The ACLU filed a FOIA request with the DOJ to unmask the government's secret interpretation of the Patriot Act. Is the gov't using Patriot Act surveillance power to create mass mobile phone geolocation tracking databases which would stun and anger American citizens? Is software like TruePosition LOCINT part of the vast domestic spying arsenal? It is with great irony that right after Congress and President Obama authorized a four-year extension of the Patriot Act, which steals our freedom, we celebrated Memorial Day to honor soldiers who fought and died to keep America free. Even more alarming is before the Patriot Act was reauthorized, members of the Senate Intelligence Committee tried to warn citizens that the power it grants the government to spy on its citizen is much more intense than we know. As if the Patriot Act does not grant the government enough surveillance power, we found out the “secret law” pushes the gap even wider between what domestic spying we think the Patriot Act allows and what the government secretly thinks it allows. Senator Mark Udall said, “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.”Stunned and angry? As in when the NSA was illegally wiretapping without warrants like domestic spying on steroids? The ACLU intends to find out and filed a Freedom of Information Act request, demanding that the Justice Department release information explaining how the government uses and interprets Patriot Act Section 215. The ACLU says the FBI is aggressively using Section 215 and there is the “distinct possibility that the government is using the provision to support entire surveillance programs.”Julian Sanchez for Cato @ Liberty reported that the Patriot Act’s Section 215 most likely includes unfettered government access to geolocation data from your smartphone. That might mean cell phone records for all of us that may be turned over in mass quantities by wireless phone service providers. The government may not use these mobile phone records only for electronic surveillance tracking of suspected terrorists, but also to track anyone to whom terrorists might be connected, and anyone those people might be connected to, and so on down the line of linking people to people to create vast domestic spying databases. Sanchez said that type of geolocation tracking might be accomplished with Location Intelligence (LocInt) services such as provided by TruePosition to national security, law enforcement and government agencies like DHS and Customs and Border Patrol.The website for TruePosition claims its clients use the software for “historical archiving” of mobile phone geolocation info to detect relationships between people, locations and events in order to spot “suspicious behavior.” It tracks in real time and sends automatic notification if the user enters or leaves a specific preset criteria. TruePosition clients also use the software for “data mining, profiling, and analysis of location information and calling activities, via a user-friendly, map-based, graphical interface, to gather intelligence on mobile phone users based on criteria, such as users’ movement and calling activity.” Could this be part of the how the government is secretly interpreting the Patriot Act’s surveillance power in what Senator Udall warned would make the American people stunned and angry? When you dig a bit deeper, key features of TruePosition LOCINT include: Locates mobile phones of interest in real time with high accuracy – including idle phones (mobile phones not making a call or sending a message)Builds invisible electronic virtual fences of any sizeDevelops authorized and barred lists of mobile phonesArchives location information for all phones in the network, allowing security officials to search and analyze the archived data for suspicious behavior patternsTransparent to the mobile user and networkScales from small to large networksOffers the flexibility to create multiple levels of access and controlSupports multiple mobile network operatorsWe’ll have to wait and see if the ACLU’s FOIA request can remove the cloak of secrecy surrounding how the government believes it can spy on us, and what other possible electronic surveillance methods are used. It is shameful behavior spying on citizens as if we are guilty until proven innocent, shameful surveillance coming from the “Land of the Free.” As the ACLU said, “The secrecy surrounding the government’s use of new surveillance powers is unwarranted and fundamentally antidemocratic.” Like this? Here’s more posts:PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed IE Flaw Could Allow Hackers Access to your Facebook, Gmail, Twitter Accounts Gov’t: We want stored emails, phone locations. New bill: Get a warrant! Thanks to ID thieves, your child may have more debt than you Having private parts is not probable cause for TSA to grope or body scan you FBI: Surveillance “going dark” or obsessed with porn and doing a poor job? Ridiculous DHS list: You might be a domestic terrorist if… Former FBI Agent Turned ACLU Attorney: Feds Routinely Spy on Citizens Patching Windows is a major time sink for IT departments Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe