Police Magazine Logo
MenuMENU
SearchSEARCH

Hobbling Our Investigations

Some elected officials seem compelled to introduce legislation aimed at protecting the rights of suspected criminals while impeding our investigations.

September 18, 2012
Hobbling Our Investigations

Photo courtesy of FLEOA.

4 min to read


Some elected officials seem compelled to introduce legislation aimed at protecting the rights of suspected criminals while impeding our investigations. On July 9, Rep. Edward Markey (D-Mass.) issued a press release alleging that law enforcement officers were abusing their authority and compromising the rights of innocent consumers by making excessive requests for cell phone data.

Markey derived his information from data he allegedly received from nine mobile wireless carriers. Markey declared that in 2011, "federal, state, and local law enforcement agencies made more than 1.3 million requests of wireless carriers for the cell phone records of consumers, and the number is increasing every year."

Ad Loading...

Lacking context, this comes across as an alarming statistic. But Markey neglected to mention that from 2010 to 2011, wireless communication transmissions increased by 123%.

Instead, Markey seeks to exploit an isolated statistic to suggest that law enforcement is engaging in an uncontrolled electronic fishing expedition. Does Markey really think we have the time or desire to recklessly request voluminous records irrespective of any specific investigative purpose?

Nonetheless, Markey attempts to validate his position by stating in his release, "We cannot allow privacy protections to be swept aside with the sweeping nature of these information requests, especially for innocent consumers. Law enforcement agencies are looking for a needle, but what are they doing with the haystack?"

Are we to infer that if a criminal pays his cell phone bill on time, he is an "innocent consumer?" Furthermore, suspected criminals should not be trivialized as "needles" in a misapplied analogy. We are not trampling on static straws of "hay," but are instead functioning in a fast-moving, dynamic environment. Law enforcement officers endure great risk and sacrifice pursuing terrorists, drug traffickers, fugitives, and violent gang members, while upholding the sacred due process of law.

Since Markey first alleged that law enforcement was violating the rights of innocent consumers, FLEOA recommended that he query the various internal affairs and inspector general units of our agencies to ascertain the number of substantiated cases of abuse. Markey opted not to pursue this reasonable course of action, but instead to rely exclusively on the isolated data that the carriers provided. Had he made the good faith effort we requested, he would have learned that there is no epidemic of law enforcement abuse.

Ad Loading...

Undeterred, Markey issued another press release on August 9, announcing the draft of his new legislation, The Wireless Surveillance Act of 2012. In the draft, he mischaracterizes legitimate law enforcement efforts to obtain cell phone records as a "startling number of requests."

Additionally, Markey's legislative proposal fails to recognize the rampant increase in identity theft and the harmful impact this crime has on "innocent consumers." Identity thieves rely on their access to wireless communications to accomplish their goals, and their mobility continues to pose a significant challenge to law enforcement. While Rep. Markey claims that his legislation would bring greater accountability, in effect it would only serve as a trip wire to disrupt law enforcement efforts to pursue criminals and their accomplices.

On May 17, FLEOA Vice President John Ramsey testified at a congressional hearing in opposition to H.R. 2168, the Geolocational Privacy and Surveillance Act. He represented federal law enforcement officers by opposing the implementation of further restrictions on law enforcement's ability to obtain wireless information. In his testimony, he posed an important question followed by poignant commentary: "Do we really want to slow down the apprehension of murderers and rapists so they can build their trophy wall by increasing the amount of legal documents necessary for law enforcement to gather information?"

With the advent of e-mail, Twitter, voice over Internet protocol, Facebook, instant messaging, and other wireless media, criminals have more tools than ever to accomplish their objectives. Recognizing the value of wireless communication, numerous criminals have dropped their guns and picked up smart phones and tablets. As the number of wireless communication options grows, so will the number of criminals seeking to exploit them. If Markey would take pause to consider this, he might come to realize that his legislation serves to protect criminal conduct and not innocent Americans.

Related:

Ad Loading...
Subscribe to our newsletter

More Technology

Fans cheer at Saban Field at Bryant-Denny Stadium during a football game at The University of Alabama.
TechnologyApril 23, 2026

The University of Alabama Rolls Out Couter-Drone Technology

The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.

Read More →
Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Ad Loading...
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Ad Loading...
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

A police department’s guide to fleet management and vehicle health

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →