ACLU makes app that sends phone video of police misconduct directly to ACLU servers


1 Like


What happens when Stingray/Triggerfish devices get to censor outbound content ? Wouldn’t that be horrid if the LEO could intercept and edit what gets out of the area via radio signals without anyone being to prove or even speak about it in court?


A Stringray doesn’t even need to censor, it just kills your connection to the carrier so no upload.

I believe the issue is it could possibly man in the middle you and make it appear that it was uploaded successfully. With NSA malware they may even delete any backup you created with the phone - destroying all evidence for even attempting to upload it. And guess what happens to the uploader soon after. Very possible from a technical (and sadly historical) standpoint.


Honestly the best defense about this is that police officers abuses of power are often spur of the moment power trips instead of deliberately planned and executed - but not all of them unfortunately.

Soo, I gotta ask, is this just for use in California?


Maybe? It doesn’t show up in the Canadian Play store, anyway.

You’re living in the wrong Ontario, CA.


The FAQ says

Versions of the Mobile Justice CA app are currently available in Missouri, Mississippi, Nebraska, New York and Oregon. There are plans for other states to roll out the app. Please contact your local ACLU.

That’s what removing and hiding the memory card is for.
Possibly a wireless mesh network that assures that the footage gets stored in several places even if the area is cut off. Possibly with connection to free accesspoints provided by local residents from their windows, where available. Possibly even “bluesniping” the content from the phone of an accomplice over several miles of distance.

What (if anything) is the difference between Mobile Justice - California and Mobile Justice - Missouri?

different laws in the “Know your rights” section, possibly different servers, a different set of lawyers.

Wouldn’t it be difficult to mitm a relay in realtime that used end to end encryption and/or randomised proxies, especially if the interception was non-targeted trawling?

I mean, it’s one thing to set up a convincing mitm attack on a single suspect but quite another to kick one into action when a random passerby whips out their phone…

1 Like

Manually, yes.

But for electronics, a millisecond is an aeon of time.

This topic was automatically closed after 5 days. New replies are no longer allowed.