Kismet wrote: ↑Fri Jan 08, 2021 9:32 am
A primer on how you round up the clowns that stormed the Capitol and grind them into dust.
"In the post 9/11 world we have become used to the pervasive surveillance that characterizes Total Information Awareness. There’s a reason CIA Director Petraeus was so enthusiastic about the Internet-of-Things. If you want to freak yourself out ask Alexa if it is connected to the NSA.
We don’t need to be so slick when dealing with a group of Neanderthals. They carry their tracking devices with them. I could post a dozen pictures like the one I put up here, but you get the point. You can be sure that most, if not all, of the mob who overran the Capitol on January 6 were carrying cell phones.
If you think I’m going to suggest a geo-fence warrant to scoop up all the phones that were active inside the Capitol yesterday, you’d be wrong. No, that could be legally challenged as unconstitutional. But we don’t need to open that can of worms. What DoJ needs is called a “cell tower data dump.” That gives you all the connections made through a specific set of cell towers during a specific window in time. You don’t need a warrant for that.
Even if you do think a warrant is needed, all you need is one of the arrested individuals to have a cell phone and you use them as the probable cause justification for the warrant.
The primary legal question concerning cell tower dumps is whether they require a warrant or, alternatively, can be obtained under the Stored Communications Act (“SCA”), 18 U.S.C. § 2703(d). If the warrant requirement applies, the government would need to show probable cause in order to obtain a tower dump. Section 2703(d) of the SCA, on the other hand, requires only “specific and articulable facts showing that there are reasonable grounds to believe that the contents of [the cell tower dump] are relevant and material to an ongoing criminal investigation.”
Here’s the easy lift:
1) get the cell site location information (CSLI) for Jan 6 from 2 to 3 o’clock
2) identify all the cell phones located in the Capitol
3) filter out all the phones belonging to cops,Capitol employees, press, senators, representatives, and staff.
4) the remainder are now trespassers.
5) obtain warrants on all the trespassers phones for “pin register” data. That shows who they were communicating with.
6) all parties either located in capitol or communicating with phones during the commission of a felony are now targets of legitimate search warrants.
7) execute search warrants and seize ALL digital devices — phones, computers, network appliances, etc. — that may contain evidence of conspiracy to commit sedition.
This would mean all the people identified as being in the capitol yesterday without authorization are going to spend years getting their stuff back, fighting criminal charges, etc. It doesn’t take a lot of imagination to see how this also creates an expanding network of collaborators and the basic data needed to identify the ring leaders for this Confederacy of Dunces.
Bottom line: You grind them into dust…. slowly and painfully. When you are done …. you grind the dust. God forbid a senator or representative (federal or state) shows up in that network. Then you get to exercise the 14th amendment, specifically Section 3:
No person shall be a Senator or Representative in Congress, or elector of President and Vice President, or hold any office, civil or military, under the United States, or under any state, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any state legislature, or as an executive or judicial officer of any state, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may by a vote of two-thirds of each House, remove such disability.
All of a sudden, the concerns about Republicans blocking anything becomes moot."