Law enforcement usage of the illegal "Stingray" surveillance tool is increasing.

A few months ago, EFF warned of a secretive new surveillance tool being used by the FBI in cases around the country commonly referred to as a “Stingray.” Recently, more information on the device has come to light and it makes us even more concerned than before.
The device, which acts as a fake cell phone tower, essentially allows the government to electronically search large areas for a particular cell phone's signal—sucking down data on potentially thousands of innocent people along the way. At the same time, law enforcement has attempted use them while avoiding many of the traditional limitations set forth in the Constitution, like individualized warrants. This is why we called the tool "an unconstitutional, all-you-can-eat data buffet."
Recently, LA Weekly reported the Los Angeles Police Department (LAPD) got a Department of Homeland Security (DHS) grant in 2006 to buy a stingray. The original grant request said it would be used for "regional terrorism investigations." Instead LAPD has been using it for just about any investigation imaginable.
In just a four month period in 2012, according to documents obtained by the First Amendment Coalition, the LAPD has used the device at least 21 times in “far more routine” criminal investigations. The LA Weekly reported Stingrays “were tapped for more than 13 percent of the 155 ‘cellular phone investigation cases’ that Los Angeles police conducted between June and September last year.” These included burglary, drug and murder cases.
Of course, we’ve seen this pattern over and over and over. The government uses “terrorism” as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process.
Stingrays are particularly odious given they give police dangerous “general warrant” powers, which the founding fathers specifically drafted the Fourth Amendment to prevent. In pre-revolutionary America, British soldiers used “general warrants" as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched.
The Stingray is the digital equivalent of the pre-revolutionary British soldier. It allows police to point a cell phone signal into all the houses in a particular neighborhood, searching for one target while sucking up everyone else’s location along with it. With one search the police could potentially invade countless private residences at once.
In another recent development, the FBI handed over two documents—out of an estimated 25,000 they have on Stingrays—to EPIC as part of the privacy group’s Freedom of Information Act lawsuit to obtain more information about the use of mysterious devices. As Slate’s Ryan Gallagher reported:
Two heavily redacted sets of files released last month show internal Justice Department guidance that relates to the use of the cell tracking equipment, with repeated references to a crucial section of the Communications Act which outlines how “interference” with communication signals is prohibited.
It’s a small but significant detail. Why? Because it demonstrates that “there are clearly concerns, even within the agency, that the use of Stingray technology might be inconsistent with current regulations,” says EPIC attorney Alan Butler. “I don't know how the DOJ justifies the use of Stingrays given the limitations of the Communications Act prohibition.”
Several aspects about stingrays are important to understand from a privacy perspective.
First, they collect information about the devices and whereabouts of third parties, not just the targets of an investigation. As noted above, IMSI catchers mimic a wireless carrier’s network equipment; in doing so, they send and receive signals to and from all mobile devices in the vicinity on the same network.Second, the devices can pinpoint a target with extraordinary precision. Some have an accuracy of two meters. This means that individuals can be tracked even when they are inside their homes.Third, although the government says the device used in Rigmaiden’s case was not capable of capturing the content of communications, many IMSI catchers offered for sale by surveillance vendors offer this feature. IMSI catchers can thus be used for eavesdropping, not just location tracking. The documents also suggest that the FBI is loaning out the devices to local police.
On March 28th, the judge overseeing the Rigmaiden case, which we wrote about previously, will hold a hearing on whether evidence obtained using a stingray should be suppressed. It will be one of the first times a judge will rules on the constitutionality of these devices in federal court.
It’s time for local police and federal law enforcement agencies to come clean about the technology and how they are using it, before more ordinary citizens have their constitutional rights violated.
https://www.eff.org/deeplinks/2013/02/secretive-stingray-surveillance-tool-becomes-more-pervasive-questions-over-its
FBI files unlock history behind clandestine cellphone tracking tool:
Stingrays, are portable surveillance gadgets that can trick phones within a specific area into hopping onto a fake network. The feds call them “cell-site simulators” or “digital analyzers,” and they are sometimes also described as “IMSI catchers.” The FBI says it uses them to target criminals and help track the movements of suspects in real time, not to intercept communications. But because Stingrays by design collaterally gather data from innocent bystanders’ phones and can interrupt phone users’ service, critics say they may violate a federal communications law.
A fresh trove of FBI files on cell tracking, some marked “secret,” was published this week by the Electronic Privacy Information Center. They shed light on how, far from being a “new” tool used by the authorities to track down targets, Stingray-style technology has been in the hands of the feds since about 1995 (at least). During that time, local and state law enforcement agencies have also been able to borrow the spy equipment in “exceptional circumstances,” thanks to an order approved by former FBI Director Louis Freeh.
EPIC, a civil liberties group, obtained the documents through ongoing Freedom of Information Act litigation that it is pursuing in order to get the feds to hand over some 25,000 pages of documents that relate to Stingray tools, about 6,000 of which are classified. The FBI has been drip-releasing the documents monthly, and there have been a couple of interesting nuggets in the batches so far—like a disclosure that the FBI has a manual called “cell tracking for dummies” and details hinting that the feds are well aware the use of Stingrays is in shaky legal territory.
The latest release, amounting to some 300 selectively redacted pages, not only suggests that sophisticated cellphone spy gear has been widely deployed since the mid-‘90s. It reveals that the FBI conducted training sessions on cell tracking techniques in 2007 and around the same time was operating an internal "secret" website with the purpose of sharing information and interactive media about "effective tools" for surveillance. There are also some previously classified emails between FBI agents that show the feds joking about using the spy gear. "Are you smart enough to turn the knobs by yourself?" one agent asks a colleague.
In a statement emailed in response to questions about Stingray technology, FBI spokesman Christopher Allen said its use of “any investigative tool” is required to be in compliance with the Constitution, U.S. laws, internal DOJ guidelines, and is subject to internal and external oversight. He added that the bureau “strives to protect our country and its people using every available tool, with utmost respect for the rule of law and our cherished right to privacy.”
“Location information is a vital component of law enforcement investigations,” Allen wrote. “During the course of FBI investigations and as permitted by controlling legal authority, the FBI may use a variety of tools and technology, including cell phone location technology.”
http://www.slate.com/blogs/future_tense/2013/02/15/stingray_imsi_catcher_fbi_files_unlock_history_behind_cellphone_tracking.html