Tag Archives: Cell-Site Simulator

Federal Judge Issues New Rules for Use of Stingray Surveillance in Illinois

US Magistrate Judge Iain Johnston of Illinois recently announced three new requirements for government agencies that wish to deploy cell-site simulators, also known as Stingrays. For the moment, the order only applies to law enforcement agencies under the jurisdiction of Judge Johnston’s court in the Northern District of Illinois.

The Electronic Frontier Foundation describes Stingrays as:

[pull_quote_center]

A brand name of an IMSI (International Mobile Subscriber Identity) Catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cellphone tower – to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not – and tricks your phone into connecting to it. 

As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations.

[/pull_quote_center]

[Read More: A Guide to Stingray Cellphone Surveillance Technology]

During proceedings for an ongoing drug case, Judge Johnston issued three new requirements for prosecutors to fulfill before he will sign off on the future use of mass surveillance devices. The requirements are aimed at protecting the privacy of innocent individuals who may have their information collected via Stingray during the course of an investigation.

Judge Johnston’s requirements call on government agents to obtain a warrant, and not to make use of the devices when “an inordinate number of innocent third parties’ information will be collected.” This could include any large public event. The judge also requires the government to “immediately destroy” unrelated data within 48 hours and prove to the court the information has been deleted.

Judge Johnston’s final requirement states that officers cannot use the collected data in any way beyond what is necessary to determine the cell phone information of the target. In a powerful condemnation of the Stingray devices, Johnston states:

“A cell-site simulator is simply too powerful of a device to be used and the information captured by it too vast to allow its use without specific authorization from a fully informed court. Minimizing procedures, such as the destruction of private information the United States has no right to keep, are necessary to protect the goals of the Fourth Amendment.”

[RELATED: FBI Claims They Are Not Responsible for Secrecy on ‘StingRay’ Surveillance]

“As I’m sure you know, applications for court orders for Stingrays have often been fairly misleading, so as not to disclose that the devices being used,” Rachel Levinson-Waldman, an attorney and legal scholar at New York University, told Ars Technica. “So I think this is the first time, or close to it, that a judge has had a chance to address them directly in a published order. That alone is striking.”

Levinson-Waldman also said she believes the judge is using the order to “urge other judges to take the time to understand what stingrays really are.”

The secrecy surrounding the use of these devices has been a contentious topic of debate for several years. However, the use of open records requests and Freedom of Information Act requests has helped paint a clearer picture of how the tools are employed by local, state, and federal agencies.

Truth In Media recently reported that four members of the House Oversight Committee sent letters to 24 federal agencies including the Department of State and the Securities and Exchange Commission, demanding answers regarding policies for using the controversial surveillance technology.

House Oversight Committee Chairman Jason Chaf­fetz, ranking member Elijah Cummings, and Reps. Will Hurd (R-Texas) and Robin Kelly (D-Ill.), members of the committee’s IT subcommittee, issued requests for information related to the potential use of stingrays, also known as cell-site simulators.

Chaf­fetz also recently introduced the Stingray Privacy Act, which would expand newly established warrant requirements for the Department of Justice and Department of Homeland Security to all federal, state, and local agencies that use the cell-site simulators.

In September, the DHS joined the DOJ by announcing warrant requirements for the use of stingray equipment, but the rule changes have come under fire for possible loopholes which may allow the continued use of surveillance equipment without a warrant.

Justice Department Will Require Warrants For Some Cellphone Tracking Technology

The U.S. Department of Justice announced on Thursday that it will now require U.S. prosecutors and some federal law enforcement agencies to obtain a search warrant in order to use cellphone tracking technology.

In a statement, the DoJ said that the new policy “goes into effect immediately” and will “provide department components with standard guidance for the use of cell-site simulators in the department’s domestic criminal investigations,” and “establish new management controls for the use of the technology.”

Before the change in policy, U.S. government agencies were permitted to use cell-site simulators or “stingray” devices to replicate phone towers in order to track a phone’s location without applying for a warrant or giving probable cause.

[RELATED: A Guide To Stingray Cellphone Surveillance Technology]

Deputy Attorney General Sally Quillian Yates claimed that the stingray devices have been “instrumental in aiding law enforcement in a broad array of investigations, including kidnappings, fugitive investigations and complicated narcotics cases.”  

“This new policy ensures our protocols for this technology are consistent, well-managed and respectful of individuals’ privacy and civil liberties,” Yates said.

[RELATED: Newly Released ‘Stingray’ Manual Shows Company Asked FCC For Secrecy]

The DoJ stated that the new policy will establish a set of required practices for dealing with the data collected by the cell-site simulators, which includes deleting all data from a device “as soon as that device is located, and no less than once daily.”

The policy also lays out guidelines for the type of content that may be collected, and it prohibits the collection “contents of any communication in the course of criminal investigations,” such as emails, texts, contact information and pictures.

[RELATED: Chicago, L.A. Police Using ‘Stingray’ Surveillance Capable Of Breaking Encryption]

Cell-site simulator devices have been criticized by privacy advocates such as the American Civil Liberties Union for the frequency in which they are used by law enforcement, the amount of data they pick up on innocent bystanders, and the secrecy surrounding their use.

Reuters noted that the new policy does not apply to agencies outside of the DoJ, including the Department of Homeland Security, the Central Intelligence Agency and the National Security Agency.