Advances in emerging surveillance technologies like cell-site simulators – devices which transform a cell phone into a real-time tracking device – require careful evaluation to ensure their use is consistent with the protections afforded under the First and Fourth Amendments to the U.S. Constitution. The United States’ military and intelligence agencies have developed robust and sophisticated surveillance technologies for deployment in defense against threats from foreign actors. These technologies are essential to keeping America safe. Increasingly though, domestic law enforcement at the federal, state, and local levels are using surveillance technologies in their every-day crime-fighting activities. In the case of cell-site simulators, this technology is being used to investigate a wide range of criminal activity, from human trafficking to narcotics trafficking, as well as kidnapping, and to assist in the apprehension of dangerous and violent fugitives.
U.S. House of Representatives Report: Warlords Provide Security for U.S. Supply Chain in Afghanistan
Security for the U.S. Supply Chain Is Principally Provided by Warlords. The principal private security subcontractors on the HNT contract are warlords, strongmen, commanders, and militia leaders who compete with the Afghan central government for power and authority. Providing “protection” services for the U.S. supply chain empowers these warlords with money, legitimacy, and a raison d’etre for their private armies. Although many of these warlords nominally operate under private security companies licensed by the Afghan Ministry of Interior, they thrive in a vacuum of government authority and their interests are in fundamental conflict with U.S. aims to build a strong Afghan government.