Cell Phones Argumentative Essay

Improved Essays
The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year.
After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions. Comerford was aware that every phone has an international mobile subscriber identity (IMSI) that could be tracked. However,
…show more content…
The source stated that “Comerford had people arriving at his home at odd hours, and he would come and go in the middle of the night.” The source provided the FBI with Comerford’s cell phone number and wireless provider. The FBI decided to corroborate the anonymous tip. The investigation made use of recently purchased surveillance technology known as “the Chum” that captures the IMSI of cellphones.
IMSI-catching technology, such as the Chum, enables its users to obtain data from cell phones that reveals a phone’s location. The Chum acts as a cell phone tower, receiving signals from cell phones and responding to them every 7-15 seconds. Chum operators are in constant contact with the cell phone they seek to track, however it cannot record or intercept the content of the devices.
In continuation, without a warrant, the FBI set up a single fake cell phone tower in an open field near Comerford’s home and monitored his location using the Chum. Since the FBI knew Comerford’s phone number, they captured his IMSI and narrowed their surveillance to only Comerford’s cell phone. The FBI captured and retained the location data emitting from Comerford’s cell phone. The range of the chum was wide enough where it allowed the FBI to monitor the appellant’s movements outside of his home. The FBI, were unable to track the appellant’s movements or location inside his

Related Documents

  • Improved Essays

    The primary issue with determining IMSI catchers' legality on the state level is that the police haven’t been candid about their use of them to locate suspects and sometimes use obscure terminology when describing them in an attempt to hide their use. Terms that are used to describe IMSI catchers in police reports are digital analyzers, Triggerfish, Kingfish, Amberjack, Hailstorm, WITT (FBI’s “wireless intercept tracking team”), or “confidential source” although there are many times where they decide not to mention the use of the technology at all. Additionally, police have actively hidden this information from defense attorneys in Florida and even sometimes from prosecutors and judges in places such as Baltimore. When police in Baltimore Maryland…

    • 190 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Charles Katz Case Study

    • 531 Words
    • 3 Pages

    Charles Katz was convicted in the Southern California District Court that charged him with wagering gambling information. The Appellate Court rejected the defendants’ disagreement because they concluded that Katzs’ Fourth Amendment right was not infringed upon because FBI agents never actually entered the telephone booth. Facts: Mr. Katz was seen placing calls between three different telephone booths on a daily basis which lead the FBI to place microphones on the outer roof of two of the three telephone booths. One of the telephone booths was out of order. This allowed the agents to intercept and record the phone calls he made regarding gambling information.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    The Rat Film Analysis

    • 1611 Words
    • 7 Pages

    In the next shot, the FBI has arrived at a technician’s home as they have a search warrant. He attempts to destroy all the data; the FBI breaks in and apprehends him. In turns out that the technician has a history of computer fraud which is what the warrant was for; he has been caught two times prior and is being arraigned for a third offense. They also learn that he is a highly skilled hacker who managed to cripple the FBI’s database the year before. The technician known as Theodore Finch, known as “Rat”, warns that he can hack anything from money, secret information, and even mildly “sexual fantasies” with a simple numerical binary code in any place and at any time, he wishes.…

    • 1611 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Watergate For the next year, the Nixon Administration had kept their illegal tactics to themselves as they continued to taunt Ellsberg and everyone one the enemy list. (until they got caught...) On June 17th, 1972, five members of Nixon 's Administration were arrested as they were found to have broke in the Democratic National Convention headquarters at The Watergate Hotel. They had broke in numerous times.…

    • 1446 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As Senator Barry Goldwater has famously said “I would remind you that extremism in the defense of liberty is no vice! And let me remind you also that moderation in the pursuit of justice is no virtue.” Are Americans willing to give up any expectation of digital privacy when traveling just to feel safe? Even if you have nothing to hide, the vulnerability (and access of digital information) provides an immense amount of data – of which may well be used against you in the future. Subsequently, are we willing to violate the digital rights of foreigners entering the country merely because they are traveling from Muslim countries?…

    • 793 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The events of September 11, 2001 will never be forgotten by the American people. One of the largest changes made in the United States after 9/11 was the introduction of the USA Patriot Act on October 26, 2001. The act allows US government agencies to easily gain access to the private records of people within the United States. The records include phone records, banking statements, and credit reports. Without any limits on the power of government agencies, the possibility of infringing on the rights of private citizens arises.…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dk Dbq Analysis

    • 578 Words
    • 3 Pages

    The use of technology have played a big role in our everyday lives and it is continuing to advance to the net level. But what happens when that technology is used against us? For the past 20 years the use of technology within the government has raised numerous constitutional questions. One question in particular was asked in the case of DLK v. United States. Agents of the government used a thermal imager to scan DLK’s house from outside.…

    • 578 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Contraband In Prison

    • 677 Words
    • 3 Pages

    There are a lot of things that one may consider contraband. These items can be very dangerous to fellow officers as well as the inmates. Like the article states, "In prison, contraband can mean life or death." (Crohsc 2014) Cell Phone in particular is one of the few but many that can be harmful to society and the correction institution.…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    NBC Miami recently featured a story regarding a danger in our correctional facilities. Contraband cell phones have been a huge issue recently. Being brought into facilities by visitors, and even drones; the issue has resulted in dangerous conditions both inside and outside the facility walls. Robert Johnson is a former corrections officer, who's personally been affected by the illegal devices, is lobbying to get legislation passed to require technology to stop the problem. Partnering with Securus Technologies as a consultant, the former guard has been promoting wireless containment systems as a solution.…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Digital Evidence Analysis

    • 593 Words
    • 3 Pages

    The investigative workload can easily double when each party has a cell phone or other electronic items because of the time and effort required to extract and sift through information from a single device (Goodison, Davis & Jackson, 2015). When collecting digital evidence, law enforcement need to constantly adapt to the…

    • 593 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the United States ninety percent of Americans own a cell phone (“Mobile Technology Fact Sheet”.) Nowadays, Americans use their mobile phones for many things from checking the weather to watch a movie. Cell phones are essential for every day communication and have become one of the top priorities for users. Cell phones are lifesavers and makes life easier.…

    • 879 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Can you imagine life in school without being able to use cell phones? It sounds really weird right? Well, that’s I will be talking about in this argumentative essay is whether cell phone usage should be allowed in school or not. I will be talking about why cell phones should not be allowed in school.…

    • 365 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Many people are concerned about the dangers that cell phones pose, and they are told that keeping it a greater distance from their heads and using devices such as headphones can diminish much of the radiation; all of which is true. Unfortunately, since the technology industry has made the invention of wireless headphones, if people use their cell phones in conjunction with these devices, the radiation dosage can be even greater than normal. Using Bluetooth, the main type of wireless communication between devices, can have just as much electromagnetic radiation as talking on the phone. One team realized this and began to test the power density rating and the specific absorption rate (SAR), both of which measure radiation dosages. This team…

    • 1625 Words
    • 7 Pages
    Improved Essays