Assuming they dont have disappearing messages activated, and assuming any protestors willingly unlock their phones.
But any judge that doesn't immediately reject such cases on a first-amendment basis is doing the business of an authoritarian dictator. This is fully protected speech and assembly.
If you say something illegal in a chat with a cop in it, or say it in public, I don’t think there are Constitutional issues with the police using that as evidence. (If you didn’t say anything illegal, you have a valid defence.)
Actual examples? No. I don’t believe it happened.
Hypothetical examples? Co-ordinating gunning down ICE agents. If the chat stays on topic to “coordinat[ing] legal observers,” there shouldn’t be liability. The risk with open chats is they can go off topic if unmoderated.
I don’t know if anyone IS using such a database unlawfully - they might be checking the plate number against an Excel sheet they created based on other reports from people opposed to ICE - but if its a databse they shouldn’t be using in this way, if might be against the law.
Or they are running any mainstream iPhone or Android phone, they've unlocked the phone at least once since their last reboot, and the police have access to graykey. Not sure what the current state of things is, since we rely on leaked documents, but my take-away from the 2024 leaks was GrapheneOS Before First Unlock (BFU) is the only defense.
https://www.businessinsider.com/apple-complies-percent-us-go...
Are you pro or against this?
This seems like a good example of that being enough metadata to be a big problem.
> This seems like a good example of that being enough metadata to be a big problem
I was not saying it's not a problem that the feds are doing this, because that's not what I was replying to.
https://www.phoenixnewtimes.com/news/arizona-supreme-court-s...
it will be quite easy for a prosecutor to charge lots of these people.
it's been done for less, and even if the case is thrown out it can drag on for years and involve jail time before any conviction.
prosecutors may take their time and file charges at their leisure.
https://www.cisa.gov/sites/default/files/2024-12/guidance-mo...
Here’s the facts:
- Protesters have been coordinating using Signal
- Breaches of private Signal groups by journalists and counter protesters were due to poor opsec and vetting
- If the feds have an eye into those groups, it’s likely that they gained access in the same way as well as through informants (which are common)
- Signal is still known to be secure
- In terms of potential compromise, it’s much more likely for feds to use spyware like Pegasus to compromise the endpoint than for them to be able to break Signal. If NSA has a Signal vulnerability they will probably use it very sparingly and on high profile foreign targets.
- The fact that even casual third parties can break into these groups because of opsec issues shows that encryption is not a panacea. People will always make mistakes, so the fact that secure platforms exist is not a threat in itself, and legal backdoors are not needed.
superkuh•1h ago
These federal goons need to be tracked and observed to record their crimes. That much is indisputable.
OrvalWintermute•1h ago
Example: http://superkuh.com/blog/blog.html
but, probably best to let this play out in the courts.