Feds' New Cell Phone Spying Device Raising Privacy Concerns [FEATURE]

special to Drug War Chronicle by independent investigative journalist Clarence Walker, [email protected]

Blocked by a Supreme Court decision from using GPS tracking devices without a warrant, federal investigators and other law enforcement agencies are turning to a new, more powerful and more threatening technology in their bid to spy more freely on those they suspect of drug crimes. That's leading civil libertarians, electronic privacy advocates, and even some federal judges to raise the alarm about a new surveillance technology whose use has yet to be taken up definitively by the federal courts.

StingRay cell phone spying device (US Patent photo)
The new surveillance technology is the StingRay (also marketed as Triggerfish, IMSI Catcher, Cell-site Simulator or Digital Analyzer), a sophisticated, portable spy device able to track cell phone signals inside vehicles, homes and insulated buildings. StingRay trackers act as fake cell towers, allowing police investigators to pinpoint location of a targeted wireless mobile by sucking up phone data such as text messages, emails and cell-site information.

When a suspect makes a phone call, the StingRay tricks the cell into sending its signal back to the police, thus preventing the signal from traveling back to the suspect's wireless carrier. But not only does StingRay track the targeted cell phone, it also extracts data off potentially thousands of other cell phone users in the area.

Although manufactured by a Germany and Britain-based firm, the StingRay devices are sold in the US by the Harris Corporation, an international telecommunications equipment company. It gets between $60,000 and $175,000 for each Stingray it sells to US law enforcement agencies.

[While the US courts are only beginning to grapple with StingRay, the high tech cat-and-mouse game between cops and criminals continues afoot. Foreign hackers reportedly sell an underground IMSI tracker to counter the Stingray to anyone who asks for $1000. And in December 2011, noted German security expert Karsten Nohl released "Catcher Catcher," powerful software that monitors a network's traffic to seek out the StingRay in use.]

Originally intended for terrorism investigations, the feds and local law enforcement agencies are now using the James Bond-type surveillance to track cell phones in drug war cases across the nation without a warrant. Federal officials say that is fine -- responding to a Freedom of Information Act (FOIA) request filed by the Electronic Freedom Foundation (EFF) and the First Amendment Coalition, the Justice Department argued that no warrant was needed to use StingRay technology.

"If a device is not capturing the contents of a particular dialogue call, the device does not require a warrant, but only a court order under the Pen Register Statute showing the material obtained is relevant to an ongoing investigation," the department wrote.

The FBI claims that it is adhering to lawful standards in using StingRay. "The bureau advises field officers to work closely with the US Attorney's Office in their districts to comply with legal requirements," FBI spokesman Chris Allen told the Washington Post last week, but the agency has refused to fully disclose whether or not its agents obtain probable cause warrants to track phones using the controversial device.

And the federal government's response to the EFF's FOIA about Stingray wasn't exactly responsive. While the FOIA request generated over 20,000 records related to StingRay, the Justice Department released only a pair of court orders and a handful of heavily redacted documents that didn't explain when and how the technology was used.

The LA Weekly reported in January that the StingRay "intended to fight terrorism was used in far more routine Los Angeles Police criminal investigations," apparently without the courts' knowledge that it probes the lives of non-suspects living in the same neighborhood with a suspect.

Critics say the technology wrongfully invades technology and that its uncontrolled use by law enforcement raised constitutional questions. "It is the biggest threat to cell phone privacy you don't know about," EFF said in a statement.

ACLU privacy researcher Christopher Soghoian told a Yale Law School Location Tracking and Biometrics Conference panel last month that "the government uses the device either when a target is routinely and quickly changing phones to thwart a wiretap or when police don't have sufficient cause for a warrant."

"The government is hiding information about new surveillance technology not only from the public, but even from the courts," ACLU staff attorney Linda Lye wrote in a legal brief in the first pending federal StingRay case (see below). "By keeping courts in the dark about new technologies, the government is essentially seeking to write its own search warrants, and that's not how the Constitution works."

Lye further expressed concern over the StingRay's ability to interfere with cell phone signals in violation of Federal Communication Act. "We haven't seen documents suggesting the LAPD or any other agency have sought or obtained FCC authorization," she wrote.

StingRay pricing chart (publicintelligence.net)
"If the government shows up in your neighborhood, essentially every phone is going to check in with the government," said the ACLU's Soghoian. "The government is sending signals through people's walls and clothes and capturing information about innocent people. That's not much different than using invasive technology to search every house on a block," Soghoian said during interviews with reporters covering the StingRay story.

Advocates also raised alarms over another troubling issue: Using the StingRay allows investigators to bypass the routine process of obtaining fee-based location data from cell service providers like Sprint, AT&T, Verizon, T-Mobile and Comcast. Unlike buying location data fro service providers, using StingRay leaves no paper trail for defense attorneys.

Crack defense attorney Stephen Leckar who scored a victory in a landmark Supreme Court decision over the feds' warrantless use of a GPS tracker in US v. Jones, a cocaine trafficking case where the government tracked Jones' vehicle for weeks without a warrant, also has concerns.

"Anytime the government refuses to disclose the ambit of its investigatory device, one has to wonder, what's really happening," he told the Chronicle. "If without a warrant the feds use this sophisticated device for entry into people's homes, accessing private information, they may run afoul of a concurring opinion by Justice Alito, who ruled in US v Jones whether people would view unwarranted monitoring of their home or property as Constitutionally repugnant."

Leckar cited Supreme Court precedent in Katz v. US (privacy) and US v. Kyllo (thermal imaging), where the Supreme Court prohibited searches conducted by police from outside the home to obtain information behind closed doors. Similar legal thinking marked February's Supreme Court decision in a case where it prohibited the warrantless use of drug dogs to sniff a residence, Florida v. Jardines.

The EFF FOIA lawsuit shed light on how the US government sold StingRay devices to state and local law enforcement agencies for use specifically in drug cases. The Los Angeles and Fort Worth police departments have publicly acknowledged buying the devices, and records show that they are using them for drug investigations.

"Out of 155 cell phone investigations conducted by LAPD between June and September 2012, none of these cases involved terrorism, but primarily involved drugs and other felonies," said Peter Scheer, director of the First Amendment Center.

The StingRay technology is so new and so powerful that it not only raises Fourth Amendment concerns, it also raises questions about whether police and federal agents are withholding information about it from judges to win approval to monitor suspects without meeting the probable cause standard required by the Fourth. At least one federal judge thinks they are. Magistrate Judge Brian Owsley of the Southern District of Texas in Corpus Christi told the Yale conference federal prosecutors are using clever techniques to fool judges into allowing use of StingRay. They will draft surveillance requests to appear as Pen Register applications, which don't need to meet the probable cause standards.

"After receiving a second StingRay request," Owsley told the panel, "I emailed every magistrate judge in the country telling them about the device. And hardly anyone understood them."

In a earlier decision related to a Cell-site Simulator, Judge Owsley denied a DEA request to obtain data information to identify where the cell phone belonging to a drug trafficker was located. DEA wanted to use the suspect's E911 emergency tracking system that is operated by the wireless carrier. E911 trackers reads signals sent to satellites from a cell phone's GPS chip or by triangulation of radio transmitted signal. Owsley told the panel that federal agents and US attorneys often apply for a court order to show that any information obtained with a StingRay falls under the Stored Communication Act and the Pen Register statute.

DEA later petitioned Judge Owsley to issue an order allowing the agent to track a known drug dealer with the StingRay. DEA emphasized to Owsley how urgently they needed approval because the dealer had repeatedly changed cell phones while they spied on him. Owsley flatly denied the request, indicating the StingRay was not covered under federal statute and that DEA and prosecutors had failed to disclose what they expected to obtain through the use of the stored data inside the drug dealer's phone, protected by the Fourth Amendment.

"There was no affidavit attached to demonstrate probable cause as required by law under rule 41 of federal criminal procedures," Owsley pointed out. The swiping of data off wireless phones is "cell tower dumps on steroids," Owsley concluded.

But judges in other districts have ruled favorably for the government. A federal magistrate judge in Houston approved DEA request for cell tower data without probable cause. More recently, New York Southern District Federal Magistrate Judge Gabriel Gorenstein approved warrantless cell-site data.

"The government did not install the tracking device -- and the cell user chose to carry the phone that permitted transmission of its information to a carrier," Gorenstein held in that opinion. "Therefore no warrant is needed."

In a related case, US District Court Judge Liam O'Grady of the Northern District of Virginia ruled that the government could obtain data from Twitter accounts of three Wikileakers without a warrant. Because they had turned over their IP addresses when they opened their Twitter accounts, they had no expectation of privacy, he ruled.

"Petitioners knew or should have known that their IP information was subject to examination by Twitter, so they had a lessened expectation of privacy in that information, particularly in light of their apparent consent to the Twitter terms of service and privacy policy," Judge O'Grady wrote.

A federal judge in Arizona is now set to render a decision in the nation's first StingRay case. After a hearing last week, the court in US v. Rigmaiden is expected to issue a ruling that could set privacy limits on how law enforcement uses the new technology. Just as the issue of GPS tracking technology eventually ended up before the Supreme Court, this latest iteration of the ongoing balancing act between enabling law enforcement to do its job and protecting the privacy and Fourth Amendment rights of citizens could well be headed there, too.

Permission to Reprint: This article is licensed under a modified Creative Commons Attribution license.
Looking for the easiest way to join the anti-drug war movement? You've found it!

Prohibition a Tool for Ending Privacy and Freedom

If a writer were to do a sci-fi themed script focused on ending anonymity and privacy in some civilization of the present, what better way than that of creating a specious social crisis that inherently requires the end of privacy and freedom to achieve an illusion of victory over a non-existent problem? 

sting llike a bee

   We all knew years ago off the likelihood for this to happen...1984 was already real....yet it was denied or  irrelevant to daily life....besides   what were we  to do...??

I believe the 99% will prevail  but we must muster the ethics and morality, courage and determination to succeed     thanks for this great article...stay strong   peace

Mcafe.com activate

McAfee antivirus is a full threat protection based antivirus program that you can install and activate at Mcafe . You cannot deny that in the present time, antivirus is the necessity of each system due to multiple threats, malware, and viruses. Mcafe.com/activate

Microsoft365.com/setup allows

Microsoft365.com/setup allows you to download and activate the Microsoft Office setup. Microsoft 365 plans for personal and home provides robust Office desktop apps including Word, PowerPoint, Excel, Outlook, and OneNote.Microsoft 365 subscribers can always install the latest version of MS Office and get frequent software updates. Microsoft365.com/setup & Skype Login

Activate Philo on Roku

If you are interested to activate and watch Philo channel on Roku, here we explain the channel activation steps. Device selection is the first step to begin the activation. Then execute the device setup. After linking your device to the Roku account, you can access the channel store to add Philo. Launch the channel app, sign in and proceed with the settings to collect the Philo channel activation code. Enter the code by visiting the page, philo.com/roku to complete the channel activation. To get help and support to activate the Philo channel, please contact our customer support right away 

Activate set up

It includes products available to download at microsoft like word, excel, PowerPoint, Outlook, SharePoint, OneDrive, cloud, and more for different uses. Microsoft365.com/setup | Microsoft365.con/setup | Microsoft 365/setup

 Norton setup has been providing the best security to various devices and security software keeps the system secure from multiple online and offline threats. Norton.com/setup


HP printers are the most common name used worldwide, and its extensively delivering a productive and user-friendly experience to its users. 123.hp.com/laserjet

Setup Activate

You can download a user-friendly interface to connect your newly purchased Ij printer with a device. canon.com/ijsetup. If you are completely new to Amazon Prime or Amazon TV, then you have landed at the right place.  www.amazon.com/code , amazon.com/codewww.amazon.com/code , amazon.com/code

bitdefender central

Bitdefender is the tool to provide you best security from multiple cyberattacks. It offers protection for multiple devices under one subscription, which can be managed by a single device. Bitdefender Central

Welcome to the HP site. Download the software SW from hp set

Welcome to the HP site. Download the software SW from hp setup and set up your printer. Then, Get started to installed hp setup and get able to connect the printer to the network through a USB cable or use a wireless HP printer. 123.hp.com/setup  , Reinstall Desktop Gold , http://ij.start.canon , https://ij.start.canon

Learning Management System

A learning management system, developed with a mobile first approach - PlayAblo is your all-inclusive app-based & tech-driven LMS. Corporate LearningLearning Management SystemCorporate Training PlatformOnline Learning Management System


Norton is already on the list of best antivirus security that helps you manage your digital life anywhere norton.com/setup , norton.con/setup .Go for multiple actions including lasejet installation, registration, and wireless connect, cartridge installation or more. 123.hp.com/laserjet123.hp.com/laserjet , camps.intuit.comcamps.intuit.com .


Once you connect your Canon ij printer to a wireless network, then check whether your printer is added to the operating system ij.start.canon .

Activate Webroot keycode

Activate Webroot keycode  - With the increasing use of the internet everywhere, the utilization of antivirus software is no longer an option. Operating the internet without antivirus software is a sure way to get your PC infected.

Get Started What is

Get Started What is Bitdefender Central Bitdefender is the tool to provide you best security from multiple cyberattacks. Bitdefender Central is available for Windows, Mac, and Android & iOS devices, which offer software and mobile application to secure the devices.

Ij.start.cannon , Download Webroot With Key Code , Install W

Canon printer drivers and software are essential to install and set up your Cannon device. Ij.start.cannon is the solution for easy Canon printer drivers download. Ij.start.cannon , Download Webroot With Key Code to secure your device. Hence, purchase the product key and Install Webroot With Key Code on your device.

Buy Monetized TikTok Account

Since TikTok has tightened its requirements for the monetization programs in this platform. Your account needs to meet the strict new guidelines to have enough 10,000 TikTok Followers and 10,000 Views in the last 30 days. Yes, it challenges new TikTokers to reach it within a short time for many reasons because building an account always needs investment in time and money. And even if your account is eligible for monetization, the review and approval process may still risk because TikTok depends on many factors and mostly the videos’ content. However, buying a Monetized TikTok Account will give you more time to focus on creating great videos instead of wasting time on unnecessary steps. tiktok account for sale, buying tiktok accountsbest place to buy youtube channel, youtube monetized channel for salebuy 4000 hours of watch time, buy youtube watch timeinstream ads facebook, facebook instream ads

office.com/setup home & student 2019

Microsoft office.com/setup home & student 2019 then you're at the perfect location. This report comprises the step-by-step and comprehensive process for the installation of offices on your own windows apparatus.

San Francisco 49ers Jacket

I am amazed by the way you have explained things in this article.San Francisco 49ers Jacket

Router Login Is not working

For Netgear Router Login, you can access the routerlogin.net web address. But if you are facing some technical issues while accessing the web address then you can also use IP address to access the router login page. Still, if you need any help, feel free to contact our certified technicians.

overnight camel trek merzouga

the best


Thanks for Sharing information this information is very helpful and useful for me and other persons. I like your work. when you feel free to check my webpage.

transvestite dating site

TransSingle.com is a premium transvestite dating site you can access for free. Get the best way to find your new friend and even your love. With few clicks which you don’t need to pay, online dating will no longer drain your budget.



ice cream box

We at DnPackaging, we manufacture ice cream box using the best material to consequently bring the whole business to higher pedestals of success. If you can’t afford expensive ice cream boxes, we will help you build your business by offering these boxes at wholesale rate or you can buy them from us in bulk from us.

When you set up your WiFi

When you set up your WiFi range extender using mywifiext.net web address. Then you can see a new network name which is Netgear_ext (SSID). But if the setup wizard does not open after connecting to Netgear_ext network, then feel free to contact our technicians and resolve the Netgear Extender setup issues within a matter of minutes. 

You can increase your Wi-Fi

You can increase your Wi-Fi Range in your home by installing Netgear WiFi Range Extender. But when you type mywifiext.net in your browser tab and it shows an error message that you are unable to connect to this website. Then to get the technical help related to the install process or to get www.mywifiext.net setup success, contact our technical support team.

business opportunities in canada

In any case, in a universe of business, arrangement is as yet basic. At whatever point you are purchasing or selling a business, viable arrangement methods are fundamental for closing the arrangement. While purchasers look for business opportunities in canada low-estimated organizations at ideal terms, entrepreneurs are keen on selling at the most exorbitant cost conceivable. This is the reason successful arrangement ought to be a need for the two players.

unique cigar lighters

You just lit your cigar with that unique cigar lighters of yours, and now it seems you have some work that came up wherein throwing your cigar is not the right call, it's like your child, especially the premium ones. You don't want to throw a cigar that's worth a bulk of quality tobacco. Few smokers may think it's not worth an effort to save a cigar that has reached the band.

laptop on rent near me

Before covid, short-term rentals were better and made more sense as you could switch from places to places, but now you need to stick with one and purchasing anything way expensive doesn't make any sense because even the bad days come to an end and, so will covid. After that, you will be able to travel and won't require to keep the laptop on rent near me that you took for long. That's when short-term is beneficial. You can return it because the theatres will be open.

If you are not able to access

If you are not able to access the extender.linksys.com web address or the Linksys Router Login or Linksys Extender Setup page is not working, then feel free to contact our technical support team.

San Francisco 49ers Jacket Gold

The writing style which you have used in this article is very good and it made the article of better quality. San Francisco 49ers Jacket Gold

New extender setup is the Netgear extender default IP used to log in to your extender and set it up. To log in to your Netgear WiFi range extender, you just need to access a web browser and enter this IP in the URL bar. Doing so will take you to the default Netgear extender login web page. From here, you can install and configure your Netgear WiFi range extender in a hassle-free manner.  mywifiext  mywifiext.net      www.mywifiext.net    

office setup home and student 2019

As we compare this toolkit with the others, the performance and work experience is great with the office package. And compared to the price ranges of the toolkits like this office makes us happy in this also. So no need to think more about it. Let's purchase this and install office setup home and student 2019

on our Pc to increase the official performance.

Post new comment

The content of this field is kept private and will not be shown publicly.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd> <i> <blockquote> <p> <address> <pre> <h1> <h2> <h3> <h4> <h5> <h6> <br> <b>

More information about formatting options

This question is for testing whether you are a human visitor and to prevent automated spam submissions.

Drug War Issues

Criminal JusticeAsset Forfeiture, Collateral Sanctions (College Aid, Drug Taxes, Housing, Welfare), Court Rulings, Drug Courts, Due Process, Felony Disenfranchisement, Incarceration, Policing (2011 Drug War Killings, 2012 Drug War Killings, 2013 Drug War Killings, 2014 Drug War Killings, 2015 Drug War Killings, 2016 Drug War Killings, 2017 Drug War Killings, Arrests, Eradication, Informants, Interdiction, Lowest Priority Policies, Police Corruption, Police Raids, Profiling, Search and Seizure, SWAT/Paramilitarization, Task Forces, Undercover Work), Probation or Parole, Prosecution, Reentry/Rehabilitation, Sentencing (Alternatives to Incarceration, Clemency and Pardon, Crack/Powder Cocaine Disparity, Death Penalty, Decriminalization, Defelonization, Drug Free Zones, Mandatory Minimums, Rockefeller Drug Laws, Sentencing Guidelines)CultureArt, Celebrities, Counter-Culture, Music, Poetry/Literature, Television, TheaterDrug UseParaphernalia, Vaping, ViolenceIntersecting IssuesCollateral Sanctions (College Aid, Drug Taxes, Housing, Welfare), Violence, Border, Budgets/Taxes/Economics, Business, Civil Rights, Driving, Economics, Education (College Aid), Employment, Environment, Families, Free Speech, Gun Policy, Human Rights, Immigration, Militarization, Money Laundering, Pregnancy, Privacy (Search and Seizure, Drug Testing), Race, Religion, Science, Sports, Women's IssuesMarijuana PolicyGateway Theory, Hemp, Marijuana -- Personal Use, Marijuana Industry, Medical MarijuanaMedicineMedical Marijuana, Science of Drugs, Under-treatment of PainPublic HealthAddiction, Addiction Treatment (Science of Drugs), Drug Education, Drug Prevention, Drug-Related AIDS/HIV or Hepatitis C, Harm Reduction (Methadone & Other Opiate Maintenance, Needle Exchange, Overdose Prevention, Pill Testing, Safer Injection Sites)Source and Transit CountriesAndean Drug War, Coca, Hashish, Mexican Drug War, Opium ProductionSpecific DrugsAlcohol, Ayahuasca, Cocaine (Crack Cocaine), Ecstasy, Heroin, Ibogaine, ketamine, Khat, Kratom, Marijuana (Gateway Theory, Marijuana -- Personal Use, Medical Marijuana, Hashish), Methamphetamine, New Synthetic Drugs (Synthetic Cannabinoids, Synthetic Stimulants), Nicotine, Prescription Opiates (Fentanyl, Oxycontin), Psilocybin / Magic Mushrooms, Psychedelics (LSD, Mescaline, Peyote, Salvia Divinorum)YouthGrade School, Post-Secondary School, Raves, Secondary School