It basically contradicts all of your objections.
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Because when you are in a public place you have no right to the expectation of privacy. If you are walking and talking down the sidewalk in town other people are able to hear your side of the conversation. Depending on if your state and the state the other party is in are two or one party states it is a moot point.
This is true, in a public place you have no expectation of privacy... But this fact is completely irrelevant because the methods the stingray devices use to gain the data are deceptive. And more importantly, have absolutely nothing to do with whether you are in a public place or not.
You could be inside your own home, a location afforded and protected by the highest level of what is deemed to be "private", and a stingray device could still gain access to your private data. Again: being in public, or not, has absolutely NOTHING to do with how and why a stingray device operates.
The stingray devices deceives your wireless device into believing they are connected to a legitimate cell tower when it is, in fact, not connected to a legitimate cell tower. Then your phone, believing it is connected to a legitimate cellular tower, pushes it's data like it would to the carrier's cell tower.
The issue then, is not one of a location based privacy nature (re: public/private), but one of whether or not such actions by police are considered fraudulent. Clearly, in order for the stingray device to work, some form of deceptive action must be taken by the device at the behest of the police. The question then becomes: is such using deception to trick a person into believing they are dealing with a legitimate cell tower service that they are paying for a criminal act?
The answer is yes. Deceiving someone and intercepting their communications without their explicit knowledge is in fact a federal criminal act. Specifically, it is the criminal act known as "Interception and disclosure of wire, oral, or electronic communications" colloquially referred to as wiretapping and defined in the following United States Federal Statute:
18 U.S. Code 2511 (link: http://www.law.cornell.edu/usc...)
(1) Except as otherwise specifically provided in this chapter any person who—
shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).
First responders that don't have to worry about every person potentially having a gun will have that luxury. Welcome to the US gun culture.
But that's just it, first responders don't have to worry about every person potentially having a gun.
Because, (CLUE-TRAIN!), every person doesn't have a gun.
Welcome to left-wing sensationalistic bullshit.
Myth #3: Commercial UAS operations are a “gray area” in FAA regulations.
Fact—There are no shades of gray in FAA regulations. Anyone who wants to fly an aircraft—manned or unmanned—in U.S. airspace needs some level of FAA approval. Private sector (civil) users can obtain an experimental airworthiness certificate to conduct research and development, training and flight demonstrations. Commercial UAS operations are limited and require the operator to have certified aircraft and pilots, as well as operating approval. To date, only two UAS models (the Scan Eagle and Aerovironment’s Puma) have been certified, and they can only fly in the Arctic. Public entities (federal, state and local governments, and public universities) may apply for a Certificate of Waiver or Authorization (COA)
Never worry about theory as long as the machinery does what it's supposed to do. -- R. A. Heinlein