<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Privacy - Stahl Gasiorowski Criminal Defense Lawyers P.C.]]></title>
        <atom:link href="https://www.stahlesq.com/blog/categories/privacy/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.stahlesq.com/blog/categories/privacy/</link>
        <description><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C.'s Website]]></description>
        <lastBuildDate>Fri, 20 Feb 2026 15:37:24 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Facial Recognition Technology Failures and Wrongful Incarceration]]></title>
                <link>https://www.stahlesq.com/blog/facial-recognition-technology-failures-wrongful-incarceration/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/facial-recognition-technology-failures-wrongful-incarceration/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 03 Apr 2023 17:28:36 GMT</pubDate>
                
                    <category><![CDATA[Arrest Warrant]]></category>
                
                    <category><![CDATA[Criminal Charges]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Federal Courts]]></category>
                
                    <category><![CDATA[Felony]]></category>
                
                    <category><![CDATA[NJ Municipal Court]]></category>
                
                    <category><![CDATA[NJ Superior Courts]]></category>
                
                    <category><![CDATA[Police]]></category>
                
                    <category><![CDATA[Privacy]]></category>
                
                
                
                
                <description><![CDATA[<p>Law enforcement and intelligence agencies around the world use facial recognition technology and other AI in investigations to track targets’ movements and as evidence in prosecutions. While books and movies often portray this technology as highly advanced and foolproof, reality can be quite different. Recent cases have demonstrated that facial recognition technology is far from&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="/static/2025/09/f9_facial-recognition-failures-wrongful-Incarceration-1024x683.jpg" alt="Facial Recognition Technology" class="wp-image-1604" srcset="/static/2025/09/f9_facial-recognition-failures-wrongful-Incarceration-1024x683.jpg 1024w, /static/2025/09/f9_facial-recognition-failures-wrongful-Incarceration-300x200.jpg 300w, /static/2025/09/f9_facial-recognition-failures-wrongful-Incarceration-768x512.jpg 768w, /static/2025/09/f9_facial-recognition-failures-wrongful-Incarceration.jpg 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p>Law enforcement and intelligence agencies around the world use facial recognition technology and other AI in investigations to track targets’ movements and as evidence in prosecutions. While books and movies often portray this technology as highly advanced and foolproof, reality can be quite different. Recent cases have demonstrated that facial recognition technology is far from foolproof and may lead to even more misidentifications when identifying people of color.</p>



<p>Companies such as Clearview AI have contracts with law enforcement agencies across the United States. Clearview scrapes billions of photos from social media for its database. Photos from LinkedIn, Facebook, Instagram and the public web are uploaded to its database. For an annual fee, law enforcement has access to a face-based search engine. Obviously, a number of factors affect the reliability of the search results. The quality and resolution of the surveillance photo used for the search, the ethnicity of the subject, and the number and age of the comparison photos can all affect the results.</p>



<p>The most troubling, however, is that it appears that in a number of cases law enforcement failed to use other investigative means before seeking arrest warrants for the individuals “identified” by facial recognition software. As Clearview’s CEO made clear to the <a href="https://www.nytimes.com/2023/03/31/technology/facial-recognition-false-arrests.html" rel="noopener noreferrer" target="_blank"><em>New York Times</em></a> recently, when its technology comes up with an “initial result” that should be the starting point in law enforcement’s investigation, not the conclusion. In other words, facial recognition technology should only be used as one investigative tool that may provide a lead in an investigation that must then be coupled with other basic investigative steps.</p>



<p>A recent example of this is the case of Randal Quran Reid who was driving near Atlanta when he was stopped and arrested for alleged thefts in Louisiana. The police in Baton Rouge and Jefferson Parish had apparently used facial recognition from store videos purporting to show Mr. Reid stealing valuable items. Warrants for his arrest were issued and Mr. Reid was held for days pending extradition for crimes he did not commit. The NYT reports that it seems likely that local police simply used the faulty facial recognition identification to obtain the <a href="/blog/what-is-an-arrest-warrant/">arrest warrants</a>. It is difficult to know for sure because many law enforcement agencies do not reveal that such technology was used, or that it was the sole or primary basis for the warrant.</p>



<p>What should officials in Louisiana have done before issuing an arrest warrant based on facial recognition? First, actually compare the photos to Mr. Reid. According to the article, Mr. Reid is smaller, lighter and less muscular that the actual thief. Next, investigate to see if Mr. Reid was actually in Louisiana around the time of the thefts. How does one determine that? Examine credit card receipts for gas purchases or any other items in the state, travel records and <a href="/blog/criminal-investigation/">EZ-Pass records</a>, social media, license plate readers and the like. Conversely, look to see if there is evidence that Mr. Reid was in his home state during the thefts. In fact, had law enforcement checked, they would have discovered that Mr. Reid had never been to Louisiana.</p>



<p>Artificial intelligence is advancing at breakneck speed and law enforcement is eager to use all forms of <a href="/blog/technology-crime-investigations/">technology to assist in their investigations</a>. The key, however, is AI should only be used to “<strong>assist</strong>” <strong>not conclude</strong>. Traditional investigative techniques must be employed to corroborate and verify the alleged results of such database searches, lest more innocent people sit in jail hoping that their attorneys can free them.</p>



<p><a href="/">Stahl Gasiorowski Criminal Defense Attorneys</a> actively and aggressively protect clients’ rights and challenge the use of such AI based searches in pretrial hearings and trial. To contact Mr. Stahl, call <a href="tel:9083019001">908.301.9001</a> for the NJ office and <a href="tel:2127553300">212.755.3300</a> for the NYC office, or email Mr. Stahl at <a href="mailto:rgs@sgdefenselaw.com">rgs@sgdefenselaw.com.</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Choosing the Right Attorney – What You Should Ask in the First Consultation]]></title>
                <link>https://www.stahlesq.com/blog/choosing-criminal-defense-attorney/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/choosing-criminal-defense-attorney/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Tue, 25 Jan 2022 23:56:18 GMT</pubDate>
                
                    <category><![CDATA[Attorney-Client Privilege]]></category>
                
                    <category><![CDATA[Criminal Charges]]></category>
                
                    <category><![CDATA[Criminal Trial]]></category>
                
                    <category><![CDATA[NJ Superior Courts]]></category>
                
                    <category><![CDATA[Privacy]]></category>
                
                    <category><![CDATA[White Collar Criminal Defense]]></category>
                
                
                
                
                <description><![CDATA[<p>When someone is being investigated or charged with a criminal offense, it is one of the most stressful and unnerving times of the person’s life. It is common to feel overwhelmed and uncertain about who to hire and what to ask in the initial consultation with a criminal defense attorney. Below are some tips on&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="600" src="/static/2025/09/85_choosing-right-attorney-first-consultation.jpg" alt="Choosing the Right Attorney" class="wp-image-1490" srcset="/static/2025/09/85_choosing-right-attorney-first-consultation.jpg 900w, /static/2025/09/85_choosing-right-attorney-first-consultation-300x200.jpg 300w, /static/2025/09/85_choosing-right-attorney-first-consultation-768x512.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></figure>
</div>


<p>When someone is being investigated or charged with a criminal offense, it is one of the most stressful and unnerving times of the person’s life. It is common to feel overwhelmed and uncertain about who to hire and what to ask in the initial consultation with a criminal defense attorney. Below are some tips on choosing the right attorney and the major questions a prospective client should ask the attorney.</p>



<h2 class="wp-block-heading" id="h-first">First:</h2>



<p>Look for an <strong>attorney and firm that <a href="/">specializes in criminal defense</a></strong>. But don’t stop there, find ones that have vast experience in the type of matter you face. <strong>If it is a <a href="/blog/federal-system-arrest-warrant-complaint-indictment/">federal investigation or indictment</a>, make sure that the attorney has significant federal experience</strong> because federal cases are much different than state, county or municipal prosecutions. Focus on the type of charge as well. If the investigation or charge involves <a href="/criminal-law/white-collar-crime/health-care-fraud/">healthcare fraud</a>, ask the attorney about his or her experience in healthcare fraud cases. <strong>Experience with both the type of case, and the prosecuting agency</strong>, is often critical to success. The more experience the attorney has usually results in better insights into the case, its defense and the type of resolutions that are realistic with the particular prosecuting agency.</p>



<h2 class="wp-block-heading" id="h-second">Second:</h2>



<p>An experienced criminal defense attorney should be able to talk, at least generally, about <strong>the strengths and weaknesses of the case</strong>. He or she should be able to identify the <strong>relevant issues, strategies going forward, and potential defenses</strong>. If the case is new, then the attorney can only give general insights because the prosecution has not yet provided any <a href="/blog/categories/criminal-discovery/">discovery</a> – <a href="/blog/categories/criminal-investigation/">law enforcement reports</a>, statements by witnesses or the client, recordings, photographs, documents, emails, text messages, etc. – that more fully detail the government’s case. But, the attorney should be able to explain how these types of cases are investigated and prosecuted, and be able to offer insights as to the type and scope of work that lies ahead. Be aware, however, that the attorney has no credible way of predicting the outcome of your matter at this early stage.</p>



<h2 class="wp-block-heading" id="h-third">Third:</h2>



<p>How long will it take to resolve the case? Experienced criminal defense counsel can inform you generally how long a case like yours usually takes, and what you can expect along the way. While each investigation and case are different, the attorney can give you a good idea of how long and what to expect for cases in the federal system or in each state or county that they practice.</p>



<h2 class="wp-block-heading" id="h-fourth">Fourth:</h2>



<p><strong>How much will it cost to defend your matter?</strong> Most criminal cases are handled on a flat fee basis for certain portions of the case. A client needs to know that she can afford the representation and the attorney needs to know that the client has the resources to properly defend the case. In certain instances, particularly when the matter is still in the investigative stage and charges have not yet been brought, the representation will start on an hourly fee basis until the attorney has a better understanding of the scope and complexity of the case.</p>



<h2 class="wp-block-heading" id="h-fifth">Fifth:</h2>



<p><strong>Who else will be working on your case, and does the firm have the time to handle your matter?</strong> These are important issues that the potential client should inquire about. The experience of the other lawyers in the firm, as well as their caseload, is critical to the quality of representation. Firms that handle a large volume of cases, with minimal staff, may not have the time and attention to detail that the client’s matter requires.</p>



<h2 class="wp-block-heading" id="h-a-word-of-caution">A Word of Caution:</h2>



<p>These questions provide a good framework for the client to make an educated and informed decision about counsel. There are also the intangible areas of <strong>comfort and trust in the person and firm</strong>. But do not be lulled by boastful promises or talk of the attorney’s confidence that the case will be dismissed, or that charges will never be brought. Experienced and ethical counsel will reserve their opinions about the outcome until they have the relevant facts and can fully examine the evidence and the case law. Good defense counsel will tell you what you need to know, rather than what you want to hear for comfort.</p>



<h2 class="wp-block-heading" id="h-contact-stahl-gasiorowski-criminal-defense-lawyers">Contact Stahl Gasiorowski Criminal Defense Lawyers</h2>



<p><strong>Stahl Gasiorowski Criminal Defense Lawyers</strong> have extensive experience in serious federal and state criminal cases. The founder of the firm, Robert Stahl, is a Certified Criminal Trial Attorney by the Supreme Court of New Jersey, a Fellow of the American College of Trial Lawyers and a former Assistant U.S. Attorney who tried some of the largest fraud and tax cases in the District of New Jersey. He has been aggressively defending serious cases in federal and state courts for more than 25 years.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[WhatsApp End to End Encryption Is Not Always Secure]]></title>
                <link>https://www.stahlesq.com/blog/whatsapp-encryption-not-secure/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/whatsapp-encryption-not-secure/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Thu, 09 Sep 2021 16:49:49 GMT</pubDate>
                
                    <category><![CDATA[Criminal Discovery]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Privacy]]></category>
                
                
                
                
                <description><![CDATA[<p>ProPublica recently reported that Facebook hired 1000 workers around the world to review WhatsApp messages that are flagged as “inappropriate.” WhatsApp markets itself as a private messaging platform that secures those messages with end-to-end encryption that only the participants can view. Billions of people around the world use WhatsApp and other such “secure” messaging services&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="600" src="/static/2025/09/27_whatsapp-encryption-not-always-secure.jpg" alt="WhatsApp End to End Encryption Is Not Always Secure" class="wp-image-1421" srcset="/static/2025/09/27_whatsapp-encryption-not-always-secure.jpg 900w, /static/2025/09/27_whatsapp-encryption-not-always-secure-300x200.jpg 300w, /static/2025/09/27_whatsapp-encryption-not-always-secure-768x512.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></figure>
</div>


<p>ProPublica recently reported that <a href="/blog/trial-social-media-evidence/">Facebook</a> hired 1000 workers around the world to review <a href="/blog/are-your-electronic-devices-spying-on-you/">WhatsApp</a> messages that are flagged as “inappropriate.” WhatsApp markets itself as a private messaging platform that secures those messages with end-to-end encryption that only the participants can view. Billions of people around the world use WhatsApp and other such “secure” messaging services to exchange private, sensitive business or personal messages.</p>



<p>When Facebook purchased WhatsApp in 2014, both companies assured their users that their messages could not be accessed by either company. However, we have now learned that Facebook not only reviews flagged messages, but has on occasion shared those messages with the Department of Justice and other law enforcement agencies in <a href="/blog/categories/criminal-investigation/">criminal investigations</a>. ProPublica discovered that hourly contract workers in Texas, Ireland and Singapore review millions of users’ content using Facebook software to sift through private messages, images and videos that have been reported by WhatsApp users as improper. These workers then review the flagged content for claims of <a href="/criminal-law/white-collar-crime/">fraud</a>, <a href="/blog/how-authorities-are-alerted-to-child-pornography/">child porn</a>, terrorism and the like.</p>



<p>The head of WhatsApp dismissed the report as a non-story, asserting that its end-to-end encryption platform is secure even as the company works with law enforcement to solve crimes. In fact, ProPublica discovered more than a dozen instances where data from WhatsApp was used in criminal prosecutions since 2017. WhatsApp defends its actions arguing that it hired the workers to identify and remove the worst abusers from the platform, not to control or moderate content.</p>



<p>While the benefits of uncovering crimes involving <a href="/blog/how-authorities-are-alerted-to-child-pornography/">child pornography</a> or terrorist plots may outweigh users’ <a href="/blog/categories/privacy/">privacy</a>, the real question is whether contract employees of a for-profit company should be the ones making those decisions. When law enforcement seeks to review a user’s content – emails, web searches, messages – it must obtain a court authorized <a href="/blog/search-warrant-explained/">warrant</a> based on <a href="/blog/due-process-in-criminal-cases-the-4th-amendment/">probable caus</a>e. The standards used by WhatsApp, and its parent company Facebook, do not require probable cause or an independent determination by a judge. What standards and training, if any, are provided to these contract employees to review private communications is unknown. The old adage -let the buyer (in this case user) beware applies. End-to-end encryption is only as private as the platform it’s on.</p>



<p><strong><a href="/">Stahl Gasiorowski Criminal Defense</a></strong> is here for all your criminal legal needs. We are experienced in all types of complex criminal matters involving a many types of electronic evidence. To contact the firm’s NJ office, call <strong><a href="tel:9083019001">908.301.9001</a></strong> and to contact the firm’s NYC office, call <strong><a href="tel:2127553300">212.755.3300</a></strong>, or email Mr. Stahl at <strong><a href="mailto:rstahl@stahlesq.com">rstahl@stahlesq.com</a></strong>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Warrant to Search Places or to Electronically Intercept Communications – What’s Required?]]></title>
                <link>https://www.stahlesq.com/blog/warrant-whats-required/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/warrant-whats-required/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 05 Feb 2018 21:14:58 GMT</pubDate>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Privacy]]></category>
                
                    <category><![CDATA[Search and Seizure]]></category>
                
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                
                
                <description><![CDATA[<p>Much has been written and tweeted about this past week concerning this topic. Politics aside for the moment, what does the government need to demonstrate to a court that a place should be searched, or a person’s phone calls should be intercepted? To search someone’s home or office, the government must show that there is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="320" height="213" src="/static/2025/09/b8_wiretap.jpg" alt="Warrant to Search Places or To Electronically Intercept Communications" class="wp-image-1533" srcset="/static/2025/09/b8_wiretap.jpg 320w, /static/2025/09/b8_wiretap-300x200.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>
</div>


<p>Much has been written and tweeted about this past week concerning this topic. Politics aside for the moment, what does the government need to demonstrate to a court that a <a href="/blog/search-warrant-explained/">place should be searched</a>, or a person’s phone calls should be intercepted?</p>



<p>To search someone’s home or office, the government must show that there is probable cause to believe that evidence of a crime is presently at the location to be searched. Probable cause exists “where the facts and circumstances within the agents’ knowledge, and of which they had reasonably trustworthy information . . . are sufficient in themselves to warrant a man of reasonable caution in the belief that . . .” a crime has been or is being committed, and that seizable property can be found at the place or on the person to be searched. The probable cause must be timely and the place to be searched must be described with particularity. If information comes from an informant, his or her credibility must be established, either by reciting prior information that has proven to be reliable, or by independent verification of a number of the details provided by the informant.</p>



<p>In the case of a Title III intercept, commonly referred to as a wiretap, there are extra statutory factors that must be met before electronic surveillance will be authorized. Only certain enumerated crimes are subject to a wiretap as an investigatory tool. Most importantly, the affidavit must establish investigative need and that traditional methods of investigation have either failed, are likely not to succeed, or are too dangerous.</p>



<p>What if the affidavit provided to the court for the warrant contains false information? Does that mean the warrant should never have been issued, or that the evidence gathered should be suppressed? Generally, a <a href="/blog/search-warrant-explained/">warrant issued by a judge</a> is presumed valid. In challenging a warrant, the person must demonstrate that (1) the affidavit contained a materially false statement; (2) the false statement was made knowingly and intentionally, or with reckless disregard for the truth; and (3) the allegedly false statement is necessary to the finding of probable cause. If these three points are demonstrated, then a <em>Franks</em> hearing must be held.</p>



<p>The key point is that the warrant will survive, and the evidence gathered admitted in court, if there is sufficient probable cause remaining once the alleged false statement(s) are removed from the affidavit. Generally, even if a warrant was issued with a materially false statement, that was known to be false when made, the evidence will not be suppressed unless the judge would not have issued the warrant if those statements were not included in the application.</p>



<p>Pertinent to recent press reports and the 24-hour cable news cycle, when a Title III warrant has been issued, it is only valid for a specified period of time. After which, the agent must apply for an extension(s). In that application, the agent must demonstrate to the court that material evidence of the crimes being investigated have been intercepted and that the continued authorized interception will likely yield additional evidence. Thus, any renewals will necessarily mean that evidence of the specified crimes have been electronically gathered and that continued electronic interceptions will likely yield additional material intercepts.</p>



<p><strong><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Lawyers</a></strong> aggressively defend individuals charged with complex federal and state crimes.<strong><a href="/lawyers/robert-g-stahl-esq/">Founder Robert G. Stahl</a></strong>is recognized as one of the top criminal defense attorneys in the NY/NJ area for his skills, knowledge and success. To contact us to discuss your case, call <strong><a href="tel:9083019001">908.301.9001</a></strong>for our NJ office and <strong><a href="tel:2127553300">212.755.3300</a></strong>for our NYC office, or email us at <strong><a href="mailto:rgs@sgdefenselaw.com">rgs@sgdefenselaw.com</a>.</strong></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Airport and Border Searches – Know Your Rights]]></title>
                <link>https://www.stahlesq.com/blog/airport-border-searches/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/airport-border-searches/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Wed, 12 Apr 2017 15:01:34 GMT</pubDate>
                
                    <category><![CDATA[Privacy]]></category>
                
                
                
                
                <description><![CDATA[<p>You’ve just enjoyed a great vacation in Europe and are now on your way home. After suffering the hassles of long lines and security at the airport and a cramped flight in coach, you arrive back at Newark Airport. You patiently wait in line for the Customs and Border Entry check and sail through after&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="320" height="240" src="/static/2025/09/95_airport-border-searches.jpg" alt="Airport and Border Searches" class="wp-image-1500" srcset="/static/2025/09/95_airport-border-searches.jpg 320w, /static/2025/09/95_airport-border-searches-300x225.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>
</div>


<p>You’ve just enjoyed a great vacation in Europe and are now on your way home. After suffering the hassles of long lines and security at the airport and a cramped flight in coach, you arrive back at Newark Airport. You patiently wait in line for the Customs and Border Entry check and sail through after casually chatting about your trip with the officer who stamps your United States passport and welcomes you back home. While waiting at the luggage carousel and hoping that your luggage hasn’t been lost, you’re approached by a Customs and Border Protection officer (“CBP”) and asked to come with him to another room. In that room, CBP officers ask you about your travels – why you were there, how long you were gone, who did you meet and what did you do. You explain that it was a simple, straightforward holiday trip that you had saved up for over the past year. The officers then ask for your cellphone, iPad and computer. You ask why and they say that it is routine. They examine the devices and find that they are all password protected. They ask you to unlock your devices so that they can examine the contents. You are shocked, you are a U.S. citizen with constitutional <a href="/blog/categories/privacy/">rights to privacy</a>. Doesn’t the <a href="/blog/due-process-in-criminal-cases-the-4th-amendment/">Fourth Amendment</a> protect you from unreasonable <a href="/criminal-law/search-and-seizure/">searches and seizures</a>, and require the officers to have a <a href="/blog/search-warrant-explained/">warrant supported by probable cause</a>? Usually it does, but not at the border. When you re-enter the United States, you enjoy significantly fewer protections against searches and seizures.<br>
 Recently we have all read about non-citizens being stopped, detained and searched at the border – be it an airport or crossing into the United States from Canada or Mexico – what is less known is that the same intrusive questioning and searches can happen to citizens. According to the most recent statistics, these types of searches have greatly increased, from 8,500 in 2015 to over 24,000 in 2016.</p>



<p>So, what if you refuse to provide the passwords? Well, you can be detained and your devices can be seized. Faced with that, most citizens simply provide the passwords and begrudgingly let the officers scroll through their devices. But, in the age where even our smart phones contain so much of our lives – personal photos, texts and emails with our loved ones, private and confidential business dealings and the like – it is an enormous invasion of privacy that should require a judge’s determination that probable cause exists to compel the disclosure of the password and the search. Our constitutional rights should not stop at the airport or the border.</p>



<p>Several notable organizations and members of Congress agree and are sponsoring legislation that would require a judicial determination of probable cause before CBP would be allowed to search electronic devices. As expected, however, these proposals have been met with opposition citing the country’s need to protect itself from terrorists and other threats. These competing interests must be balanced and reasonable solutions advanced.</p>



<p>If you or your family members have been detained and your electronic devices seized, the attorneys at Stahl Gasiorowski Criminal Defense can help. <a href="/lawyers/">Stahl Gasiorowski Criminal Defense Lawyers</a> aggressively defend organizations and individuals charged with complex federal and state crimes. Founder Robert G. Stahl is recognized as one of the top criminal defense attorneys in the NY/NJ area for his skills, knowledge and success.</p>



<p>To contact us to discuss your case, call <a href="tel:9083019001"><strong>908.301.9001</strong></a> for our NJ office and <a href="tel:2127553300"><strong>212.755.3300</strong></a> for our NYC office, or email us at <a href="mailto:rgs@sgdefenselaw.com"><strong>rgs@sgdefenselaw.com</strong></a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Are Your Electronic Devices Spying on You?]]></title>
                <link>https://www.stahlesq.com/blog/are-your-electronic-devices-spying-on-you/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/are-your-electronic-devices-spying-on-you/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Thu, 09 Mar 2017 15:21:31 GMT</pubDate>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Privacy]]></category>
                
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Investigation]]></category>
                
                
                
                <description><![CDATA[<p>Between the President’s accusation that the prior President tapped his phones, and WikiLeaks recent exposure of alleged CIA hacking tools and techniques, much has been reported in recent days about the government’s ability to intercept and listen to our conversations over our cellphones; computers; smart home devices such as televisions and baby monitors; products such&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="320" height="213" src="/static/2025/09/9c_electronic-devices-spying-on-you.jpg" alt="Are Your Electronic Devices Spying on You?" class="wp-image-1394" srcset="/static/2025/09/9c_electronic-devices-spying-on-you.jpg 320w, /static/2025/09/9c_electronic-devices-spying-on-you-300x200.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>
</div>


<p>Between the President’s accusation that the prior President tapped his phones, and WikiLeaks recent exposure of alleged CIA hacking tools and techniques, much has been reported in recent days about the government’s ability to intercept and listen to our conversations over our cellphones; computers; smart home devices such as televisions and baby monitors; products such as Alexa and Amazon Echo; encrypted messaging apps such as Signal, WhatsApp and Telegram; and home security cameras and systems. All of these devices provide potential ways for the government and hackers to enter our seemingly private worlds and eavesdrop. The difference between the government and a hacker, however, is that the <a href="/blog/due-process-in-criminal-cases-the-4th-amendment/">government must obtain a court authorized warrant</a> to do so.</p>



<p>Federal and state law enforcement investigating many types of criminal activities can apply for a court authorized warrant to intercept calls, text messages, emails and other forms of communications if they demonstrate that there is probable cause to believe that the person is committing the specified unlawful activity and using the specified type of communication device in furtherance of the criminal activity. In addition, law enforcement must demonstrate to the judge that normal investigative techniques have either failed, or would likely fail, to uncover the full scope and extent of the activity or coconspirators. These normal investigative techniques include, interviews, subpoenas, search warrants, undercover investigations and the use of informants.</p>



<p>In most cases of foreign espionage, terrorism and foreign agents, law enforcement must obtain a court order through a FISA application to a FISC court (Foreign Intelligence Surveillance Act authorized Foreign Intelligence Surveillance Court) to intercept communications. The application again requires probable cause that the target of the intercept or surveillance is a foreign power or agent committing certain offenses.</p>



<p>Hackers, however, require nothing more than the skill and access to these common household devices. Routers, security cameras, baby monitors and the like are all known as IoTs – Internet of Things. These products are vulnerable to compromise by malware because of poor factory administrator security settings that are easily hacked. Thus, your family’s security camera can be hacked and used to spy on private activities within your home. Similarly, the camera on your laptop for Skype calls and video conferencing can be hacked to spy on you. While this is certainly a frightening invasion of privacy, and highly illegal, there are many readily available articles by experts that offer detailed instructions on how to change the factory settings on these devices to make it much harder for hackers to get through.</p>



<p>Authorized law enforcement interceptions compel the provider of the service to cooperate and assist law enforcement in effectuating the intercepts and prohibit the provider from revealing the interceptions to its customer. While there are strict compliance standards set by law and reporting requirements at specified intervals to the court, these interceptions not only capture alleged communications about criminal activities, but many times capture innocent conversations, texts, emails and the like between unsuspecting third parties and the targets themselves. It is a very intrusive type of investigative technique that must be used sparingly and adhere to strict guidelines.</p>



<p>The evidence gathered from such interceptions may provide powerful evidence against the accused. However, in many cases those communications are claimed by law enforcement to involve “coded language” that requires “interpretation” by an expert, usually another agent or detective claiming to have specialized training and experience, to inform the jury what the targets “really meant.” Thorough examination of those conversations, experience and vigilance is required by the accused’s attorney to ensure that the supposed expert witness is not misinterpreting the meaning of the conversation and providing unreliable and misleading testimony to the jury. Experienced criminal defense counsel can also attack the <a href="/criminal-law/search-and-seizure/">basis for the warrant to intercept the communications and the procedures followed during and after the period of interception</a> in an effort to suppress any evidence gathered through the interceptions.</p>



<p><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Lawyers</a> aggressively defend organizations and individuals charged with complex federal and state crimes. Founder Robert G. Stahl is recognized as one of the top criminal defense attorneys in the NY/NJ area for his skills, knowledge and success. To contact us to discuss your case, call <strong>908.301.9001</strong> for our NJ office and <strong>212.755.3300</strong> for our NYC office, or email us at <strong>rstahl@stahlesq.com</strong>.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>