NY Court Orders Sheriff To Reveal Details On Stingray Mobile Phone Surveillance
from the finally,-a-victory dept
For quite some time now, we've been covering how various law enforcement agencies have been using "Stingray" (or similar) cell tower spoofing devices to track the public. Beyond the questionable Constitutionality of such mass surveillance techniques, what's been really quite incredible is the level of secrecy surrounding such devices. We've written about how the US Marshals have "intervened" in various court cases to hide info about the use of Stingrays -- and even telling local law enforcement to lie about their use of the devices. We've written about law enforcement officials claiming "terrorism" as the reason for needing Stingrays, but then using them for everyday law enforcement. We've written about the company that makes Stingrays, Harris Corp., forcing police to sign non-disclosure agreements barring them from revealing any info about their use. It also appears that Harris Corp. misled the FCC to receive approval for its mobile tower spoofing capabilities. Some police departments have even withdrawn evidence rather than talk about their use of Stingrays.Thankfully, there's been growing concern about these devices. Congress has been investigating and now it appears at least some courts are getting skeptical about the use of Stingrays. The New York Civil Liberties Union (NYCLU) has highlighted that a judge in one of its cases has ordered the Erie County Sheriff's Office to reveal information to the public about its Stingray operations. The full ruling [pdf] is worth reading. While denying the NYCLU's claim that the Sheriff's Office didn't conduct a thorough search as required, the judge is not at all impressed by the redactions in the documents that were released:
The purchase orders should have been disclosed in their entirety, without redaction of the various words, phrases, and figures thus far withheld. The purchase orders (and more particularly the redacted words, phrases, and prices), were not "compiled for law enforcement purposes" in the sense meant by the statute but, even if they were, their disclosure would not: "interfere with law enforcement investigations or judicial proceedings"; "identify a confidential source or disclose confidential information relating to a criminal investigation," meaning a particular ongoing one; or "reveal [non-'routine'] criminal investigative techniques or procedures, meaning techniques a knowledge of which would permit a miscreant to evade detection, frustrate a pending or threatened investigation, or construct a defense to impede a prosecution.... Further, the purchase orders (or, more precisely, the information redacted therefrom), although clearly constituting inter-agency materials" (the other agency involved was Erie County and its Office of the Comptroller), amount entirely to "instructions to staff that affect the public".... Indeed, the instructions set forth in the purchase orders—'in essence, "Pay this bill of this vendor for this item purchased by the Sheriff's Office at this price"—was and is of quintessentially compelling interest to and of undeniable impact upon the taxpaying public.Got that? Basically the court rejects the Sheriff's Office's contention that disclosing this information was somehow "exporting munitions" to "foreign persons."
Finally, the Court finds that the purchase orders, and particularly the matters redacted therefrom, are not "specifically exempted from disclosure by state or federal statute" .... The Court rejects respondent's arguments that the disclosure sought here would, if made, violate a particular federal statute, regulatory scheme, and executive order forbidding (and indeed criminalizing) the export of certain sensitive technology without government license or the illicit revelation of sensitive information about such sensitive technology to foreign nationals. The Court instead is convinced by petitioner's argument that the disclosure of public records pursuant to New York's Freedom of Information Law and the within judicial directive -- even records concerning respondent's ownership and use of a cell site simulator device -- does not amount to the actual export of such arms, munitions, or defense technology. Further, the Court is satisfied by showing on this record that petitioner, a New York not-for-profit corporation, is not a "foreign person," meaning that the disclosures sought by it pursuant to FOIL would not in fact run afoul of related federal legal restrictions on the revelation of sensitive technical data about export-restricted arms or technology.
Oh, as for the non-disclosure agreement with Harris Corp.? The judge notes that a non-disclosure agreement is not a federal regulation:
At the outset, the Court notes its agreement with petitioner's observation that the FBI-drafted non-disclosure agreement is not itself a federal statute specifically exempting anything from disclosure....In fact, later in the order, the court says that the non-disclosure agreement itself should be disclosed:
Likewise, the Court concludes that this public record ought to have been disclosed in its entirety. As indicated, the agreement was entered into between the FBI and respondent as an apparent pre-condition of respondent's being allowed to acquire and use the cell site simulator. The gist of the letter is not a recitation of the technological capabilities of the device or even the "hows" and "whens" or the advantages of its use for law enforcement purposes, but rather simply the need for the Sheriff's Office to avoid disclosing the existence, the technological capabilities, or any use of the device to anyone, lest "individuals who are the subject of investigation ... employ countermeasures to avoid detection," thereby endangering the lives and safety of law enforcement officers and others and compromising criminal law enforcement efforts as well as national security. The Court has no difficulty in concluding that the agreement (or, more precisely, each redacted-at-length passage of it) was not "compiled for law enforcement purposes" in the sense meant by the statute.... Again, even if it was, the Court would conclude that the disclosure of the non-disclosure agreement would not thwart or prejudice any particular ongoing law enforcement investigation or pending prosecution.... Nor, the Court concludes, would the disclosure of the non-disclosure agreement "identify a confidential source or disclose confidential information relating to a criminal investigation," again meaning a specific ongoing one, or "reveal" other than "routine" "criminal investigative techniques or procedures"....There's a lot more, including other documents, and all of that leads the judge to also grant attorney's fees to the NYCLU. It will be interesting to see if the Sherriff's Office challenges this, but it's a pretty complete win for transparency in an area that law enforcement has been trying to keep totally secret for quite some time now.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: erie county sherriff's office, foia, foil, imsi catcher, new york, stingray, surveillance
Companies: aclu, nyclu
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
There is no way, after all the shady tricks they've used to keep the details of these things secret, and any information relating to them, that they'll allow a judge to get away with forcing the details public. I fully expect the documents demanded to be seized by another government agency, who will undoubtedly spin some ridiculous story about how they absolutely cannot be released.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
NDA'S
sorry officer there is an NDA in place I cannot supply that info
[ link to this | view in chronology ]
Re: NDA'S
sorry officer there is an NDA in place I cannot supply that info
Oh that only works for the government, you're not allowed to claim an NDA exception.
[ link to this | view in chronology ]
This will be appealed.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
What does the public need to know?
• If you carry a cellphone then the government tracks your location.
• If you talk on a cellphone then the goverment listens in on your calls.
What's the big mystery here? What else do you need to know?
[ link to this | view in chronology ]
Re: What does the public need to know?
/Paranoid theory
[ link to this | view in chronology ]
Re: Re: What does the public need to know?
• The on-off switch on your phone does not mechanically disconnect the battery from the circuit.
• A software implant capable of turning on the microphone remotely is probably capable of turning on the camera remotely too.
Of course, pictures from the inside of your pocket may be less exciting than sounds captured there.
[ link to this | view in chronology ]
Re: Re: What does the public need to know?
Yes. Well, Professor Matt Blaze is a well-known paranoid. (“How Law Enforcement Tracks Cellular Phones”, Dec 13, 2013.)
Just because the NSA utilized a capability during the counter-insurgencies in Iraq and Afghanistan does not necessarily mean that some podunk county sheriff's department gets to play with all the cool toys.
[ link to this | view in chronology ]
Re: What does the public need to know?
That the government will quickly return to respecting the Constitution and not track or listen.
[ link to this | view in chronology ]
Re: What does the public need to know?
Or perhaps you would like to submit that we are kept man that can be tapped and tracked at will by a government that has twisted your best interests to serve its own?
Our new Technological Tools of Tyranny are not under the proper lock and key. Trust no one.
[ link to this | view in chronology ]
Re: What does the public need to know?
Lots. For starters, we need to know how often these systems are deployed, what the rules of deployment are, how many nontarget phones have been affected, what cases are using Stingray intercept evidence, and so forth.
[ link to this | view in chronology ]
I do wonder what sort of "unofficial" police retaliation he will experience for not letting the officers have their way.
[ link to this | view in chronology ]
Get the FCC involved
[ link to this | view in chronology ]
American law enforcement is transforming into the new Stasi.
[ link to this | view in chronology ]
Re: American law enforcement is transforming into the new Stasi.
[ link to this | view in chronology ]
As much as I like seeing a judge do the right thing, most days I can't believe that it will change anything.
[ link to this | view in chronology ]
Re:
18th Century ideas just as valid in the 21st Century as they were when the Founding Fathers conceived them during a period of Clairvoyance. Perhaps MORE valid today.
[ link to this | view in chronology ]
http://www.youtube.com/watch?v=wuO7yWkscP4
it gets more interesting around 28:15, then 38:00
if you can follow it, things will be much clearer in regards to what's likely going on- and why they're buying so many stingrays.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
With these two pieces of the puzzle (SIM keys and StingRays) law enforcement is able to issue remote commands to anyone's smartphone. The phone will accept the commands because they'll think the commands are coming from the mobile wireless network carriers (AT&T and Verizon) due to the private SIM card keys matching.
The public also needs to know about the airplanes and unmanned drones flying around over people's houses. Due to these aircraft flying at a higher altitudes than cellular ground towers, this gives drones a much larger radio signal range. Which in turn means they're more effective at mass cellphone surveillance and malware insertion than ground based StingRay devices.
There's still plenty for the public to learn and be appalled about. If there's one thing the public hates, it's government messing with their cellphones. The government knows this, hence all the secrecy.
[ link to this | view in chronology ]
One Judge to Rule them all. One Judge to Bind them.
In fact, this judge must be a pillar of decency, if he has not already received at least a preliminary "we are watching" shot over the bow from the spook agencies in charge of judicial conformity.
Could we have actually found an honest, law abiding judge who does not snort cocaine on weekends and rent under age hookers on a regular basis??
Will wonders never cease??
---
[ link to this | view in chronology ]
Encryption keys, passwords, apn's, call/text/data logs, emails, file index's, contacts, gps logs, thumbnails. -all small files kept in known memory locations that can be accessed and dumped through the baseband.
Now does it make sense why they'd pay to fly these things around? ...a very very expensive thing to do; surely not justified by collecting esn's, imsi's, and intercepting random calls- all of which could be done from the phone company. The reasonable assumption, given known facts, is that stingrays are data vacuums- collecting intell to seed parallel constructed cases.
To be clear- I'm all for catching criminals- but this is an abortion of due process and the fundamental values of a just society.
[ link to this | view in chronology ]
Re:
Wait till you see what they get caught doing next year.
After all, since there are no consequences for any of these actions against the US public, there is absolutely no reason whatsoever to curtail, or slow down the process of blanket surveillance of citizens, or to control what is being done with the information thus gathered.
They're not all that worried about getting caught any more either.
While the Presidente' does keep saying publically that he is against it, he does absolutely nothing to stop it and everything he does do, tells the forces of lawless order that he approves of their methods and bids them continue.
Because the technology allows it, the USA will become far more authoritarian and evil than any of the past evil empire regimes. The members of Regime USA have already become drunk with power due to their immunity from prosecution, and the truckloads of cash they're siphoning out of the tax-payer's pocket, and they are eagerly seeking ways and means to escalate the process for even more fun and profit.
And why not?
After all, the US Public is once again, footing the entire bill.
---
[ link to this | view in chronology ]