Little-known surveillance tool raises concerns by judges, privacy activists
The practice was disclosed Wednesday in documents obtained under the Freedom of Information Act by the American Civil Liberties Union of Northern California — in a glimpse into a technology that federal agents rarely discuss publicly.
U.S. filmmakers subjected to years of cyberattacks blamed on China
U.S. Army veteran charged after fighting in Syria with al-Qaeda affiliate
Army veteran Eric Harroun boasted on the Internet and in interviews about fighting the Syrian government.U.S. taking serious note of N. Korea’s ‘provocative’ threats, Hagel says
Study: Iraq, Afghan war costs to top $4 trillion
Syrian conflict’s impact is felt in Iraq
The issues, judges and activists say, are twofold: whether federal agents are informing courts when seeking permission to monitor suspects, and whether they are providing enough evidence to justify the use of a tool that sweeps up data not only from a suspect’s wireless device but also from those of bystanders in the vicinity.
In Northern California, according to the newly disclosed documents, judges expressed concerns about the invasive nature of the technology.
“It has recently come to my attention that many agents are still using [StingRay] technology in the field although the [surveillance] application does not make that explicit,” Miranda Kane, then chief of the criminal division of the Northern California U.S. attorney’s office, said in a May 2011 e-mail obtained by the ACLU.
As a result of that, she wrote, “effective immediately, all . . . applications and proposed orders must be reviewed by your line supervisor before they are submitted to a magistrate judge.”
The Justice Department has generally maintained that a warrant based on probable cause is not needed to use a “cell-site simulator” because the government is not employing them to intercept conversations, former officials said. But some judges around the country have disagreed and have insisted investigators first obtain a warrant.
“It’s unsettled territory,” said one U.S. law enforcement official, who spoke on the condition of anonymity because he was not authorized to speak for the record.
In a statement, Christopher Allen, a spokesman for the FBI, said the bureau advises field offices to “work closely with the relevant U.S. Attorney’s Office to adhere to the legal requirements” of their respective districts.
One of the problems is there is “scant law” addressing the issue of cell-site simulators, said Brian L. Owsley, a federal magistrate judge in the Southern District of Texas, who in June wrote a rare public ruling on the issue. He denied an application to use a StingRay, in large part because he felt the investigating agent failed to explain the technology or how it would be used to gather the target’s cellphone number.
No comments:
Post a Comment