Tag Archives: dirt boxes

Records: U.S. Marshals Used Stingray Surveillance Nearly 6,000 Times

According to newly released records, the U.S. Marshals Service has used cellphone surveillance tools, sometimes known as Stingrays, on the phones of nearly 6,000 suspects. The Marshals Service accidentally confirmed its use of the devices to USA Today during a Freedom of Information Act request for a copy of the agency’s log of cases in which agents had used stingrays.

Truth In Media has written extensively about Stingrays, or cell-site simulators, and how they are being used to track suspected criminals while largely operating without oversight from local, state, or federal authorities. Exactly how the devices operate and what data they collect and/or save has been unknown because of the vast degree of secrecy surrounding the tools.

The Electronic Frontier Foundation describes the Stingray as “a brand name of an IMSI (International Mobile Subscriber Identity) Catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cellphone tower– to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not– and tricks your phone into connecting to it.

In a response to USA Today’s FOIA request, the Marshals Service included an “almost totally censored” spreadsheet listing its Stingray cases. Although the details of the specific cases were blacked out USA Today was able to count the number of entries the agency had made on its log of Stingray uses. The agency described the log in a letter as “a listing of IMSI catcher use.”

USA Today reported:

“The Marshals Service’s surveillance log lists 5,975 cases in which the Marshals Service used stingrays. The agency declined to say what time period the log covered, or where the suspects were arrested. It also declined to identify the suspects, to protect their privacy.”

“Just that sheer number is significant,” American Civil Liberties Union lawyer Nathan Wessler told USA Today. “That’s a lot of deployments of a very invasive surveillance tool.”

“The Marshals Service confirmed its use of the devices to USA TODAY only in the process of trying to keep it secret, rejecting a Freedom of Information Act request for a copy of its log of cases in which agents had used stingrays,” USA Today reported.

The new details make it clear that the U.S. Marshals Service has used the devices more than any other agency. It was recently reported that the New York Police Department used Stingrays about 1,000 times since 2008. It was also previously revealed that the Baltimore Police Department used the technology more than 4,300 times.

This is not the first time the public has learned details of the U.S. Marshals’ cellphone surveillance program. In late 2014, the Wall Street Journal revealed a cell-phone monitoring program operated by the U.S. Marshals Service using small planes. The program involved the Marshals using Cessna planes mounted with cell-site simulators similar to stingrays. These so-called “dirt boxes” are supposed to be used for criminal investigations, but they are capable of collecting data from tens of thousands of people on each flight.

In early March of 2015, it was also revealed that the CIA has been working with the Marshals on the program. Over the last ten years, the U.S. Marshal’s Technical Operations Group worked with the CIA’s Office of Technical Collection to develop the technology. The agencies have spent more than $1 million developing the technology. USA Today reports that the Technical Operations Group instructs agents not to reveal “sensitive or classified information or programs” without approval, unless a court orders them to do so.

“For any sensitive technique, method, source or tool, it only makes good sense that law enforcement would not divulge this information,” William Sorukas, a former supervisor of the Marshals Service’s domestic investigations, told USA Today.

The U.S. Marshals Service has not commented on the findings.

In 2015, the Department of Justice ordered federal agents to begin obtaining search warrants before using stingrays. As of February 2016, several federal agencies are known to be using the devices, including the FBI, the NSA, the U.S. Marshals, the CIA, the IRS, and the ATF.

Chicago, L.A. Police Using ‘Stingray’ Surveillance Capable of Breaking Encryption

A new report from the Center for Investigative Reporting reveals that police in Chicago and Los Angeles are using advanced cell site simulators, or “Stingray” surveillance technology capable of breaking cellphone encryption. Truth In Media has written extensively about how the devices are being used to track suspected criminals while largely operating without oversight from local, state, or federal authorities. Exactly how the devices operate and what data they collect and/or save has been unknown because of a vast amount of secrecy surrounding the tools.

[RELATED: Newly Released “StingRay” Manual Shows Company Asked FCC for Secrecy]

According to the Electronic Frontier Foundation:

“THE STINGRAY IS A BRAND NAME OF AN IMSI (INTERNATIONAL MOBILE SUBSCRIBER IDENTITY) CATCHER TARGETED AND SOLD TO LAW ENFORCEMENT.

A STINGRAY WORKS BY MASQUERADING AS A CELL PHONE TOWER—TO WHICH YOUR MOBILE PHONE SENDS SIGNALS TO EVERY 7 TO 15 SECONDS WHETHER YOU ARE ON A CALL OR NOT— AND TRICKS YOUR PHONE INTO CONNECTING TO IT. AS A RESULT, THE GOVERNMENT CAN FIGURE OUT WHO, WHEN AND TO WHERE YOU ARE CALLING, THE PRECISE LOCATION OF EVERY DEVICE WITHIN THE RANGE, AND WITH SOME DEVICES, EVEN CAPTURE THE CONTENT OF YOUR CONVERSATIONS.”

[RELATED: Company Behind Stingray Cell Phone Surveillance Tool Lied to the FCC]

Most of the information been released through the efforts of intrepid investigative journalists and Freedom of Information Act (FOIA) activists has related specifically to the manufacturer of the Stingray – the Harris Corporation. The Harris Corporation has exercised a great amount of secrecy surrounding these tools. Truth In Media previously reported on documents which revealed the Harris Corp. worked with the Federal Communications Commission to maintain a high level of secrecy. I have also documented the fact that Harris Corp. lied to the FCC in their application for the use of cell site simulators.

The Harris Corporation needs to be investigated and held accountable, but they are just one of the corporations producing cell site simulators. The devices being used by the Los Angeles and Chicago police departments are known as “dirt boxes”. They operate in the same fashion as the Stingray, however, these new documents reveal they are also capable of jamming transmissions, and breaking encryption. The CIR writes:

“The sophisticated surveillance equipment, manufactured by Digital Receiver Technology (DRT) Inc., a Maryland company acquired by The Boeing Co. in 2008, provides a more powerful class of cell-site simulator than the more widely used StingRay devices produced by Harris Corp., which require an upgrade to intercept communications and data transmissions. According to Digital Receiver Technology’s documentation, its devices are capable of breaking encryption on communications from 200 cellphones simultaneously across state-of-the-art 4G LTE frequencies used for rapid data transmission by the latest generation of smartphones.”

A cell site simulator from DRT
A cell site simulator from DRT

Digital Receiver Technology first did business with the Chicago police in 2005 with the purchase of a cell site simulator. The device was paid for with funds collected from asset forfeiture cases. Meanwhile cops in Los Angeles purchased a package from Digital Receiver Technology using $260,000 in homeland security grant funding. Both departments also use the Harris Corp’s Stingray device as well.

Procurement documents obtained by the CIR show that the United States Navy purchased  Digital Receiver Technology equipment to mount on drones at its China Lake research and development facility in Southern California. According to the CIR documents the technology is also used by the U.S. Special Operations Command, Drug Enforcement Administration, FBI and U.S. Customs and Border Protection.

The major difference between the Stingray and the DRT boxes is the ability of the more advanced DRT devices to break encryption. A 2011 purchase order for this equipment by the Washington Headquarters Services, a branch of the Pentagon, states the devices can retrieve the encryption session keys for a cellphone “in less than a second with success rates of 50 to 75% (in real world conditions).”

Chicago and Los Angeles police officials will not confirm or deny the use of or possession of the devices.

Freddy Martinez, the activist who sued the Chicago Police Department for records related to cell site simulators, says the potential for spying is unlimited. “With DRT, if you put one of these on an airplane and fly them around, you can find all sorts of info about potentially thousands of people. That includes voice content, who they’re calling, what data they’re sending. It’s like a StingRay on steroids.”

Martinez is not exaggerating. In late 2014, the Wall Street Journal revealed the existence of a cell-phone monitoring program being operated by the U.S. Marshals Service using small planes. The program involved the Marshals using Cessna planes mounted with cell-site simulators.

The so-called Dirtboxes are supposed to be used for criminal investigations, but the ACLU says they can collect data from tens of thousands of people on each flight. The Electronic Frontier Foundation filed a FOIA request with the Department of Justice and FBI but has yet to receive any additional information. The EFF has now filed suit against the DOJ and FBI.

In early March of 2015, it was also revealed that the CIA has been working with the Marshals on the program. Over the last ten years, the U.S. Marshal’s Technical Operations Group worked with the CIA’s Office of Technical Collection to develop the technology. The agencies have spent more than $1 million developing the technology.

In June it was revealed that agencies within the U.S. government operate fake, front companies to handle surveillance flights. Some of these flights included monitoring protesters in Baltimore.

With multiple agencies of the local, state, and federal governments operating devices capable of monitoring and storing your information, as well as cracking encryption, can it truly be said that the people are free? The freedom to have privacy is one of the greatest freedoms that humans have. If we are not free to our own private affairs, we are not free.

Check out this Guide to Stingray Technology for more information.

Justice Department Using Fake Cell Towers On Airplanes, Collecting Data From Countless Cell Phones

According to a new report from the Wall Street Journal, the Justice Department has been operating a surveillance program that uses fake cell phone towers placed on airplanes to collect identifying data from a vast number of cell phones.

In this program, Cessna aircraft operated by the US Marshals Service fly over most of the United States, embedded with small devices called “dirtboxes” by insider sources familiar with the program. The dirtboxes mimic cell phone towers which prompt cell phones to reveal their identifying information and location, including phones with encryption technology. The program has been utilized by the Justice Department and US Marshals Service since 2007.

In September, Benswann.com reported that fake cell phone towers, or “interceptors,” had been discovered near military bases throughout the United States.

The program insiders have said that this program is in place for the purpose of “locating cellphones linked to individuals under investigation by the government, including fugitives and drug dealers, but it collects information on cellphones belonging to people who aren’t criminal suspects.” The individuals providing information about the program said that data from tens of thousands of phones can be collected after one flight.

The sources claimed that the dirtboxes are able to determine which phones belong to suspects, but did not disclose whether or not the data belonging to unsuspected individuals is stored.

These devices bypass requests for location and identifying data from phone companies such as Verizon and AT&T by gathering the information themselves. A spokesman for Verizon said the company was unaware of such an operation, while AT&T and Sprint declined to comment.