In new e-mail, Seattle cop says it's vital to keep spy technique "confidential."
The e-mails were published over the weekend by Andrew Charles Hendricks, a local privacy activist.
Stingrays, the common name for “cell-site simulators,” can be used to determine a phone’s location, but they can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones—not just the target phone. Earlier this month, Ars reported on how the FBI is actively trying to “prevent disclosure” of how these devices are used in local jurisdictions across America.
As Detective Len Carver, who is also on an FBI task force, wrote to his colleagues in May 2014:
In an e-mail to Ars, Carver wrote "I am not authorized to speak publicly about the investigative technique to which you referred in your voicemail," and suggested that we speak with a spokeswoman.
“Relevant to an ongoing criminal investigation”
It’s not immediately clear how the Tacoma Police’s cellphone pings are taking place, or what device is being used to send them—it’s likely that it was through the stingray itself.
Troyer did not immediately respond to Ars’ request for comment, either.
Relatively little is known about how, exactly, the stingrays are used by law enforcement agencies nationwide, although documents have surfaced showing how they have been purchased and used in some limited instances. In 2013, Ars reported on leaked documents showing the existence of a body-worn stingray. Back in 2010, Kristin Paget famously demonstrated a homemade device built for just $1,500.
Worse still, cops have lied to courts about the use of such technology. In January 2015, two US senators made public the FBI’s position that the agency could use stingrays in public places without a warrant. The largest manufacturer of the devices, the Harris Corporation, has been tight-lipped about its hardware capabilities.
In the pre-cellphone era, a “pen/trap order” allowed law enforcement to obtain someone's calling metadata in near real-time from the telephone company. Now, that same data can also be gathered directly by the cops themselves through the use of a stingray. In some cases, police havegone to judges asking for such a device or have falsely claimed a confidential informant, but in fact have deployed this particularly sweeping and invasive surveillance tool.
Most judges are likely to sign off on a pen register application, not fully understanding that police are actually asking for permission to use a stingray. Under both Washington state law and federal law, pen registers are granted under a very low standard: authorities must simply show that the information obtained from the pen register is “relevant to an ongoing criminal investigation.”
Getting a judge to sign off on a pen register is a far lower standard than being forced to show probable cause for a search warrant or wiretap order. A wiretap requires law enforcement to not only specifically describe the alleged crimes but also to demonstrate that all other means of investigation had been exhausted or would fail if they were attempted.
In the wake of the Tacoma News Tribune’s reporting on stingray use in Tacoma, in November 2014, judges there imposed stricter standards.
This past week, the Charlotte-Mecklenburg Police Department (CMPD) in North Carolina—one of the largest local police departments in the American South—revised its surveillance applications to judges, making its judicial requests to use cell-site simulators much more explicit for the first time.
Cyrus Farivar / Cyrus is the Senior Business Editor at Ars Technica, and is also a radio producer and author. His first book, The Internet of Elsewhere, was published in April 2011.