Warrantless Collection Of Cellphone Data By Law Enforcement On The Rise, As Is The Use Of Stingray Tower Spoofers
from the millions-of-'incidental'-records dept
As we covered last week, cellphone tower "dumps" are increasingly being used by law enforcement to track criminals. These "dumps" provide LEOs with the information gathered every time someone's cell phone contacts the tower, whether it's to make a call, send a text or email or access the web.This vast amount of data being sought is obtained with a court order, which has a much lower bar than a search warrant, which requires probable cause. The ease in which this data is obtained is one concern. The other concern is that many law enforcement agencies have little to nothing in the way of guidelines for dealing with this collected data -- often allowing it to be stored for years, completely unmiminized. Agencies also are under no obligation to inform citizens that their data has been collected.
USA Today has compiled some more information about how these tower dumps are used, as well as on how common they are becoming. As was noted in our original article, requests for these data dumps has jumped over 75% over the last five years (according to Verizon) and more than 1.3 million requests were made in 2011 alone (Verizon and AT&T combined).
Here's how one particular case utilized data dumps to search for a suspect.
In October 2012, in Colorado, a 10-year-old girl vanished while she walked to school. Volunteers scoured Westminster looking for Jessica Ridgeway.To sum up, tons of data was collected, resulting in a broad sampling of 500 people's DNA, and yet it was an old-fashioned tip that resulted in the arrest and indictment of the suspect. What should be considered a troubling incursion on our civil liberties is viewed by law enforcement as just another tool in the toolset, albeit one that goes long on data and comes up short on results.
Local police took a clandestine tack. They got a court order for data about every cellphone that connected to five providers' towers on the girl's route. Later, they asked for 15 more cellphone site data dumps...
The tower dump data helped police choose about 500 people who were asked to submit DNA samples. The broad cell-data sweep and DNA samples didn't solve the crime, though the information aided in the prosecution. A 17-year-old man's mother tipped off the cops, and the man confessed to kidnapping and dismembering the girl, hiding some of her remains in a crawl space in his mother's house. He pleaded guilty and last month was sentenced to more than 100 years in prison.
From this lowered bar (court orders), police use previously obtained cellphone tower dumps as justification for even more tower dumps, along with any other information that they can gather without having to obtain a warrant: home addresses, call records, locations and the content of texts. This data is combined with the info gathered by other surveillance technology, including plate readers and traffic cams, to generate very precise recreations of a person's actions and movements -- all without a warrant or any concern for the amount of unrelated data gathered.
The intrusion goes even deeper than bulk data dumps, though.
Local and state police, from Florida to Alaska, are buying Stingrays with federal grants aimed at protecting cities from terror attacks, but using them for far broader police work…Stingray devices give law enforcement agencies roaming cell tower impersonators to grab even more data with, bypassing both search warrants and the wireless providers themselves.
Typically used to hunt a single phone's location, the system intercepts data from all phones within a mile, or farther, depending on terrain and antennas.
Law enforcement agencies don't want to talk about these devices, something the manufacturer has an active hand in.
Initially developed for military and spy agencies, the Stingrays remain a guarded secret by law enforcement and the manufacturer, Harris Corp. of Melbourne, Fla. The company would not answer questions about the systems, referring reporters to police agencies. Most police aren't talking, either, partly because Harris requires buyers to sign a non-disclosure agreement.Beyond not wanting to talk about the devices, agencies are also reluctant to discuss what guidelines (if any) they have in place to help safeguard civil liberties. As it stands now, most of these devices are deployed covertly, with citizens having no idea their local law enforcement even possesses this capability.
Documents obtained by Indianapolis Star indicate the Indiana state police own a Stingray device valued at nearly $375,000. Unsurprisingly, the state police have no interest in discussing this purchase.
[O]fficials at Indiana’s largest police agency aren’t saying what they do with the technology; they’re mum on whose data they’ve collected so far; and they’re not talking about what steps they take to safeguard the data.There it is again -- concerns about intrusive technology and untargeted data hauls being waved away by throwing out the word "terrorism" and claiming that revealing any information would "endanger public safety." It's a cop-out -- one that dodges every potential issue by appealing to fear.
Citing concerns that releasing any information would endanger public safety by hindering the agency’s ability to fight crime and combat terrorism, they won’t even say whether they ask a judge for a search warrant before they turn the equipment on.
The reality is that very few people know how these are being deployed. The power of the device lends itself to abuse, or at the very least, overuse. As the article points out, police in South Carolina used tower dumps to investigate items being stolen from vehicles and in Miami, the police department deployed a Stingray to spy on protesters at a world trade conference.
According to the documents, 25 police departments around the country have contracts with Harris Corp. These devices may be expensive, but utilizing the word "terrorism" when applying for a grant from the DHS generally makes the tech more affordable. These devices also appear to be loaned out freely to other agencies, meaning the actual count of law enforcement agencies with access to this technology is considerably higher than the 25 listed.
This unofficial sharing program vastly increases the amount of data gathered -- as well as the potential for the civil liberties violations. While one agency may have guidelines affecting use and destruction of gathered data, the agency borrowing it may have nothing in place at all. And, considering the fact that no agency wants to talk about their usage of Stingrays, it's safe to assume whatever safeguards are in place are lax and full of loopholes.
Outdated laws have combined with expansive readings of the Third Party Doctrine to give law enforcement agencies nearly unlimited access to vast amounts of data. The rise of cellphones has been fortuitous for agencies with unquenchable thirsts for data, providing millions of metadata points for millions of users. And, like our intelligence agencies, these law enforcement agencies are operating largely under the cover of "darkness," actively avoiding (or directly thwarting) any attempts at oversight.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: abuse, cell tower data, law enforcement, mobile phones, privacy, stingray
Reader Comments
Subscribe: RSS
View by: Time | Thread
Third Party Doctrine...
Unless someone is listening in on your phone call and can hear both sides of the conversation, that 3rd Party Doctrine should NOT FUCKING APPLY!
[ link to this | view in chronology ]
That's what I read in one of the comments in an article from Mr Falkvinge. That's one typical reaction from those who support this type of abuse. Fact free, fear (or interest) riddled.
And yet there is no evidence that these violations prevent such activities. Specially terrorism, the much touted bogey man that justifies everything. The stingrays, the tower dumps.. They are nothing more than another chapter in this twisted book that keeps developing thanks to a dangerous mixture between gullible people and "greater" interests.
It's way past time the Americans took action. And yet there they are in their lethargic slumber. Actually most of the world is still sleeping while having their rights horribly violated.
[ link to this | view in chronology ]
Re:
http://www.washingtonsblog.com/2013/08/president-obama-the-odds-of-dying-in-a-terrorist-at tack-are-a-lot-lower-than-they-are-of-dying-in-a-car-accident.html
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
One of the mysteries and troubles with this tech is that invisible nature, making it impossible to tell that the police were digitally riffling through your pockets and flagging you into a database to draw out further data at their whim.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
Still, first step is locating the problem, so there would still be worth in such a database of towers.
[ link to this | view in chronology ]
Re: Re:
Then, there are LEGIT temporary cells, called COWs, or Cells on Wheels, which the carriers move around for special events, etc. Stingray's would look a lot like these.
It will be a non-trivial matter to identify the Stingrays among all that heterogeneity. Or, to put it in radio terms, you're gonna have a hard time separating the signal from the noise.
And even then, what if you figure out that the new tower you suspected is not a Stingray...well, you're still susceptible to a tower dump. So, you won't be able to conclude that you are being "bugged", nor that you are not being bugged.
[ link to this | view in chronology ]
Re: Re:
- phones usually use a combo of nearest tower, nearest wifi, and GPS. Occasionally, they use TDOA (time difference of arrival) which measures signal delay between three or more towers to estimate location. This is not "angulation". It could be called trilateration, but really it's TDOA.
- the apps do not triangulate towers. They use a database of known tower locations. AFAIK, apps do not have the authority on the phone to use the phone's radio baseband to suss out the nearest towers (although the phone does this). This tech may have evolved, so if you could cite an example of the app you're talking about, I'd love to examine it.
[ link to this | view in chronology ]
Re: Re: Re:
Funny, the app that I use does both. I know that it located the towers because when I set up my own booster (which mimics being a tower), the app spotted it and correctly located it.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
You don't really expect an answer, do you?
[ link to this | view in chronology ]
Re:
http://wireless.fcc.gov/geographic/index.htm?job=home
If you know the location of the real towers, should be easy to pick out the fake stingray towers. Seems like someone could easily make an app to alert you to the presence of a stingray.
But only terrorists, paedophiles, drug dealers and criminals would think of creating such and app......
[ link to this | view in chronology ]
I wonder...
I would absolutely refuse to provide such a DNA sample if I were asked. I wonder what the retaliation against me would be.
[ link to this | view in chronology ]
Re: I wonder...
The warrant will be granted due to your refusal to "volunteer" your DNA when asked, which obviously makes you a low down dirty rotten criminal up to no good, they just have to find (or create) the proof they need when ransacking your house.
But of course our wonderful law enforcement agents would never do anything like this... /s
[ link to this | view in chronology ]
Re: I wonder...
These criminals in power don't like to take no for an answer.
[ link to this | view in chronology ]
Re: Re: I wonder...
[ link to this | view in chronology ]
Think I'll just regress...
Or are they now opening our letters now too!?
[ link to this | view in chronology ]
Re: Think I'll just regress...
[ link to this | view in chronology ]
Re: Think I'll just regress...
http://news.yahoo.com/government-snooping-snail-mail-203300998.html
[ link to this | view in chronology ]
[ link to this | view in chronology ]
DNA of 500 people helps them how exactly?
If you have nothing to compare the DNA against in the crime, then you're just wasting your time. Or simply trying to create a database of DNA to solve other crimes you do have DNA evidence for. But really, gathering someone's DNA in an unrelated case when their DNA couldn't even help even if they were the criminal, that's just dumb and asking for an appeal if the DNA is ever used to file any charges.
[ link to this | view in chronology ]
Re: DNA of 500 people helps them how exactly?
This, x1000. It may be proactive because you know DNA evidence is forthcoming, but it still isn't right and is an absolute waste of everyone's time. It is amazing that anyone, with a straight face, would suggest this as an option. You are wasting the time of 500 people who pay your paycheck just so it will allow you to be a little quicker in matching the data after the fact, especially since it doesn't take very long to get the DNA evidence and compare it to the suspect you have a warrant for (since you have already been able to determine, through actual police work, and with the help of the citizenry, who the target is.) The case wasn't even cold yet.
[ link to this | view in chronology ]
Stingray
Basically it is used for two reasons. Either it can give you a list of all numbers that are currently pinging the device or you can give it a specific number and "locate" that number. Officers have stated that if they know a number to look for it is accurate enough to pinpoint you practically within 5 feet. They have used it to stand outside an apartment complex while looking for a felon and pinpoint exactly which apartment in the complex he was currently located in.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Indiana - terrorism hub
Thank goodness we have secret stuff that we don't know about protecting us from things that are really happening.
[ link to this | view in chronology ]
Because Crime...No Privacy
We're just collateral damage in the crossfire.
There will always be at least one crazy douche that commits a terrible crime, and so the system will always have their justification to erode our 4th rights. The cops say what the politicians say: never let a good crisis go to waste.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Look Phone Number - Find who own those phone numbers
[ link to this | view in chronology ]
[ link to this | view in chronology ]