This section on surveillance tools used by law enforcement is discussion focused, and intends to get students to think critically about the relationship between surveillance, privacy, and transparency. It begins with lecture canvassing a variety of law enforcement surveillance technology, based on research from from the Electronic Frontier Foundation. Afterward, the module opens into an activity to investigate surveillance technology used in a location of their choice, followed by a discussion of their interpretation of law enforcement surveillance technologies they've discovered.
Threat modeling
Legal requests in the U.S.
60-70 minutes
The technical capabilities of law enforcement actors may affect journalists' threat models when conducting work in risky situations. For example, when meeting a sensitive source their location may be tracked through a constellation of surveillance equipment, or their phone numbers and current call or text data may be scooped up when covering protests.
(Before class)
Credit to Dave Maass and the Electronic Frontier Foundation for these slides, with minor modifications.
Law enforcement surveillance tech (Google Slides)
Have students open up Atlas of Surveillance and report back for the group with surveillance technology used in a location where they've lived in the U.S. (e.g., where their hometown is; the campus).