New Hi-Tech Police Surveillance: The “StingRay” Cell Phone Spying Device
Global Research, May 19, 2015
StingRay cell phone spying device (US Patent photo)
The new surveillance technology is the
StingRay (also marketed as Triggerfish, IMSI Catcher, Cell-site
Simulator or Digital Analyzer), a sophisticated, portable spy device
able to track cell phone signals inside vehicles, homes and insulated
buildings. StingRay trackers act as fake cell towers, allowing police
investigators to pinpoint location of a targeted wireless mobile by
sucking up phone data such as text messages, emails and cell-site
information.
When a suspect makes a phone call, the StingRay tricks the cell into
sending its signal back to the police, thus preventing the signal from
traveling back to the suspect’s wireless carrier. But not only does
StingRay track the targeted cell phone, it also extracts data off
potentially thousands of other cell phone users in the area.Although manufactured by a Germany and Britain-based firm, the StingRay devices are sold in the US by the Harris Corporation, an international telecommunications equipment company. It gets between $60,000 and $175,000 for each Stingray it sells to US law enforcement agencies.
[While the US courts are only beginning to grapple with StingRay, the high tech cat-and-mouse game between cops and criminals continues afoot. Foreign hackers reportedly sell an underground IMSI tracker to counter the Stingray to anyone who asks for $1000. And in December 2011, noted German security expert Karsten Nohl released "Catcher Catcher," powerful software that monitors a network's traffic to seek out the StingRay in use.]
Originally intended for terrorism investigations, the feds and local law enforcement agencies are now using the James Bond-type surveillance to track cell phones in drug war cases across the nation without a warrant. Federal officials say that is fine — responding to a Freedom of Information Act (FOIA) request filed by the Electronic Freedom Foundation (EFF) and the First Amendment Coalition, the Justice Department argued that no warrant was needed to use StingRay technology.
“If a device is not capturing the contents of a particular dialogue call, the device does not require a warrant, but only a court order under the Pen Register Statute showing the material obtained is relevant to an ongoing investigation,” the department wrote.
The FBI claims that it is adhering to lawful standards in using StingRay. “The bureau advises field officers to work closely with the US Attorney’s Office in their districts to comply with legal requirements,” FBI spokesman Chris Allen told the Washington Post last week, but the agency has refused to fully disclose whether or not its agents obtain probable cause warrants to track phones using the controversial device.
And the federal government’s response to the EFF’s FOIA about Stingray wasn’t exactly responsive. While the FOIA request generated over 20,000 records related to StingRay, the Justice Department released only a pair of court orders and a handful of heavily redacted documents that didn’t explain when and how the technology was used.
The LA Weekly reported in January that the StingRay “intended to fight terrorism was used in far more routine Los Angeles Police criminal investigations,” apparently without the courts’ knowledge that it probes the lives of non-suspects living in the same neighborhood with a suspect.
Critics say the technology wrongfully invades technology and that its uncontrolled use by law enforcement raised constitutional questions. “It is the biggest threat to cell phone privacy you don’t know about,” EFF said in a statement.
ACLU privacy researcher Christopher Soghoian told a Yale Law School Location Tracking and Biometrics Conference panel last month that “the government uses the device either when a target is routinely and quickly changing phones to thwart a wiretap or when police don’t have sufficient cause for a warrant.”
“The government is hiding information about new surveillance technology not only from the public, but even from the courts,” ACLU staff attorney Linda Lye wrote in a legal brief in the first pending federal StingRay case (see below). “By keeping courts in the dark about new technologies, the government is essentially seeking to write its own search warrants, and that’s not how the Constitution works.”
Lye further expressed concern over the StingRay’s ability to interfere with cell phone signals in violation of Federal Communication Act. “We haven’t seen documents suggesting the LAPD or any other agency have sought or obtained FCC authorization,” she wrote.
“If the government shows up in your
neighborhood, essentially every phone is going to check in with the
government,” said the ACLU’s Soghoian. “The government is sending
signals through people’s walls and clothes and capturing information
about innocent people. That’s not much different than using invasive
technology to search every house on a block,” Soghoian said during interviews with reporters covering the StingRay story.
Advocates also raised alarms over another troubling issue: Using the
StingRay allows investigators to bypass the routine process of obtaining
fee-based location data from cell service providers like Sprint,
AT&T, Verizon, T-Mobile and Comcast. Unlike buying location data fro
service providers, using StingRay leaves no paper trail for defense
attorneys.The StingRay technology is so new and so powerful that it not only raises Fourth Amendment concerns, it also raises questions about whether police and federal agents are withholding information about it from judges to win approval to monitor suspects without meeting the probable cause standard required by the Fourth. At least one federal judge thinks they are. Magistrate Judge Brian Owsley of the Southern District of Texas in Corpus Christi told the Yale conference federal prosecutors are using clever techniques to fool judges into allowing use of StingRay. They will draft surveillance requests to appear as Pen Register applications, which don’t need to meet the probable cause standards.
“After receiving a second StingRay request,” Owsley told the panel, “I emailed every magistrate judge in the country telling them about the device. And hardly anyone understood them.”
...
A federal judge in Arizona is now set to render a decision in the nation’s first StingRay case. After a hearing last week, the court in US v. Rigmaiden is expected to issue a ruling that could set privacy limits on how law enforcement uses the new technology. Just as the issue of GPS tracking technology eventually ended up before the Supreme Court, this latest iteration of the ongoing balancing act between enabling law enforcement to do its job and protecting the privacy and Fourth Amendment rights of citizens could well be headed there, too.
No comments:
Post a Comment