FBI Hands Over 5000 Pages Of Stingray Info To MuckRock, Redacts Nearly All Of It

from the [NOTHING-TO-SEE-HERE] dept

MuckRock has obtained a whole stack of Stingray-related documents from the FBI. As is to be expected, there's not much left un said by the agency, which is at least as protective of its own Stingray secrecy as it is with that of law enforcement agencies all over the US.



There's nearly 5,000 pages of "material" here, most of which contains only some intriguing words and phrases surrounded by page after page of redactions.



Want to know [REDACTED]'s thoughts on the possible legal implications of Triggerfish? Just close your eyes and allow your imagination to run free.



In passing CALEA in 1994, Congress required providers to isolate and provide to the government certain information relating to telephone communications. At the same time that it created these obligations, it created an exception: carriers shall not provide law enforcement with "any information that may disclose the physical location of the subscriber" in response to a pen/trap order… By its very terms, this prohibition applies only to information collected by a provider and not to information collected directly by law enforcement authorities. Thus, CALEA does not bar the use of pen/trap orders to authorize the use of cell phone tracking devices used to locate targeted cell phones.

"It does not seem credible to me that they can't release more of those kinds of records," [ACLU attorney Nate] Wessler told me. "Information about ongoing investigations, highly technical details of the devices, how they're put together, those kinds of things, redact them, fair enough. Information about whether they have to get a warrant or not, how they purge or do not purge bystanders data. They're clearly talking about those things."



"There's no conceivable reason why they shouldn't tell the public what their Fourth Amendment rights are protecting when they use these," he added. "The documents are not without value, but what the FBI has released is not adequate."

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Here's a quick reference guide that allows FBI agents to quickly match up their chosen "technique" with the appropriate legal standard and process.That's not to say there's nothing of interest left intact. A few pages explain the FBI's legal rationale for IMSI catcher deployment -- including the fact that the Patriot Act expanded the reach of pen register orders to include not just numbers dialed, but also the location of the phone itself. This allows the FBI and other law enforcement agencies to route around one of CALEA's (Communications Assistance for Law Enforcement Act) few limitations related to pen register orders: that service providersbe required to hand over subscriber location info.But, for the most part, it's 5000 pages of this:And this (from a document titled "Stingray for Dummies"):It's not a complete loss, although it's clear the documents suffer from over-redaction. The FBI clearly doesn't want to discuss methods or technical details, but nothing in the multiple FOIA exemptions deployed justifies covering up its minimization procedures or where the device sits in terms of the Fourth Amendment If nothing else, the documents have given a small, narrow glimpse behind the FBI's veil of secrecy -- as well as some more insight into its Stingray-related legal maneuvering. The FBI has managed to turn a pen register order -- something previously used to collect dialed numbers -- into something that can be deployed to locate an individual, or at least their cellphone. Unsurprisingly, this legal theory traces back to the Patriot Act, one of the largest expansions of intelligence and law enforcement powers ever produced by the US government.

Filed Under: fbi, foia, imsi catcher, redactions, stingray