The nationwide T-Mobile outage is over, calls should be working again

By Jay Peters and Sean Hollister | Jun 16, 2020 |

Verizon and AT&T calls to T-Mobile should work too

T-Mobile, Verizon and AT&T customers were mystified on Monday when their calls stopped going through, in what turned out to be a nationwide outage for T-Mobile’s network, specifically, that lasted most of the day. Around 1AM Tuesday, the company tweeted that voice calls and text messaging services had been fully restored.

According to reports on Downdetector and on social media, the outage spiked around 2:20PM ET Monday. While AT&T told The Verge that its network was “operating normally” and Verizon said its network was “performing well,” T-Mobile confirmed that it’ was working to fix “a voice and data issue that has been affecting customers around the country.”

Verizon also said it was not to blame: “We’re aware that another carrier is having network issues. Calls to and from that carrier may receive an error message,” read part of a statement from the company. It makes sense that what appears to be a multi-network outage could actually stem from a single carrier, since people reporting failed calls don’t always know which carrier their recipient is using.

As of 6PM ET, T-Mobile had already restored data services, but was still struggling to return phone calls to normal.

As of nearly midnight ET, six hours after that update, T-Mobile wasn’t quite finished yet. “We are recovering from this now but it may still take several more hours before customer calling and texting is fully recovered,” read a blog post from T-Mobile CEO Mike Sievert.

Multiple Verge staffers were unable to place calls on T-Mobile on Monday. It appeared that both Sprint, now a T-Mobile subsidiary, and US Cellular were also experiencing problems.

It’s still unclear what the issue might have been, though T-Mobile said early Tuesday AM that it was an “IP traffic related issue that has created significant capacity issues in the network core throughout the day.” Earlier this evening, FCC chairman Ajit Pai tweeted that the outage was “unacceptable” and that the FCC will launch an investigation.

During the T-Mobile outage and a brief Facebook Messenger outage, a rumor spread on social media that the United States was suffering a massive targeted distributed denial of service (DDoS) attack, but so far those rumors seem unfounded. Security researcher Brian Krebs, who knows a thing or two about DDoS attacks, tweeted that there was no indication that the outage was related.

Read the original article HERE.

Read more and view an outage map HERE.

Google’s Geofence Warrants Face a Major Legal Challenge

By Liz Brody | 06/11/2020 |

Police requests for Google data that pinpoints anyone near the scene of a crime increased by more than 500% last year.

Around 5 p.m. on May 20, 2019, a teller at the Call Federal Credit Union in Chesterfield, Virginia, got ready to help her next customer. He gave her a handwritten note: “I’ve been watching you for sometime now. I got your family as hostage and I know where you live,” it said, according to a court brief. “If you or your coworker alert the cops or anyone your family and you are going to be hurt… I need at least 1OOk.”

The teller told him she didn’t have access to that kind of money, at which point he pulled out a silver and black handgun. Waving it around, he herded the bank’s customers and employees behind the counter and into the back room. There he ordered everyone to their knees and forced the manager to open the safe. He fled with $195,000.

No one recognized the thief, although a witness at a church near the burglary reported having seen a man who looked suspicious in a blue Buick sedan, the court brief said. The police had little else to go on, except surveillance tape showing him entering the bank with a cell phone to his ear and passing by that church. Three and a half weeks later, still empty-handed, they asked a magistrate for a geofence warrant.

Unlike a traditional search order that identifies a particular suspect, geofence warrants require Google to trawl its massive library of location data, commonly known as the “Sensorvault,” to identify people who were in the area when a crime was committed. They are relatively new, and increasingly widespread: Between 2017 and 2018, Google saw a 1,500% surge in the number of requests it received, and from 2018 to 2019, the rate increased over 500%.

The resulting data helped police solve a murder case in Cobb County, Georgia, and to identify suspects in a home invasion in Eden Prairie, Minnesota, a fatal shooting in Raleigh, North Carolina, and a string of bombings in Austin, Texas.

But in the process of pinpointing anyone who may have been near the scene of a crime, geofence warrants have also pointed police toward people like Jorge Molina, a warehouse worker in Arizona who was arrested as a murder suspect after police obtained data showing his phone at the crime scene. Molina spent nearly a week in jail before being found innocent. Which is why, as the prevalence of geofence warrants has increased, so has the alarm of defense lawyers, privacy advocates, and civil rights groups, who point to a lack of federal oversight that has left Google to serve as gatekeeper of a legal process they believe, at its core, violates the Constitution.

In the Virginia bank robbery case, the geofence warrant returned the location histories of 19 people who had been within 500 feet of the bank around the time of the crime. It led to the arrest of a 24-year-old man named Okello Chatrie, whose lawyers are presenting the first serious legal challenge against the practice.

“Geofence warrants like the one in this case are incapable of satisfying the probable cause and particularity requirements, making them unconstitutional general warrants,” the lawyers argued in a motion to suppress evidence. The brief goes on to describe them as “the digital equivalent of searching bags of every person walking along Broadway because of a theft in Times Square.”

If the judge agrees to suppress the Google data from being used as evidence (the next hearing is July 2), the case could set a precedent in the eastern district of Virginia — a first step toward a potential federal ruling or law that spells out whether geofence warrants can or can’t be used in criminal cases, and if they can, exactly how. If nothing else, a win would send a message to other defendants incriminated by these searches, and offer a playbook to fight back.

If cops want to know where a certain suspect’s phone has been, they need a traditional warrant. If they want Google to conduct a geofence search, it’s not clear they must do the same. The first standard was established by a landmark Supreme Court case in 2018, Carpenter v. United States, which involved cell site location information (CSLI) generated by pings off towers and collected by carriers like Sprint and AT&T. That data is so private, the Justices reasoned, law enforcement must use a warrant to get it. But the high court emphasized that its decision applied only to a single person’s device; they left open the question of police access to location data for every phone in the area during a certain period. Although they were referring to so-called tower dumps based on CSLI, geofence searches for Google’s data would fall under the same category.

Even so Google — to its credit, say privacy advocates — has always insisted on a warrant. Specifically, it asks for a version it came up with to address the broad nature of these searches.

In the absence of a clear legal process for obtaining and responding to geofencing warrants, Google is almost entirely responsible for shaping practices around them. That’s because it is the recipient of almost all these requests. The type of data the company collects in order to target ads accurately is uniquely useful to law enforcement. In addition to other location data the company picks up, this kind is called “location history”; Google has been gathering it for more than a decade and stores it in a way that is both searchable and attached to users’ accounts.

As a user, you might turn on your location history to do things like get live traffic updates, personalize maps, or find your phone. The minute you do, it starts picking up signals from cell sites, GPS, nearby Wi-Fi networks, and Bluetooth devices, mapping your movements much more precisely than other methods like CSLI. Location history “functions in effect as a daily journal,” Google explained in a court filing. “It can reveal when a user was at her home (or someone else’s), a doctor’s office, a place of worship, a political meeting, or other sensitive locations.”

Google’s data bank is also vast. In 2019, with more than 2.5 billion Androids in people’s hands and its apps all over iPhones, the tech giant said in another brief that roughly a third of its users — “numerous tens of millions” — had location history enabled. Last year, the company added new controls to auto-delete past data (Google told OneZero this decision had nothing to do with geofence warrants). It’s too soon to tell if that option will make a dent in Sensorvault, but it didn’t impact the bank robbery case.

On June 14, 2019, Chesterfield County police requested data on all the phones in a 150-meter radius from the bank between 4:20 and 5:20 p.m. the day of the heist. Google’s process for filing a geofence warrant was designed to narrow the scope of the data disclosed, the company’s director of law enforcement and information security, Richard Salgado, told OneZero. It usually has three steps. First, the company provides only anonymized data on the phones it finds in the specified area; in this case, there were 19. In the second step, police try to pare down the pool and can request more context on those devices of interest — Google has not publicly defined a limit or explained its math for determining the subset, nor do the warrants typically spell it out. The Chesterfield County police asked where nine of the original devices traveled during 30 minutes before and after the original time frame. Google doesn’t give police identifying information like the email and name attached to each account until the final step. Again the police working on the robbery case attempted to zero in (and again they weren’t bound by specified guidelines), choosing three phones.

Anonymized data can be telling, and police already had a suspect in mind by the time Google revealed identifying information about the accounts it had placed near the robbery. During that first step, the Virginia detectives saw one of the 19 phones had traveled between the church and the bank. In step two they followed that device to a residence where they got a name, Okello T. Chatrie. And from there they discovered he’d purchased a gun less than a month before the robbery and drove a blue Buick, which matched what the church witness had reported. Step three of the warrant delivered Okello’s email address. Further search warrants led them to $100,000 at a residence where he spent evenings; some of the bills were wrapped in bands signed by the bank teller. At a hearing January 21, prosecutor Kenneth Simon acknowledged, “We can’t deny that everything else flowed from the geofence warrant.”

All of that evidence should be tossed, contends Chatrie’s defense team. (Neither the U.S. attorney’s office or defense attorney Michael Price would comment with the case in litigation.)

Mark Rumold, a senior staff attorney with Electronic Frontier Foundation, a leading nonprofit defending digital privacy, agrees. Even though by the time police get identifying data, they may have probable cause, he says that’s not the point. “The key is that all the information they’re getting initially is information that’s protected by the Fourth Amendment. It’s that first step where people’s reasonable expectations are intruded on and that’s the whole problem with the warrant.”

Nathan Freed Wessler, a staff attorney with the ACLU Speech, Privacy, and Technology Project, who argued Carpenter, is also concerned about the vagueness of the process. “There’s nothing, as far as I can tell, to stop the government from looking at step one and say[ing] to Google, ‘Yeah, we can’t really narrow it down. We need the names and account details of everyone.’”

In fact, that did happen in the Chatrie case. Virginia police asked for personal data on all the 19 phones. Google said no, but that conversation, legal experts say, should happen in front of a judge or magistrate.

“The important point here is to not conflate Google’s business practices with constitutional law,” Albert Fox Cahn, a fellow at the Engelberg Center on Innovation Law & Policy at N.Y.U. School of Law and founder of STOP, Surveillance Technology Oversight Project. “Google is going above and beyond, but that isn’t a robust safeguard especially when there’s a growing array of data brokers, app developers and other sources of information who might hand over a great deal of information without that back and forth.” Cahn is particularly worried about geofence warrants being used for Covid-tracing data.

“The baseline concern,” says Wessler, “is that this is a dragnet search of sensitive location data of lots of people who will have absolutely nothing to do with the crime under investigation. There’s a serious question about whether these kinds of searches should ever be allowed. And if they are to be allowed, then we need to have a serious conversation about how to very strictly control and restrict them.”

Even those who think geofence warrants are legitimate and a useful investigative tool believe the process needs more oversight. “I want judges to be asking those questions about narrowing things down, investigative alternatives, what they’re going to do with the data once they find out it belongs to an innocent person,” says David Gray, the Jacob A. France Professor of Law at the University of Maryland, Francis King Carey, School of Law and author of The Fourth Amendment in an Age of Surveillance. “I want law enforcement to have to explain why they want a geofence warrant around a political rally, and the judge to look over her glasses and say, ‘Are you kidding?’“

The opposition to geofencing warrants is growing. The National Association of Criminal Lawyers’ Fourth Amendment Center, which is defending Chatrie, has begun litigating other similar cases, and Rumold says EFF may be filing an amicus brief to suppress geofence warrant evidence in a case in San Francisco. In April, STOP helped introduce a bill in New York that would ban geofence warrants in the state.

The next hearing for Okello Chatrie is scheduled for July 2. He is facing up to life in prison and has pleaded not guilty to forced accompaniment and brandishing a firearm during an armed robbery. Even if the judge rules to suppress the evidence obtained through the geofencing warrant, he could be convicted under an exclusion saying the officers reasonably thought they were acting under legal authority. Still it would send a warning to police that the warrants can be challenged and a signal to defendants like Chatrie their rights may have been violated. The case has already revealed a more detailed look at Google’s data and how warrants are carried out, Wessler says. And that’s important.

No matter how it is decided, United States v. Chatrie will likely spark other cases. If some succeed and are appealed, that would bump the issue up to the higher courts and maybe — especially if judges disagree — into a Supreme Court case that changes the law. A flurry of litigation might also convince lawmakers to pass federal legislation that either bans geofence warrants or spells out how they should be executed. The public can push technology companies too. “As people see how the police can transform their apps and devices into government tracking devices,” says Cahn, “maybe it will chill their willingness to use them.”

Whatever happens, ACLU’s Wessler would see a defense win in the Chatrie case as groundbreaking. “It would be a very significant statement about how to apply old protections in the fourth amendment to a totally new and uniquely disturbing context,” he says. “And it will send a signal to the government and to technology companies about where the guardrails are when the government wants to be dipping into lots of people’s sensitive data in an effort to locate or identify one suspect.”

Read original article at OneZero.com HERE.

T-Mobile launches free 5G for first responders

May 22, 2020 | By Laura French |

The company will provide free 5G access to all public and nonprofit state and local fire, police and EMS agencies for 10 years.

BELLEVUE, Wash. — T-Mobile has announced that it will provide free 5G access to public and nonprofit first responder agencies for 10 years.

T-Mobile President and CEO Mike Sievert said in a video published Thursday that the “Connecting Heroes” program is expected to save fire, EMS and police departments across the U.S. billions of dollars.

“When we’re at our most vulnerable, first responders are there for us … and they are under more pressure today than ever before. Connecting Heroes is one way we’re saying ‘thank you’ in this critical time,” Sievert said. “People who save lives shouldn’t have to choose between life-saving equipment and wireless service. And with Connecting Heroes, they won’t have to. We’re not limiting this program to a few months or a year … first responders can get free service including 5G access, for a full decade.”

T-Mobile estimates the program would save a total of $7.7 billion over the next 10 years if all eligible agencies opted in, according to a news release.

Connecting Heroes went live Thursday following T-Mobile’s merger with Sprint on April 1.

Read original article (and see video) at PoliceOne.com HERE.

Florida Supreme Court won’t hear cellphone passcode case

By Sabrina Conza | Fresh Take Florida | 04/03/2020 |

The case involved an Alachua County drug deal turned armed robbery in 2018.

GAINESVILLE — The question of whether police in Florida can legally force criminal defendants to unlock their cellphones will remain unresolved for now, after the state Supreme Court agreed not to consider the issue.

A 2018 Alachua County drug deal turned armed robbery case centers around the nationwide debate over whether law enforcement can force someone to reveal a phone’s passcode.

Government officials have long held that encryption technology – the digital locks that protect devices and their data – can hinder their criminal investigations. U.S. Attorney General William Barr has renewed the issue as a priority for the Justice Department, forcefully urging leaders of technology companies to aid law enforcement investigations.

Florida’s highest court was slated to hear the cellphone case until it was dismissed last week.

In Gainesville, Savannah Bryant Turner, now 18, arranged a drug deal with two victims in June 2018, according to the police report. But when the buyers arrived, three men with shirts over their faces robbed them at gunpoint. During the struggle, one of the victims pulled the shirt off defendant Draven Rouse’s head and recognized him from high school.

Rouse, now 17, later told police who the others involved in the robbery were, including defendant Matthew Tyler Pollard, now 22.

Police filed a warrant to obtain evidence from defendant Pollard’s iPhone – recovered from Pollard’s car – and asked a judge to force him to turn over the phone’s passcode.

Prosecutors cited an earlier case that compared asking for the passcode to demanding that a defendant turn over a key to a locked box.

Pollard’s public defender, Logan Doll, protested that the warrant for the contents of the phone was too broad because police were seeking all Pollard’s contacts, photos, texts and other messages about illicit drug activity or robberies – not just limited to the case in which he was facing criminal charges.

However, Pollard entered into a plea deal, leaving the appeal moot, according to the state Attorney General’s Office. Turner, however, is still awaiting trial in Alachua on charges related to the case.

Because of the dropped charges, the Florida Supreme Court will not yet weigh in on the nationwide debate of whether law enforcement can force someone to reveal their phone’s passcode.

The issue of cell phone encryption has been a focus of several state and federal cases across the country. Civil liberties groups, including the American Civil Liberties Union, said a passcode cannot be compelled with a warrant because it’s a thought rather than an object.

Forcing people to give up their passcode violates their Fifth Amendment right against self-incrimination, according to Nathan Wesser, a staff attorney for the ACLU’s Speech, Privacy, and Technology Project.

Judge Scott Makar, writing for the majority, said the defendant was not required to turn over the passcode due to his Fifth Amendment right against self-incrimination. He also raised concerns that authorities could use the phone to undertake a “fishing expedition” because of the broad scope of the warrant.

The 1st District Court of Appeal in Tallahassee sided with Pollard in the 2018 Alachua County robbery case. Although the circuit court judge, William Davis, required Pollard to turn over his passcode, a divided appeals court overturned the order.

Because Rouse, Pollard’s co-defendant, was seen by the victims and identified Pollard, the need to search Pollard’s phone for more evidence seemed unnecessary to the appeals court.

The U.S. Supreme Court ruled in 2014 that police need a warrant to search someone’s phone. The Court said a person’s phone may contain even more sensitive information than a search of a home could reveal.

Whether a warrant can also require people to reveal their passwords is currently state-by-state. Because the Florida Supreme Court has not weighed in on the issue, there is no statewide rule here.

In October, the Oregon Court of Appeals ruled that a defendant could be compelled to disclose her

passcode in a driving-under-the-influence case.

With the advent of fingerprint passcodes and Face ID, the issue is becoming even more complex.

A judge at the U.S. District Court in Oakland, Calif, ruled in 2019 that compelling someone to use their fingerprint to open their phone violated the Fourth and Fifth Amendments. A Virginia Circuit Court judge, however, ruled the opposite in 2014, claiming that a fingerprint is not protected by the Fifth Amendment because it’s not testimony.

“The fingerprint, like a key… does not require the witness to divulge anything through his mental processes,” the judge wrote in his opinion. “Unlike the production of physical characteristic evidence, such as a fingerprint, the production of a password forces a ‘defendant’ to disclose the ‘contents of his own mind.’”

Such cases strike the balance between people’s rights and police’s ability to properly investigate, said Wesser of the ACLU. He said there are other ways for police to access a phone without compelling the passcode from the phone’s owner.

“We are now living firmly in the digital age at a time when old rules governing police practices before the advent of modern technology may not be a great fit,” he said.

Cellphones reveal a lot of information about a person’s life, including their location, search history, and personal documents, which makes this issue all the more important, according to Rebecca Jeschke, the media relations director and digital rights analyst for the Electronic Frontier Foundation.

“We are at a point where the contents of our phone are an intimate look inside our lives,” she said. “Being forced to reveal the password to a device is a violation of the Fifth Amendment.”

Read the original article at Gainesville.com HERE.

5G nodes: what they are and how they work

While you may have heard how 5G works, part of understanding the basics of the new cellular technology is learning about 5G infrastructure. Find out how deploying 5G nodes on existing city structures such as telephone poles and street lights, will help change the future of cellular technology.

Like other versions of cellular technology, 5G operates by transmitting broadband wireless signals across a network divided into hexagonal “cells”. This division of the network allows for phones and devices to switch from tower to tower maximizing capacity. Verizon’s 5G Ultra Wideband network uses a wider band of spectrum. With millimeter wave technology, more people will be able to use the network at once.

What are 5G Cell Towers?

Verizon’s 5G Ultra Wideband network utilizes small cells, or nodes, in addition to traditional towers. 5G small cells are similar to 4G towers in form and function. Verizon is building thousands of additional 5G nodes to maximize and deliver 5G millimeter wave technology to our customers.

Since 5G small cells are smaller than a traditional macro cell tower, they can exist more discreetly. 5G’s small cells support the high frequency millimeter waves needed for the ultra-low latency and high data speeds of 5G.

How Do 5G Towers Work?

Verizon’s 5G Ultra Wideband network uses 5G nodes that transmit and receive data to provide network coverage and capacity to densely populated environments. They strengthen coverage and data transfer speeds where devices would otherwise compete for bandwidth. In addition, small cells have been shown to extend handset battery life by reducing power draw, which saves energy overall.

Since 5G nodes are small they can be mounted on street lights, utility poles, buildings and other similar structures to efficiently deliver the data and bandwidth that users need. Discreet and energy efficient, small cells help make 5G possible.

Explore other aspects of Verizon 5G and stay up-to-date on all the news and developments.

Read the original article at Verizon.com HERE.