Professional Documents
Culture Documents
Brett Hansen
CST 300
October 11, 2015
Big Brother Lives in Your Pocket
The cellular phone has gone from an unwieldy plaything of the wealthy to the versatile
tool of the masses. It goes with us everywhere, connecting us to our world, helping us explore it,
navigate it and even manage it. However, this power comes with an insidious dark side. For most
people, these quiet companions are within arms reach at all times; in a sense our entire lives
flow through our phones and over the networks of our cellular service providers. Everything that
passes through a cell network is documented and retained by the provider for a period of time
determined by the provider, and these records pose a possible threat to privacy. Under current
legislation, providers are legally required to disclose any information that they have gathered to
law enforcement and government agencies, and with the advent of legislation such as the Patriot
Act, this can be done without a public warrant. Citizens may use tools such as cryptographic
systems in an effort to make their data secure, unfortunately there is some debate as to whether
citizens are obligated to divulge access keys, a policy which may be a violation of constitutional
law and a citizens reasonable right to privacy (McCullagh, 2007). These issues are building a
social and political climate which is hostile to the idea of privacy. Googles CEO Eric Schmidt
famously said If you have something that you don't want anyone to know, maybe you shouldn't
be doing it in the first place. (Esguerra, 2009). Instead of demonizing the idea of privacy, we
should foster a culture which respects the right of an individual to have privacy and the
possibility of anonymity. In short, the data gathering, retaining, and divulging practices of major
telecommunications companies are a threat to privacy and must be amended at the regulatory
level.
Cellphones as we know them today are a fairly recent innovation. The original cell phone
Big Brother Lives in Your Pocket 2
was the Carterphone, a complicated and unwieldy machine which connected a landline to a 2-
way radio to offer some semblance of mobility within a range of the landline. However, the first
proper cell phones went into production in the mid 1980s. These were the gigantic grey bricks
which had no voicemail, no real features to speak of and their cost was measured in the
thousands of dollars when adjusted for inflation. Gradually we began to see the size and cost
shrink, while features began to grow. First we began to see the inclusion of dedicated voicemail.
Then, in the mid to late 1990s, we saw the advent of SMS text messaging. This particular
innovation was key to the proliferation of cellphones because it pushed the boundaries of the cell
phone beyond merely voice: we had begun to send non-voice data through the mobile networks,
opening up huge avenues of usage. After this, the next logical step was to start sending different
types of data through mobile networks; thus we began to get mobile internet, and email access.
The power of the cell phone began to grow and we funneled more and more of our lives through
it. The rise of social media meant that for many, our experiences also began to flow through the
cell system as all of our accomplishments, memories and relationships were recorded through
our phones. Today, we stand at a point where there is no aspect of our lives that a cell phone
does not touch: our location, our calls, our texts, our emails, our recordings and photos, our
browsing history, and even our banking details are all present in our phones. Thus, as a cell user
goes through their daily lives the cellular carrier logs metadata and develops records containing
sensitive information including IP logs and location access. In some cases, this data may be
As one would expect from such a pervasive aspect of a persons life, the court has taken
steps to regulate every facet of cellphone technology and usage. There is a major debate raging
between pro-government rights groups and pro-citizens privacy groups such as the ACLU over
Big Brother Lives in Your Pocket 3
what, if any, expectations of privacy a citizen should have. Of the most basic facts being
contested is who owns the data collected by cell carriers. Civil groups argue that since user
activities generate the logs, the data must belong to the user. By contrast, government groups
argue that since the carrier develops and retains these logs, the carrier owns those logs and can
utilize them in whatever manner they choose, provided it is in keeping with the carriers lawful
privacy policy. In a groundbreaking 2015 decision by a panel of 11th Circuit judges, the judges
affirmed the so called 3rd party doctrine in relation to cell location data. This means that cell
location data is the property of the cell carrier rather than the user. As a result, such data is not
subject to the 4th amendment proscription against unreasonable search and seizure (Greenberg,
2015). This reversal of earlier rulings which ruled in favor of citizens may show a shift in the
The issue of cellular data retention by carriers is further muddled because there has not
been adequate regulation of what data must or may not be retained. As such, it is up to the
discretion of the risk management departments of private companies to decide on a data retention
policy. As such, some carriers will have data retention policies which are more liberal in their
gathering of data and others will have more conservative policies. In a freedom of information
act request initiated by the American Civil Liberties Union, hereafter referred to as the ACLU, it
was found that Virgin Mobile even went so far as to retain text message content for up to 90 days
after transmission; by contrast, no other major cell provider retains text message content at all
(2010). In the absence of any regulatory governance, compliance departments are left guessing at
what the right amount of retention is, leading cell providers to possibly overstep the bounds of
privacy. Many of these issues could be avoided by a legislative solution dictating precisely what
may or may not be retained as a way of protecting both citizens and corporations alike.
Big Brother Lives in Your Pocket 4
One interesting facet to this whole debate is the dichotomy between the laws treatment
of the physical device of the cell phone and the treatment of data regarding a cell phones usage.
In 2014, a major Supreme Court decision upheld the obligation of officers to obtain a warrant
before searching a suspects phone. The court was sensitive to the role which cell phones play in
peoples lives, with Chief Justice Roberts noting that cell phones are such a pervasive and
insistent part of daily life that the proverbial visitor from Mars might conclude they were an
important feature of human anatomy. (Liptak, 2014). This division is indicative of a difference
between the treatment of data when it is stored on servers and data when it is stored on a local
device. The proliferation of cloud services makes it all the more imperative that a clear legal
precedent is given regarding the ownership of data when it is stored by a user in a 3rd party
service.
The major sticking point for groups like the ACLU is the circumstances under which Law
Enforcement Officers, hereafter referred to as LEOs, are allowed to utilize cellular data to their
own advantage. The major uses of telecommunications data by law enforcement are: utilizing
location data for tracking purposes, reviewing metadata for investigative purposes, and utilizing
As was previously stated, location tracking has recently been ruled as a constitutionally
legal action by the 11th Circuit court. The usage of metadata by LEOs is a topic for debate. In
recent years a portion of the Patriot Act, known as the National Security Letter Statute, has come
into play and has changed the legislative landscape of metadata privacy. The National Security
Letter statute allows the FBI to serve service providers with a national security letter which
forces said providers to turn over requested information. The NSL is made all the more powerful
because it is created without a warrant requirement, allowing agencies to access cellular and
Big Brother Lives in Your Pocket 5
other data without any judiciary oversight. Additionally, it gags said providers and prohibits
them from disclosing anything regarding them being served (EFF, 2014).
The last major usage of cell data by law enforcement comes in the form of surreptitious
surveillance. One way in which LEOs can utilize cell phones in a surveillance capacity comes in
the form of the roving bug technique. This involves law enforcement utilizing carrier resources
to remotely turn on a phones microphone in order to listen in on the phones surroundings. What
makes this especially interesting is that in many cases, this can be done even when the phone is
turned off provided that the battery is inserted (McCullagh, 2006). This means that any cell
phone can be surreptitiously utilized as a spying tool at any time with no more than the flip of a
switch. Another major technology utilized by law enforcement for surveillance is the Stingray
technique which hackers often utilize. The LEO places a stingray device which electronically
looks and acts like a standard cellular tower. It functions as a normal cellular networking tower
would, routing cellular call traffic, SMS data, location data and data utilized for apps,
multimedia, email, and internet functionality. However, it logs all the traffic passing through it in
order to intercept communications (FOIA). This can be extremely effective when utilized by law
enforcement for surveillance and investigation, however it also has the capacity to invade the
privacy of innocent bystanders who utilize the dummy cell tower. Since the Stingray System is
untargeted, any usage of it may trap data of a targeted suspect, but it will also record the data of
any other nearby cellular users. This could be seen as an invasion of privacy, or as necessary
The biggest shareholder in favor of reducing the mandated rights of privacy are law
enforcement organizations and government agencies. Law enforcement is fighting a war against
Big Brother Lives in Your Pocket 6
criminal and terrorist element which are growing ever more technologically savvy and
sophisticated. In order to compete with this new breed of criminal, law enforcement agencies
argue that they need to be able to bring the full might of the technologies at their disposal to bear.
The position of law enforcement is in favor or reduced access to cryptography for non-law-
enforcement personnel and an expedited road to accessing cellular data, bypassing the traditional
warrant system. They argue that this will have the effect of expediting law enforcement and
In 2014, FBI Director James Comey argued that widely available cryptography systems
advocated the use of a back door built into major cryptography systems utilized by mobile,
desktop, and integrated devices designed to be used by law enforcement agencies. He believes
that such a system will give law enforcement the agility they need to compete with criminals
utilizing publicly available technology. Detractors of this theory point out that a back door offers
huge security vulnerabilities that no amount of architecture or engineering can surmount. They
suggest that the risk of the system being broken is too great as the system would only remain
Another important facet of law enforcements position comes in the form of increasing
mandatory data retention policies for cellular service providers. As of now the only major
telecommunications provider which retains SMS content data is Virgin Mobile, who retains such
data for up to 90 days. Another standout company which gathers an extreme amount of user data
is Verizon, which retains IP transaction logs for up to 60 days from transmission (ACLU 2010).
Every provider has their own retention standards limiting the amount of data that law
enforcement has access to. This leaves law enforcement in a quandary, since there is no
Big Brother Lives in Your Pocket 7
guarantee that a cellular provider will have retained the data which they require. However,
policymakers must be careful in setting retention practices too high as the overhead of data
storage may be unfeasible for smaller cellular providers or startup companies without the
We have already talked in depth about the NSL statute which allows the pulling of
cellular data without any demonstration of reasonable suspicion of wrongdoing. An ideal future
for law enforcement would include taking the NSL statute and pulling it out from the shadows of
the Patriot Act, which will eventually expire. Instead of keeping it as a police power which may
be revoked by congress or expire, they would want the powers of warrantless cell tapping, record
requisitioning, and cell phone location access to be federally endowed and protected. This would
allow for law enforcement agencies to build their investigative policies and structure around the
ability to completely examine every part of a suspects cellular life within a set period of time.
There are also significant public health uses for cellular data. One of the most important
changes to the public 911 service over the past few years has been the migration to the E-911
system. This system overhaul is designed so that when a wireless caller dials in to 911, the
cellular carrier is automatically forced to transmit the users current location and subscriber
information to the dispatch office which is answering the call (FCC.gov, n.d.). This is a hugely
powerful tool which can help in search and rescue situations, dissuade prank callers who tie up
valuable resources, as well as regular dispatch scenarios where it may otherwise difficult to
The other major stakeholder in this debate are the cell users themselves, as represented by
non-governmental organizations such as the ACLU and the Electronic Frontier Foundation.
Big Brother Lives in Your Pocket 8
Their perspective is that privacy is extremely important to free speech and to the liberty of the
people, and as such it should be protected. One of the most important features about the internet
is its ability to let people anonymously interact and exchange ideas. Individuals are allowed to
explore and converse without fear of repercussion or censorship. Glenn Greenwald argues that
this feeling of safety and liberty serves an important psychological function as well. In fact, he
argues that privacy facilitates creativity and intelligence as people will behave differently if they
know they are being watched. He argues that in a system of constant monitoring, the only
wield political power (Greenwald, 2014). This can be problematic for many reasons as it can
There are also cases where people freely using their cellular devices can be detrimental to
the public image of police officers as they can uncover corruption at the street level. This can
have a huge negative impact on the recording citizens lives. There are several documented cases
of individuals recording incidents of police misconduct only to be arrested or sued for something
which is not a crime in most jurisdictions. Without the ability to safely use their devices to record
malfeasance may be hidden as individuals may not be willing to incur the wrath of law
enforcement organizations. One particularly well known case is that of motorcyclist Anthony
Graber, who was cut off by an off duty plain clothes police officer who proceeded to exit his
vehicle with a pistol drawn without identifying himself. He then shouted at Graber to dismount
from his motorcycle and only identified himself as a law enforcement officer after he had closed
the distance and put a hand on Grabers vehicle to restrain him. Graber posted a video taken by
his helmet camera to the video sharing site Youtube in order to demonstrate the unprofessional
Big Brother Lives in Your Pocket 9
behavior exhibited by the officer. He was promptly arrested and tried for wiretapping charges, a
charge carrying up a 16-year sentence (Shin, 2010). The case was eventually thrown out, but it
may show a rational basis for the fear which people may have in coming forward if their
Ironically, the primary decision maker which will have the biggest impact on the issue of
cellular privacy going forwards will not be either of our major stakeholders. Instead,
governmental groups must influence the primary decision maker through their comportment, and
their mature, responsible, and necessary usage of the powers allotted to them. The people, in
turn, must influence the primary decision maker by continuing to lobby and not letting the issue
go. The big choices which will lead to resolution must come from the judicial branch of
government. The Supreme Court must clarify the rights of citizens with regards to cellular
privacy. In this debate, there are two mutually exclusive options with one option favoring the
powers of law enforcement and government agencies and the other favoring the rights of
citizens.
If the legal landscape changes to favor government agencies and law enforcement, this
will mean a few things. First and most importantly, the miscellaneous statutes of the Patriot Act
which pertain to digital communication and cellular devices must be decoupled from the Patriot
act and made permanent powers in the domain of federal, state, and local police. It is worth
noting that, in California at least, local governments are already given access to stingray devices
and engage in cell interception without incident (FOIA Release, n.d.). In this case, legislation
would dictate that citizens have no ownership of their metadata or any other data collected by
carriers involving their cellular device. Lastly, police would need to gain the power to seize and
search phones on sight, as the push button ability to erase a cellphones data can be difficult for
Big Brother Lives in Your Pocket 10
law enforcement to overcome. There is a big upside to this as it gives a strong edge to law
enforcement agencies in investigations, increasing both speed and efficacy of investigations and
reducing court time spent producing warrants. However, there is also a large potential downside
as the system these policies make has the potential for abuse as there is no independent agency to
regulate the interface between privacy rights and the investigations of agencies. This risk of
abuse could be mitigated by developing an independent agency charged with protecting citizens
The other possibility is for the legal landscape to shift the other way and move towards
supporting the rights of citizens to cellular privacy. This would involve strengthening the agency
of citizens with regards to their rights over their own data. By legally making cellular data the
sole property of the individual and enforcing the warrant system, a law enforcement agency
would be forced to serve a warrant to an individual if they wanted to access cell data on that user.
Privacy would be helped by the addition of legislation which preserves the right of individuals to
not divulge access keys or codes of cryptographic systems to law enforcement. Additionally, this
scenario would ideally repeal the parts of the Patriot act dealing with warrantless wiretapping
and data collection. The upside of this policy is that it ensures that citizens are informed about
the ways in which enforcement agencies use their data and protects citizens from secretive
investigative actions by government groups. However, this policy comes with a very big
downside in that it may hamstring the efforts of law enforcement agencies and in doing so turn
In coming to my point of view, I make the assumption that power, by necessity, corrupts
and that the application of increased police power will necessarily lead to insecurity and misuse.
A prime example of government misconduct in the field of cybersecurity comes in the form of
Big Brother Lives in Your Pocket 11
the 1990s NSA Clipper Chip initiative. This was a short lived and much maligned project by the
NSA which aimed at encouraging the wide adoption of the Clipper Chip cryptographic system
which had a built in backdoor for law enforcement agencies to decode any message they pleased.
This escrow key system, paired with the secretive nature of the Skipjack encryption scheme used
meant that prospective users were uneasy about the security of the system and instead migrated
to emerging open source alternatives such as PGP. AT&T researcher Matt Blaze later published
work showing that the system was deeply flawed and insecure (CryptoMuseum, n.d.). Had this
hardware system been widely implemented, the results could have been absolutely disastrous.
Regardless of the strengths of arguments in favor of expanded police powers, the cost of
security is too high. The ethical virtue of freedom and liberty are far too threatened by the
expansion of police powers into the realm of cellular data. The citizens essential rights to
privacy must be preserved. To this end, cellular providers should engineer their systems to gather
and retain as little information as possible so that there is nothing for government agencies to
subpoena. Cell providers must do more with regards to zealously and vigilantly protecting the
fundamental right of privacy for their users. By forcing regulatory agencies to seek outside
approval for device seizures, wiretaps, cell interception and record seizures, we put a balance on
a very expansive police power. By reducing the data retention requirements for telecom
companies we are ensured that our past can stay in the past.
The opposing viewpoint does have many strengths to it and there are worries concerning
enhancing the privacy rights of citizens to the detriment of police powers. Enhancing police
power does give the police a measure of agility. Law enforcement would be able to access
records regarding contacts and discussions and even present/past location in a manner of
seconds, giving them the ability to respond with a high situational understanding very quickly.
Big Brother Lives in Your Pocket 12
Additionally, a policy of citizen privacy does curtail the powers of civil agencies who work to
keep the populace safe. This could have an adverse effect on crime, or even on major domestic
events such as terrorist attacks. Furthermore, this could lead certain investigations to dead ends
as cell users could destroy their devices or migrate to disposable cellphones purchased
Citizens can speak up and make a difference in this ongoing debate. A great first step is
to write to the legislature regarding forthcoming legislation. Californian senator Diane Feinstein
is on a Senate Subcommittee on Privacy, Technology, and the Law which has a huge impact on
technology policy at the national level. There are other ways to get involved by talking to groups
like the ACLU and the Electronic Freedom Frontier. However, the single most important step
you can take is to simply be informed and remain up to date on these issues so that you are not
The cellular phone is a powerful tool for good, but it has the power to limit us as well. It
is up to us to protect our rights with regards to privacy and demand a higher standard of
protection from our service providers. This recommendation focuses on individual liberties to the
possible detriment of public safety and justice. This is justified because without individual
liberty, the ability of the government to interfere with the lives of citizens is too strong.
Big Brother Lives in Your Pocket 13
References
ACLU. (2010, August). Cell Phone Location Tracking Request Response Cell Phone Company
phone-location-tracking-request-response-cell-phone-company-data-retention-chart
http://www.cryptomuseum.com/crypto/usa/clipper.htm
EFF (2014, March 5). National Security Letters: FAQ. Retrieved October 12, 2015, from
https://www.eff.org/issues/national-security-letters/faq
Esguerra, R. (2009, December 10). Google CEO Eric Schmidt Dismisses the Importance of
https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy
FCC. (n.d.). 9-1-1 and E9-1-1 Services. Retrieved October 12, 2015, from
https://www.fcc.gov/encyclopedia/9-1-1-and-e9-1-1-services
FOIA-Release-02072013-OCR.pdf
Greenberg, A. (2015, May 6). Court Rules Cellphone Data Belongs to Your Phone Carrier, Not
http://www.slate.com/blogs/future_tense/2015/05/06/blow_to_cellphone_privacy_flip_fl
op_court_case_says_data_belongs_to_you.html
Greenwald, G. (2014, October 1). Transcript of "Why privacy matters" Retrieved October 12,
2015, from
http://www.ted.com/talks/glenn_greenwald_why_privacy_matters/transcript?language=e
n#t-1140902
Big Brother Lives in Your Pocket 14
Liptak, A. (2014, June 25). Major Ruling Shields Privacy of Cellphones. Retrieved September
search-privacy.html?_r=0
McCullagh, D. (2006, December 4). FBI taps cell phone mic as eavesdropping tool - CNET.
eavesdropping-tool/
McCullagh, D. (2007, December 14). Judge: Man can't be forced to divulge encryption
man-cant-be-forced-to-divulge-encryption-passphrase/
Rosenblatt, S. (n.d.). FBI director demands access to private cell phone data - CNET. Retrieved
private-cell-phone-data/
Shin, A. (2010, June 16). Traffic stop video on YouTube sparks debate on police use of Md.
dyn/content/article/2010/06/15/AR2010061505556.html