<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>snooping &#8211; CalWatchdog.com</title>
	<atom:link href="https://calwatchdog.com/tag/snooping/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com</link>
	<description></description>
	<lastBuildDate>Wed, 25 Mar 2015 06:19:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">43098748</site>	<item>
		<title>CHiPS pass around stolen nude photos of suspects</title>
		<link>https://calwatchdog.com/2014/10/29/chips-pass-around-stolen-nude-photos-of-suspects/</link>
					<comments>https://calwatchdog.com/2014/10/29/chips-pass-around-stolen-nude-photos-of-suspects/#comments</comments>
		
		<dc:creator><![CDATA[John Seiler]]></dc:creator>
		<pubDate>Wed, 29 Oct 2014 16:55:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Corruption]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[CHiPS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[California Highway Patrol]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=69686</guid>

					<description><![CDATA[California has come a long way from the innocent days of the &#8220;CHiPS&#8221; TV series of more than 30 years ago, starring Larry Wilcox and the heartthrob of teenage girls]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignright  wp-image-69687" src="http://calwatchdog.com/wp-content/uploads/2014/10/chips.jpg" alt="chips" width="300" height="424" srcset="https://calwatchdog.com/wp-content/uploads/2014/10/chips.jpg 340w, https://calwatchdog.com/wp-content/uploads/2014/10/chips-155x220.jpg 155w" sizes="(max-width: 300px) 100vw, 300px" />California has come a long way from the innocent days of the &#8220;<a href="http://www.imdb.com/title/tt0075488/" target="_blank" rel="noopener">CHiPS</a>&#8221; TV series of more than 30 years ago, starring Larry Wilcox and the heartthrob of teenage girls of that time, Eric Estrada, as state motorcycle cops.</p>
<p>Here&#8217;s latest, from the<a href="http://www.insidebayarea.com/breaking-news/ci_26793090/warrant-chp-officer-says-stealing-nude-photos-from" target="_blank" rel="noopener"> Contra-Costa Times</a>:</p>
<p style="padding-left: 30px;"><em>MARTINEZ &#8212; The California Highway Patrol officer accused of stealing nude photos from a DUI suspect&#8217;s phone told investigators that he and his fellow officers have been trading such images for years, in a practice that stretches from its Los Angeles office to his own Dublin station, according to court documents obtained by this newspaper Friday.</em></p>
<p style="padding-left: 30px;"><em>CHP Officer Sean Harrington, 35, of Martinez, also confessed to stealing explicit photos from the cellphone of a second Contra Costa County DUI suspect in August and forwarding those images to at least two CHP colleagues. The five-year CHP veteran called it a &#8220;game&#8221; among officers, according to an Oct. 14 search warrant affidavit.</em></p>
<p style="padding-left: 30px;"><em>Harrington told investigators he had done the same thing to female arrestees a &#8220;half dozen times in the last several years,&#8221; according to the court records, which included leering text messages between Harrington and his Dublin CHP colleague, Officer Robert Hazelwood.</em></p>
<p style="padding-left: 30px;"><em>Contra Costa County prosecutors are investigating and say the conduct of the officers &#8212; none of whom has been charged so far &#8212; could compromise any criminal cases in which they are witnesses.</em></p>
<p>It also makes you wonder about the intelligence of the officers hired nowadays as CHiPS. Didn&#8217;t they know that, if they could leer into the digital lives of suspects, somebody eventually also could uncover their digital leering?</p>
<p>This also is another reason to cheer the recent decision by Apple to <a href="http://www.wired.com/2014/10/golden-key/" target="_blank" rel="noopener">automatically encrypt </a>all the communications on its devices &#8212; and to reject the FBI&#8217;s objections about the action supposedly compromising national security. <a href="http://www.wired.com/2014/10/golden-key/" target="_blank" rel="noopener">Wired wrote</a>:</p>
<p style="padding-left: 30px;"><em>At issue is the improved iPhone encryption built into iOS 8. For the first time, all the important data on your phone—photos, messages, contacts, reminders, call history—are encrypted by default. Nobody but you can access the iPhone’s contents, unless your passcode is compromised, something you can make nearly impossible by changing your settings to replace your four-digit PIN with an alphanumeric password.</em></p>
<p style="padding-left: 30px;"><em>Rather than welcome this sea change, which makes consumers more secure, top law enforcement officials, including US Attorney General Eric Holder and FBI director James Comey, are leading a charge to maintain the insecure status quo. They warn that without the ability to crack the security on seized smartphones, police will be hamstrung in critical investigations. John Escalante, chief of detectives for Chicago’s police department, predicts the iPhone will become “the phone of choice for the pedophile.”</em></p>
<p>But what if the perverts are in the government?</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2014/10/29/chips-pass-around-stolen-nude-photos-of-suspects/feed/</wfw:commentRss>
			<slash:comments>50</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">69686</post-id>	</item>
		<item>
		<title>Bill would protect cell phone privacy</title>
		<link>https://calwatchdog.com/2012/07/13/bill-would-protect-cell-phone-privacy/</link>
		
		<dc:creator><![CDATA[Joseph Perkins]]></dc:creator>
		<pubDate>Fri, 13 Jul 2012 16:27:42 +0000</pubDate>
				<category><![CDATA[Columns]]></category>
		<category><![CDATA[Rights and Liberties]]></category>
		<category><![CDATA[cell phones]]></category>
		<category><![CDATA[Joseph Perkins]]></category>
		<category><![CDATA[Justice Department]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[Sprint]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[AT&T]]></category>
		<guid isPermaLink="false">http://www.calwatchdog.com/?p=30282</guid>

					<description><![CDATA[July 13, 2012 By Joseph Perkins Is one of every 186 cell phone users a criminal suspect? One might think so in the wake of the revelation this week, in]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.calwatchdog.com/2011/07/18/stopping-carte-blanche-cell-phone-searches/big-brother-is-watching-you4-12/" rel="attachment wp-att-20324"><img decoding="async" class="aligncenter size-medium wp-image-20324" title="big-brother-is-watching-you4" src="http://www.calwatchdog.com/wp-content/uploads/2011/07/big-brother-is-watching-you4-235x300.jpg" alt="" width="235" height="300" align="right" hspace="20" /></a>July 13, 2012</p>
<p>By Joseph Perkins</p>
<p>Is one of every 186 cell phone users a criminal suspect?</p>
<p>One might think so in the wake of the revelation this week, in <a href="http://markey.house.gov/press-release/markey-queries-justice-dept-about-mobile-phone-data-requests-privacy-protections" target="_blank" rel="noopener">a congressional report</a>,  that law enforcement requested data last year from Verizon, AT&amp;T, Sprint, T-Mobile and other carriers on the calls, text messages and, perhaps most ominously, location of more  than 1.3 million of the nation’s 234 million cellular customers.</p>
<p>The growing threat to privacy rights posed by increased police use of secret and, in many cases, warrantless cell phone surveillance underscores the importance of legislation, the California Location Privacy Act, that would require law enforcement to secure a search warrant before accessing location information from any electronic device.</p>
<p>The measure, <a href="http://info.sen.ca.gov/pub/11-12/bill/sen/sb_1401-1450/sb_1434_bill_20120628_amended_asm_v95.pdf" target="_blank" rel="noopener">SB 1434</a>, was approved last week by the Assembly Committee on Public Safety, which followed its approval back in May on the Senate floor. Particularly noteworthy is that the bill, authored by Sen. Mark Leno, the San Francisco liberal, won the support of not only his fellow Democrats, but also Republicans.</p>
<p>That may be attributable in part to questions that remain after the U.S. Supreme Court ruled this past January that law enforcement’s secret attachment of a GPS device on a vehicle constitutes a “search” and therefore requires a search warrant; but it left unsettled whether the same ruling applies to GPS location tracking by way of cell phone.</p>
<p>The U.S. Justice Department maintains that the high court’s ruling, <a href="http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf" target="_blank" rel="noopener">United States v. Jones</a>, does not apply to mobile devices “because there is no trespass or physical intrusion on a customer’s cell phone,” thus no need for law enforcement to obtain a warrant before asking wireless carriers to turn over customer data.</p>
<h3>State action</h3>
<p>Lawmakers in Sacramento see things differently. The majority believe that the constitutional protection against warrantless searches applies not only to cases of trespass or intrusion, but also to secret cell phone surveillance.</p>
<p>And they have codified that in the proposed California Location Privacy Act, which makes it clear to both “government entities” and wireless service providers that a probable cause warrant must be obtained before compromising a cell phone user’s privacy.</p>
<p>The measure would allow exceptions to be made in cases in which a cell phone user has requested emergency services or law enforcement reasonably believes there is immediate danger of death or serious injury to a person or persons.</p>
<p>The one major shortcoming of Leno’s otherwise laudable legislation is that imposes no requirement on cell phone carriers here in California to provide annual reports on the number of law enforcement requests the receive to spy on their cell phone customers.</p>
<p>CTIA-The Wireless Association, a trade group representing the wireless telecommunications industry, <a href="https://www.aclunc.org/docs/technology/cita_opposes_sb_1434_leno.pdf" target="_blank" rel="noopener">sent a letter to Leno</a> this past April opposing such a requirement, arguing that it would “unduly burden wireless providers,” and that it was doubtful that compliance “would best serve wireless customers.”</p>
<p>Yet, the industry already keeps copious records on data requests for purposes of billing law enforcement for those requests. It could easily compile those records into an annual report to the state.</p>
<p>And as to what best serves wireless customers, reporting or not reporting annual law enforcement requests for cell phone records, most of us almost certainly would prefer transparency.</p>
<p>For while we understand that law enforcement needs certain latitude to apprehend criminals, including use of secret cell phone surveillance, safeguards must be in place to ensure that our privacy rights are not routinely trampled upon.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">30282</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-20 03:35:35 by W3 Total Cache
-->