Preview

Mobile Phone Tracking Scrutinized By Nikki Swartz Summary

Good Essays
Open Document
Open Document
718 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Phone Tracking Scrutinized By Nikki Swartz Summary
I Know Your Twenty Cell phones have become the leading source of communication in the world. However, it is not just phone calls or e-mails anymore, someone might take down time to play angry birds or candy crush saga. If your cell phone is left on and completely unattended someone, knows your location. Over 200 million Americans who own a cell phone have been watched on a data base created by the cell phone company, keeping track of tower signals, recording conversations, and making copies of text messages and emails. Even the United States government has gone to the extent to using cell phone information when coming to court evidence and alibies. Parents are becoming technologically aware and are using tracking abilities to keep an eye on their children and their whereabouts. The question remains, where can you draw the line between …show more content…

The article Swartz wrote pointed out to many people that phone companies can track one’s cell phone by tower signals. Swartz also alerted citizens that the government could use similar methods to secretly monitor movements of suspects. The main idea of Swartz’s essay is that the prosecutors have not been successful in accessing court approval to gain evidence against suspects. Swartz quotes, “Prosecutors argue that having such data is crucial to finding suspects, corroborating their whereabouts with witness accounts, or helping build a case for a wiretap on the phone” (302). In the last paragraph of Swartz’s article she soothes people’s conscience by quoting, “[T]he stream of data that carries a telephone conversation or an e-mail message contains a great deal of information, including when and where the communications originated. And that makes it harder for courts to determine whether a certain digital surveillance method invokes Fourth Amendment protections against unreasonable searches”

You May Also Find These Documents Helpful

  • Good Essays

    During their search of Rangel’s home police came across a smartphone in his bedroom which the court described as “a cellular phone that has the ability to store data, photographs, and videos” all of which is crucial. When the police arrived back at the station an investigator searched the phone and found text messages on his phone that put him to the scene of the crime, Rangel’s motion to suppress the text messages was later denied as he then pled no contest.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the 1990’s Mobile Data commercial applications begin to appear with devices like pagers, personal digital assistants (PDA), cell phones with text messaging and laptops. Mobile data also started to disappear this was due to companies started offering better packages that could be used not just locally but nationwide. PDA’s Cellular phone and laptop computers are a huge part of the criminal justice system. (Magnuson, 2009).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the article “That’s No Phone, That’s My Tracker,” by Peter Maass and Megha Rajagopalan, technology proves to be a leading factor in advancements to an Orwellian society. The term “Orwellian” originates from George Orwell, the author of the novel “1984”. The novel revolves around the control of the government as well as the power it has over its’ citizens through invasion of privacy. In the article, it establishes the notion that a phone not only serves its’ purpose to make calls and send text messages, but serves as a type of tracker to be traced by the government. A device that people carry with them on a daily basis is actually an easy access to be observed and monitored through.…

    • 979 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nakashima, E. (November 23, 2007). Cellphone Tracking Powers on Request. The Washington Post. doi: http://www.washingtonpost.com…

    • 1777 Words
    • 8 Pages
    Better Essays
  • Good Essays

    There are so many modern conveniences in the world today, one of them is being able to reach anyone and any moment of the day. With cell phones, or more commonly “smart phones” we can fit dictionaries, video games, applications, and even social interaction into our pocket. The first “cell phone” was made in 1946 by AT&T, weighed about three pounds, and was only able to make three calls in one city simultaneously. Calls had to be manually set up by an operator and you would usually have to wait about 30 minutes to place a call. Today our pocket sized gadgets connect to cell towers automatically and connect us with people around the world in about 30 seconds. Everywhere you turn you will find cell phones and other social…

    • 1381 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The book 1984, George Orwell depicts a world in which technology has advanced so far that the government of Oceania is able to constantly monitor it’s citizens. The actual year 1984 has passed and no such technology existed then; however, our modern technology is fairly similar to that found in the book 1984. Supposedly, the technology in our world is used for a different purpose then that of Big Brother’s world. However, “That’s No Phone. That’s My Tracker,” is an article by Peter Maass and Megha Rajagopalan that focuses on the use of cell phones as surveillance technology. In the article, the writers discuss how cell phones are simply trackers “ that happen to make calls” (Maass, Rajagopalan 1). Although they are a legitimate concern, surveillance…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Better Essays

    English Paper Wiretapping

    • 2159 Words
    • 6 Pages

    Thesis: Wiretapping enables both parties and government agencies to monitor the communications of targeted people to determine if they are doing something wrong. The Government should not have the luxury of imposing on the privacy of Americans without a reasonable doubt as to when they should get a warrant to be able to do so. The Government should not wiretap because it is an abuse of power, distrust, and ethical dilemma, the violation of the Fourth Amendment which involves the collecting and storing information about people who are not criminals to be penalized.…

    • 2159 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Solove, D (2012).United States v. Jones and the Future of Privacy Law: The Potential Far-Reaching Implications of the GPS Surveillance Case. Retrieved on September 4, 2014 from http://docs.law.gwu.edu/facweb/dsolove/files/BNA-Jones-FINAL.pdf…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Sub-Point A, Legality : The Heritage Foundation(1.1) has documented the legal and constitutional precedence for the NSA's data collection programs. In 1976 the Supreme Court ruled that when information is provided to a third party, such as a phone provider, it is accepted that said information may be turned over to the government. Furthermore, in the 1979 case of Smith v. Maryland, it was affirmed that a warrant was not needed to survey phone data. This stands under the fourth amendment, as actual content, or rather the phone conversation itself, is not obtainable, merely phone numbers and call length times are logged by the National Security Agency.…

    • 785 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The creation of chat rooms like my-space, face-book, cell phones, and other personal messaging services has created ethical issues and opportunity for criminals to commit crimes. “Since the wide spread use of computers and the Internet have entered the mainstream of American life. Millions of Americans spend hours every day using computers and mobile devices to send and receive email, surf the Internet, maintain databases, and participate in countless other activities,” (Office of Legal Education Executive Office for United States Attorneys, 2009). The creation and widespread use of social networks have led to ethical problems of protecting the rights citizens and law enforcement agencies. Even though we want law enforcement agents and the government to capture criminals, we want to protect the rights of law abiding citizens. “The Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act of 1986 (ECPA).” (Justice Information Sharing , US. Department of Justice, 2012). “ The onset of computer and other digital and electronic communications prompted the need to make updates to the ACT.” (Justice, 2012) The USA PATRIOT Act and subsequent federal enactments have clarified and updated the ECPA in light of the ongoing development of modern communications technologies and methods, including easing restrictions on law enforcement access to stored communications in some cases. (Justice Information Sharing U.S. Department Of Justice, 2012). “The Electronic Communications Privacy Act (“ECPA”) was passed in 1986 to expand and revise federal wiretapping and electronic eavesdropping provisions. It was envisioned to create “a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement.” Epic.org. (2010). The advances in social networking and telephone communications brought the…

    • 477 Words
    • 2 Pages
    Good Essays
  • Good Essays

    America has become a surveillance society, and we need to find a better balance to protect American civil right. Recent revelations about the National Security Agency’s surveillance programs have triggered diverse responses from the American public. The American Civil Liberties Union has expressed virulent opposition to the government’s alleged privacy intrusions as well as filed a lawsuit over the NSA’s collection of citizens’ telecommunications data. The National Security Agency's mass tracking and collection of Americans' phone call data violates the constitution, has a chilling effect on fourth amendment rights and should be stopped. It has been public information for a decade that the US government secretly, illegally, and unconstitutionally spies on its citizens.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cell Phone Distracting

    • 867 Words
    • 4 Pages

    Most school administrations regard cell phone use as disruptive and distracting, and have implemented policies that prohibits using them on school grounds. Cell phones are a disruption in school. Text messaging can be used to cheat on tests. Students who are text messaging are not able to give full attention to the lesson. If a student cell phone rings in class, it totally disrupts the class for a considerable period of time. Many cell phones are also camera phones. Camera phones present an invasion of privacy in the schools . One of the best ways we can protect the privacy of every student is to ban cell phones from school during the school day.…

    • 867 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Adnan Murder Analysis

    • 824 Words
    • 4 Pages

    However, the state only used four calls during the trial, because of majority of them contradicted their story. In ‘Serial’, “The 3:21 to Jennifer, 3:32 to Nisha, 3:48 to a dude named Phil, 3:59 to Patrick, none of these calls pinged a tower near where Jay tells the cops they were driving that afternoon. Not a one. At trial, though, even though all these mid afternoon calls were identified and accounted for in Jay’s testimony, prosecutors did not point out that the cell towers didn’t match.” Furthermore, the use of cell tower as evidence during an investigation is erroneous. According to Washington Post, Trinz Lopez testified in a 2012 murder case that cell phones first link with a mobile switching center before being routed to a cell tower, which have a range between zero and twenty miles depending on the wattage of the tower and direction of the antennas. The fact that the majority of cell phone records contradict Jay’s story demonstrates the unreliability of his story as evidence of Adnan’s guilt. Furthermore, the use of cell tower evidence in of itself can be considered imprecise due to the multitude of factors that affect the range of a cell tower. So Adnan didn’t have to near Leakin Park for the cell tower in the park to be pinged by his phone. This means that Jay’s story cannot be backed by any physical evidence. Therefore, the use of cell tower evidence by the state to support Jay’s story is erroneous because the use of cell tower records as evidence is…

    • 824 Words
    • 4 Pages
    Good Essays