San Bernardino Police Used Stingray Spy Tech Over 300 Times Without Warrant
This story originally reported by Cyrus Farivar for Ars Technica
The sheriff in San Bernardino County — east of Los Angeles County — has deployed a stingray hundreds of times without a warrant, and under questionable judicial authority.
In response to a public records request, the San Bernardino Sheriff’s Department (SBSD) sent Ars, among other outlets, a rare example of a template for a “pen register and trap and trace order” application. (In the letter, county lawyers claimed this was a warrant application template, when it clearly is not.) The SBSD is the law enforcement agency for the entire county, the 12th-most populous county in the United States, and the fifth-most populous in California.
Stingrays, or cell-site simulators, can be used to determine location by spoofing a cell tower, but they can also be used to intercept calls and text messages. Once deployed, the devices intercept data from a target phone as well as information from other phones within the vicinity. For years, federal and local law enforcement have tried to keep their existence a secret while simultaneously upgrading their capabilities. Over the last year, as the devices have become scrutinized, new information about the secretive devices has been revealed.
This template application, surprisingly, cites no legal authority on which to base its activities. The SBSD did not respond to Ars’ request for comment.
“This is astonishing because it suggests the absence of legal authorization (because if there were clear legal authorization you can bet the government would be citing it),” Fred Cate, a law professor at Indiana University, told Ars Technica by e-mail.
“Alternatively, it might suggest that the government just doesn’t care about legal authorization. Either interpretation is profoundly troubling,” he said.
The documents sent to Ars by the SBSD’s county attorneys also show that since acquiring a stingray in late 2012, the agency has used it 303 times between January 1, 2014 and May 7, 2015.
Further, the SBSD, like other departments nationwide, maintains a questionable non-disclosure agreement (NDA) with the FBI that indicates that the agency will work with local prosecuting authority to dismiss cases rather than reveal information in court about stingrays. (This has happened in at least some known jurisdictions elsewhere in the country.)
Just last week, the FBI released a statement regarding the use of stingrays, which claims the opposite of what its NDA with local law enforcement actually says. The SBSD also declined to produce policies, guidelines, training materials, nor the specific cases where stingrays were used.
The FBI and the Harris Corporation, the manufacturer of the device, have repeatedly declined to respond to Ars’ specific questions.
The rest of this story is available on Ars Technica
UPDATE
TruthVoice reader Tony Policicchio recommended the open source Snoopsnitch app, which purports to warn phone users of potential Stingray tracking. The app requires a rooted android device with a Qualcomm chipset in order to function correctly.
Thanks Tony!