• Uriel238 [all pronouns]@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 day ago

      Go onto Techdirt ( here ) and check Tim Cushing’s blog. His beat is the abuse and corruption of our justice system. The latest issue I recall was using drones to peek into fenced backyards, into windows and deep across property lines, all without a warrant or probable cause.

      During the 2010s IMSI spoofers were being used but the Stingray corporation required precincts sign an NDE so parallel reconstruction (creating an alternative plausible path of investigation to lead to the same discovery of evidence) was the norm. Eventually defense lawyers learned to press the issue, as even FBI would drop cases before admitting they used IMSI catchers to spy on where a suspect’s phone was.

      One of my bigger beefs is the misuse of detection dogs, which have up to a ~90% false positive rate, called Probable Cause on Four Legs it’s known that most departments prefer trick-pony dogs who just signal a lot, in contrast to dogs who can actually detect stuff.

      Interestingly, there is a subset of the K9 sector who train and handle detection dogs (which are still legitimately used, say to detect explosives in long lines of luggage at airports), and thanks to the common use of dogs to force a search, the public has been losing confidence in them, and courts who believe dog searches are for real.

      • SplashJackson@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        20 hours ago

        Animal slavery? You know, just the other day I heard about humans using dogs to hunt coyotes, it seems a lot of humans use these dogs as a slave species…no bueno

        • Uriel238 [all pronouns]@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 hours ago

          The cooperative relationship between humans and dogs has always been a working one (that is, centered around the collaboration of productive tasks), so I have less concern with dogs on duty. In this case, dogs are being used not for their keen sense of smell, but as dousing rods on the pretense of their keen sense of smell.

          I did not mention dogs used as attack dogs, which absolutely abuses the dog. Not only that, but the dog is regarded as an officer if a victim fights back, what has only become a controversy when an attack dog was used on a fellow officer.

          As for dogs used to hunt, that’s the first thing we collaborated in doing, and we seem to have developed our relationship with dogs at the same time we developed agriculture, so they’d definitely be used to hunt vermin including foxes and coyotes.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      9
      ·
      edit-2
      2 days ago

      often relying on getting a warrant post hoc or lying to establish probable cause.

      https://en.wikipedia.org/wiki/Parallel_construction

      Here’s a whole ass Wikipedia article on the very subject, because it’s been so widespread for so long it has a fucking name.

      https://en.wikipedia.org/wiki/Hemisphere_Project

      Here’s a Wikipedia article on the mass surveillance by the DEA, which is where the data used for parallel construction was sourced.

      https://www.reuters.com/article/us-dea-sod-idUSBRE97409R20130805/

      Here’s a good example from the first Wikipedia article about how the Feds pass signals intelligence to local law enforcement so they can start cases and claim they found the initial evidence some other way than illegal mass surveillance.

      For more history about attempts to install backdoors, see:

      https://en.wikipedia.org/wiki/Clipper_chip

    • SulaymanF@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      2 days ago

      There’s just so many examples

      https://en.wikipedia.org/wiki/Clipper_chip

      Also, Greece had a national scandal where their phone system had legal backdoors added for wiretap orders, and someone broke in and published the confidential phone calls of politicians using the same system. The US is now dealing with a similar attack.