So-called “Stingrays” or cell-site simulators are examples of relatively new surveillance techniques hovering at the bleeding edge of both cell-phone technology and Fourth Amendment jurisprudence. Because their use has been largely shrouded in secrecy and few clear precedents exist to model limits on this tech, the handful of law-enforcement agencies using it have until now operated in virtually a regulation-free zone.
How Cell-Site Simulators Work
Cell-site simulators work by tricking your cell phone into believing it’s attaching to a legitimate cell-phone tower, which it “pings” periodically to make sure the phone is ready to make a call. This means that, when targeted users (or others in their vicinity) make a phone call, it’s routed through the cell-site simulator instead of the nearest tower. Representations by Houston PD at Monday’s hearing about the limited nature of the technology understated its capacity.
Cell-site simulators hijack and divert cell-phone signals from their commercial carrier’s network, making it more similar to a wiretap than a “pen register.” Some models of cell-site simulators allow full-blown wiretapping; others provide access to metadata from calls and callers; others may only provide information on signal strength and direction, allowing investigators to triangulate location with just a few measurements. It all depends on how much functionality an agency chose to pay for; the device is capturing the entire signal and can let investigators access any or all of it.
Movement toward ‘stingray’ warrant requirement
The US Supreme Court has not yet ruled on so-called “stingrays,” but several states already require warrants for cell-site simulator use with no ill effects. (Virginia, Washington, Utah, Minnesota, and California.)
On December 19, 2016, the U.S. House Committee on Oversight and Government Reform issued a comprehensive, bipartisan report on law-enforcement use of cell-site simulators and recommended legislation that would require “probable cause based warrants” to “ensure that the use of cell-site simulators and other similar tools does not infringe on the rights guaranteed in the Constitution.”
The US Department of Homeland Security established a policy of seeking a warrant for use of cell-site simulator technology with limited exceptions for exigent circumstances.
Finally, civil libertarians have persuasively argued that, when a cell phone inside someone’s home is targeted with signal interception via a cell-site-simulator device, it per se violates the Fourth Amendment right to security from unreasonable searches of one’s “houses, papers and effects.” (Traditionally, Fourth-Amendment protections inside the home have been much stronger than elsewhere.)
Secrecy breeds mistrust
At Monday’s hearing, police expressed fears that innocent people might be hurt if information from search warrant affidavits about how and when police used the technology ever surfaced. But search-warrant affidavits have been public records since the dawn of the Republic. The more significant concern is that law enforcement will use the technology unaccountably and secrecy will protect them.
Not only does the public deserve to know when the government is using invasive surveillance technology, undue secrecy creates systemic problems. In Houston, police have even kept prosecutors in the dark when stingray tech was used.
Texas legislators should extend the same warrant requirement mandated by the Supreme Court in US v. Carpenter to cell-site simulator devices. This shadowy practice has flourished for too long on the edges of modern technology and privacy law. HB 352 is Texas’ opportunity to begin to restrain and regulate it.
See prior, related Grits coverage.
6 comments:
You are missing the boat on the stingray issue. The reason that the technology is shrouded in secrecy is that the proprietary technology by the Harris Corporation is protected by non-disclosure agreements by law enforcement. They are forbidden to talk about certain capabilities or whether they were ever used. The Intercept published their manuals provided by a whistleblower a few years ago and the cat is creeping out of the bag. Want more? check this out: https://theintercept.com/surveillance-catalogue/stingray-iii/
So maybe we approach it from a different angle? Legislation that prohibits law enforcement from using any service, tool, or vendor, which is protected by a nondisclosure or other confidentiality agreement?
Why shouldn't we have the right to know what tools the police are using, when and how? An NDA in this case protects only the vendor and frankly that corporation should never have more protections from the police than the people they are protecting.
@4:21, I have written about the nondisclosure issue here, so not missing the boat. But the bill addresses (and overrides) the NDAs, so they're not really the central issue. We just need to pass the bill.
Grits, good follow-up. Corporate NDAs NEVER trump Constitutional rights, Anonymous No. 1.
==
And, in my biz .... Drew Springer has proposed a bill to tax newspapers. Likely not to go anywhere, but ... when the Lege finds a 2.5 percent property cap and other things do NOT square with more money for education in general and teachers in particular,. who knows where it will scrounge for other pocket change.
"Kecanduan Main Judi Poker Online Itu Berbahaya !!"
Ketagihan akan sesuatu hal secara berlebih itu tergolong berbahaya loh. Termasuk juga dalam (Baca Selengkapnya...)
I like Teraveloka's video.
Post a Comment