporations such as AT&T are thus incentivized to develop “innovative” technology like Hemisphere and sell it to the highest bidder. While privacy, or eroding privacy, is profitable, it is difficult to imagine a world where the Department of Justice doesn’t purchase such software, and citizens’ tax dollars aren’t being used to spy on them
Hemisphere
The use of other large scale surveillance programs such as, Project Hemisphere, to track citizens is equally worrisome. Hemisphere is essentially a secret program that can “search trillions of call records and analyz[e] cellular data to determine where a target is located.” (https://www.thedailybeast.com/atandt-is-spying-on-americans-for-profit). What’s startling is that in many ways it appears that such programs are a direct result of the capitalist society in which we live. Technological advancements in particular are driven by a rational desire to become more efficient, profitable, calculable and predictable, therefore allowing for a maximization of profits (See George Ritzer, The “McDonaldization of Society”). In the realm of law enforcement, technology that can be leveraged to identify criminals and their associates means more effect apprehension, and in theory a “safer” society. Large corporations such as AT&T are thus incentivized to develop “innovative” technology like Hemisphere and sell it to the highest bidder. While privacy, or eroding privacy, is profitable, it is difficult to imagine a world where the Department of Justice doesn’t purchase such software, and citizens’ tax dollars aren’t being used to spy on them.
How Do We Fix This?
When pausing to imagine potential solutions for this widespread abuse of power and technology one things becomes particularly apparent; our capitalist society must be dismantled. There appears to be a “profit now, privacy concerns later” mentality that is quite alarming. The surveillance state and technology fueling its function will only continue to expand. Police offices no longer have to depend on human activity, that admittedly consists of errors, to apprehend subjects. They can sit in a van and have a fancy program by AT&T do the work for them, and they get to lie about it later.
While judicial intervention on these matters must continue, it is imperative that Congress intervene. The continued use of parallel construction by police departments severely interferes with the ability to obtain a fair trial. “It really gives a lot of power to the executive branch,” says St. Vincent. “It cuts judges out of the role of deciding whether something was legally obtained.” (https://www.wired.com/story/stingray-secret-surveillance-programs/). The curtain must be pulled back so the public can both become aware and provide comment on these practices. Whether police seek to control communities through violent force or secret data acquisition, unconstitutional means shall continue to be challenged. Ironically, protesters taking to the streets may be the necessary catalyst to drawing further attention to these practices.
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|