Cell Phones Argumentative Essay

Improved Essays
The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year.
After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions. Comerford was aware that every phone has an international mobile subscriber identity (IMSI) that could be tracked. However, he thought such IMSI operated through the phones GPS and was unaware that data obtained from the IMSI could be obtained even if the GPS-tracking was disabled and if his phone was not being used but was powered on. The Federal Bureau of Investigation (FBI), received an anonymous tip on March 17, 2012, that Comerford was involved with selling or dealing drugs.
…show more content…
The source stated that “Comerford had people arriving at his home at odd hours, and he would come and go in the middle of the night.” The source provided the FBI with Comerford’s cell phone number and wireless provider. The FBI decided to corroborate the anonymous tip. The investigation made use of recently purchased surveillance technology known as “the Chum” that captures the IMSI of cellphones.
IMSI-catching technology, such as the Chum, enables its users to obtain data from cell phones that reveals a phone’s location. The Chum acts as a cell phone tower, receiving signals from cell phones and responding to them every 7-15 seconds. Chum operators are in constant contact with the cell phone they seek to track, however it cannot record or intercept the content of the devices.
In continuation, without a warrant, the FBI set up a single fake cell phone tower in an open field near Comerford’s home and monitored his location using the Chum. Since the FBI knew Comerford’s phone number, they captured his IMSI and narrowed their surveillance to only Comerford’s cell phone. The FBI captured and retained the location data emitting from Comerford’s cell phone. The range of the chum was wide enough where it allowed the FBI to monitor the appellant’s movements outside of his home. The FBI, were unable to track the appellant’s movements or location inside his home. Furthermore, the data provided showed that Comerford traveled to the same place at the same time for 23 days. Beginning on March 17, 2012 and ending on April 8, 2012, Comerford traveled from his home to a downtown warehouse every evening at 11:30 p.m. On April 8th, the FBI began to physically follow Comerford, upon physical surveillance they saw Comerford meet with William DeNolf and Matthew Costello. Both DeNolf and Costello have been tied to terrorist organizations such as Al-Qaeda and have a documented history of illegal sales of military-grade arms. FBI agents Pettitte and McHale drafted a search warrant and had the on-call judge, Peter Kemper, authorize the warrant. The warrants were granted on April 9th 2012 and were then executed. Upon searching the warehouse, they found documents indicating that Comerford had arranged to purchase a “dirty bomb” from DeNolf. Also found in Comerford’s home and

Related Documents

  • Improved Essays

    Dk Dbq Analysis

    • 578 Words
    • 3 Pages

    The use of technology have played a big role in our everyday lives and it is continuing to advance to the net level. But what happens when that technology is used against us? For the past 20 years the use of technology within the government has raised numerous constitutional questions. One question in particular was asked in the case of DLK v. United States. Agents of the government used a thermal imager to scan DLK’s house from outside.…

    • 578 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The primary issue with determining IMSI catchers' legality on the state level is that the police haven’t been candid about their use of them to locate suspects and sometimes use obscure terminology when describing them in an attempt to hide their use. Terms that are used to describe IMSI catchers in police reports are digital analyzers, Triggerfish, Kingfish, Amberjack, Hailstorm, WITT (FBI’s “wireless intercept tracking team”), or “confidential source” although there are many times where they decide not to mention the use of the technology at all. Additionally, police have actively hidden this information from defense attorneys in Florida and even sometimes from prosecutors and judges in places such as Baltimore. When police in Baltimore Maryland…

    • 190 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    “Let’s stop calling them cellphones, call them trackers” (that’s no phone). With cellphones everywhere you go you can get tracked. If you get lost it can tell you exactly where you are at. Also if you leave your phone somewhere you can track your lost phone and find it where ever it’s at. This states how technology can track you…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Watergate For the next year, the Nixon Administration had kept their illegal tactics to themselves as they continued to taunt Ellsberg and everyone one the enemy list. (until they got caught...) On June 17th, 1972, five members of Nixon 's Administration were arrested as they were found to have broke in the Democratic National Convention headquarters at The Watergate Hotel. They had broke in numerous times.…

    • 1446 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As Senator Barry Goldwater has famously said “I would remind you that extremism in the defense of liberty is no vice! And let me remind you also that moderation in the pursuit of justice is no virtue.” Are Americans willing to give up any expectation of digital privacy when traveling just to feel safe? Even if you have nothing to hide, the vulnerability (and access of digital information) provides an immense amount of data – of which may well be used against you in the future. Subsequently, are we willing to violate the digital rights of foreigners entering the country merely because they are traveling from Muslim countries?…

    • 793 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    For example, in the article "That 's No Phone. That 's My Tracker. " it states, "In just the past few years, cellphone companies have honed their geographic technology, which has become almost pinpoint… If someone knows exactly where you are, they probably know what you are doing.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The Rat Film Analysis

    • 1611 Words
    • 7 Pages

    In the next shot, the FBI has arrived at a technician’s home as they have a search warrant. He attempts to destroy all the data; the FBI breaks in and apprehends him. In turns out that the technician has a history of computer fraud which is what the warrant was for; he has been caught two times prior and is being arraigned for a third offense. They also learn that he is a highly skilled hacker who managed to cripple the FBI’s database the year before. The technician known as Theodore Finch, known as “Rat”, warns that he can hack anything from money, secret information, and even mildly “sexual fantasies” with a simple numerical binary code in any place and at any time, he wishes.…

    • 1611 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    This is associated with wiretapping because wiretapping records telecom communications such as text messages and phone calls. The ACLU briefly states that “ Section 215 allows the Federal Bureau Investigation to force cellular phone companies in handing over cellular data records without any warrant present. ”(www. ACLU.org). This is highly unlawful because the Fourth Amendment protects you from unlawful searches and seizures.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Contraband In Prison

    • 677 Words
    • 3 Pages

    There are a lot of things that one may consider contraband. These items can be very dangerous to fellow officers as well as the inmates. Like the article states, "In prison, contraband can mean life or death." (Crohsc 2014) Cell Phone in particular is one of the few but many that can be harmful to society and the correction institution.…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    NBC Miami recently featured a story regarding a danger in our correctional facilities. Contraband cell phones have been a huge issue recently. Being brought into facilities by visitors, and even drones; the issue has resulted in dangerous conditions both inside and outside the facility walls. Robert Johnson is a former corrections officer, who's personally been affected by the illegal devices, is lobbying to get legislation passed to require technology to stop the problem. Partnering with Securus Technologies as a consultant, the former guard has been promoting wireless containment systems as a solution.…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Digital Evidence Analysis

    • 593 Words
    • 3 Pages

    The investigative workload can easily double when each party has a cell phone or other electronic items because of the time and effort required to extract and sift through information from a single device (Goodison, Davis & Jackson, 2015). When collecting digital evidence, law enforcement need to constantly adapt to the…

    • 593 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Many people are concerned about the dangers that cell phones pose, and they are told that keeping it a greater distance from their heads and using devices such as headphones can diminish much of the radiation; all of which is true. Unfortunately, since the technology industry has made the invention of wireless headphones, if people use their cell phones in conjunction with these devices, the radiation dosage can be even greater than normal. Using Bluetooth, the main type of wireless communication between devices, can have just as much electromagnetic radiation as talking on the phone. One team realized this and began to test the power density rating and the specific absorption rate (SAR), both of which measure radiation dosages. This team…

    • 1625 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Can you imagine life in school without being able to use cell phones? It sounds really weird right? Well, that’s I will be talking about in this argumentative essay is whether cell phone usage should be allowed in school or not. I will be talking about why cell phones should not be allowed in school.…

    • 365 Words
    • 2 Pages
    Improved Essays