This Hacker Exposed Secret Government Surveillance Dragnet While Serving Time In Prison

Massive Police Surveillance Dragnet Uncovered By Hacker While Serving Time In Prison

โ€˜Truth & Powerโ€™ Shows How Citizens Are Fighting Back Against Government Surveillance Dragnet

Referred internally by the Federal investigators as the โ€œHackerโ€ (even though he was never accused of hacking-related crimes), Daniel Rigmaiden, a 27-year-old thief who was arrested by the federal agents in March 2008 and finally ended up in police custody, decided to find out how did the feds found his location. For those who do not know, Rigmaiden had made a half-million dollars by filing fraudulent tax returns by using the identities of dead people before getting arrested.

To his surprise, he found out that police secretly used controversial cell phone spyware called โ€œStingRaysโ€, or โ€œcell site simulatorsโ€ to track his (and many others) location and not just those accused of terror-related crimes.

The briefcase-sized device basically mimics a cell tower, letting authorities to track down a suspect by intercepting their cell phone and collecting phone numbers of those they communicate with. They can be placed on squad cars, into backpacks or even mounted on a fixed structure like a control tower. In some cases, the actual content of calls can also be collected. Whatโ€™s most concerning, activists say, is potential dragnet surveillance of areas where the device is being used, because Stingrays also eat up information from phones in the targetโ€™s vicinity. Its existenceโ€”and what itโ€™s being used forโ€”is so secret that even judges have objected to its use without court authorization.

Rigmaiden’s discovery now is also the subject of a 10-part series television documentary, โ€œTruth and Power,โ€ airing Fridays at 10 p.m. ET/PT on Pivot. โ€˜Truth and Powerโ€™ is executive produced by award-winning filmmaker Brian Knappenberger (The Internetโ€™s Own Boy: The Story of Aaron Swartz) and narrated by Oscar-nominated actress Maggie Gyllenhaal.

This series will highlight stories of ordinary people going to extraordinary lengths to expose large-scale injustice: from corporations getting profitable government contracts for dangerous private prisons, to governments using data-gathering technology to scoop up huge amounts of information about their citizens. The series unpacks the timely issues of security, surveillance, and profiteering in the digital age, using probing interviews, original footage, and newly unearthed documents.

Prompted by Rigmaiden’s discovery, American Civil Liberties Union (ACLU) is hoping to find out how many police agencies have such stingray devices placed in America. In 2014, the ACLU launched a nationwide search for police departments that own StingRays. So far, the ACLU has identified the device in 59 agencies across 23 states and the District of Columbia, including New York State Police have been using these devices to snoop on citizens. That number could be much higher, as the researchers say they are limited by the fact that โ€œmany agencies continue to shroud their purchase and use of StingRays in secrecy.โ€

However, all their efforts started because of Rigmaiden, a convicted felon serving time in an Arizona prison.

โ€œDaniel clearly was a criminal. Nobody disputes that. … But when he makes this discovery, he meets this broader community thatโ€™s fighting for [privacy] rights, and by the time heโ€™s actually [out of jail], heโ€™s still completely obsessed with it. And he believes the technology is wrong. And that itโ€™s wrong for the public,โ€ says Knappenberger.

Confounded by how the authorities were able to uncover his whereabouts, Rigmaiden sifted through hundreds of court documents of his case sitting in his jail cell, and later exposed the use of Stingray by police. His research led him to understand that the devices โ€œspoofโ€ nearby cell phone towers, and basically trick a cell phone into feeding data to whoever owns the StingRay. He later learned that the tool that was primarily developed by the military had increasingly found its way into the hands of local law enforcement agencies and the FBI for routine investigations.

Once he made this discovery, Rigmaiden began reaching out to well-known privacy experts, trying to persuade them to get interested in his case. Rigmaiden felt there was a serious privacy breach happening while most people he contacted figured he was a lunatic.

โ€œYou have this guy claiming that the government used a secret surveillance technology to send signals through the wall of his house to track him,โ€ Christopher Soghoian, the principal technologist for the American Civil Liberties Union, says in the film. โ€œThis is straight-up paranoid conspiracy theory stuff.โ€

Even then, Soghoian decided to look into Rigmaidenโ€™s claims, as StingRays cannot be used to target just one individual, because they often pick up lots of peopleโ€™s cell phone data. As a privacy advocate, Soghoian was shocked. โ€œThereโ€™s no way to use it like a scalpel,โ€ he says. โ€œItโ€™s like a huge trawler net. This is a technology that scoops up information about mostly innocent people.โ€

In spite of Rigmaidenโ€™s discovery, it was not enough to influence a judge to the fact that theย police had encroached on his rights. In 2014, after 68 months in custody, Rigmaiden pleaded guilty and was released on time served. He became a passionate privacy advocate after his release. In 2015, he assisted the ACLU in making a โ€œtutorialโ€ on how defense lawyers can contest StingRay use. He even assisted Washington state legislators craft a privacy bill related to StingRay use, which was signed into law on May 11.

In the end, Knappenberger says the film is about an unlikely hero for privacy rights โ€” a ‘hacker’-criminal-turned-whistleblower.

โ€œThe guy is on a mission,โ€ says Knappenberger. โ€œHeโ€™s on a crusade to end this technology. And the direct benefit to him has long since passed. Heโ€™s clearly emerged from this kind of bad situation as a whistleblower โ€” someone who is taking on the system for the best of reasons.โ€

Knappenberger added, โ€œWhen you think about these incredibly invasive surveillance tools getting in the hands of local cops who may not even know how to use them, or may not understand the broader constitutional protections, itโ€™s really something to be concerned about.โ€

The first episode of the 10-part series premiered on January 22. The series will air each Friday until its finale on March 25.

Kavita Iyer
Kavita Iyerhttps://www.techworm.net
An individual, optimist, homemaker, foodie, a die hard cricket fan and most importantly one who believes in Being Human!!!

Read More

Suggested Post