icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
29 Oct, 2015 17:16

Police can use Stingray surveillance devices to listen to calls – documents

Police can use Stingray surveillance devices to listen to calls – documents

It’s long been known that authorities can use the secretive Stingray tools to track people by their cell phones. Now it’s been revealed that police are actually able to listen in on calls using the device.

Stingrays, cell-site simulators, are suitcase-sized devices that work by mimicking cell towers and intercepting the signals of mobile phones. This can be used to get information on the contacts, messages and even location of the owner of a phone, making its use by police and federal agencies controversial.

Now, new Department of Justice documents have revealed that Stingrays also allow the users of the device to snoop on phone calls and record the numbers of outgoing calls. The documents, which function as guidelines for the use of Stingrays by law enforcement, also discussed the possibility of replacing a phone’s firmware so that users “can intercept conversations using a suspect’s cell phone as a bug. You don't even have to have possession of the phone to modify it; the 'firmware' is modified wirelessly.”

RT

Only after a protracted legal battle was the American Civil Liberties Union of Northern California able to get the documents from the Justice Department, in which they acknowledge the controversy surrounding Stingrays.

The documents say that when using a Stingray to identify a phone a suspect is using, agents should limit their snooping to gathering device-identifying information. “It should not encompass dialed digits, as that would entail surveillance on the calling activity of all persons in the vicinity of the subject,” the guidelines read.

However, this type of restraint is only spelled out because the devices have such far-reaching functionality, including the ability to actually hear the contents of intercepted calls. The DoJ goes on to note that the devices “may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III order.”

Title III is the part of the law that gives the authorities the power to perform a wiretap – that is, listen to calls in real-time – and authorities who wish to perform a wiretap need to get a warrant.

The newly-revealed documents only confirm the suspicion of privacy advocates, who have long suspected that Stingrays have the capability to gather the contents of communications, not just the metadata.

This revelation comes less than a week after the Guardian obtained another set of documents showing that the IRS bought the cell-site simulators from Harris Corporation in 2009 and 2012. This makes the IRS the 13th.

In addition to federal agencies, 56 state or local police departments in 22 states and the District of Columbia own Stingrays, the American Civil Liberties Union says, but a lack of transparency in the use and ownership makes it impossible to know the scale of the surveillance that the devices facilitate.

 

 

Podcasts
0:00
25:59
0:00
26:57