New Emails Show That Feds Instructed Police To Lie About Using Stingray Mobile Phone Snooping

from the that's-not-how-it's-supposed-to-work dept

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

We've been covering the increasingly widespread use of Stingray or similar mobile phone tower spoofing equipment by law enforcement. The stories have been getting increasingly bizarre lately, starting with the news that police were claiming that non-disclosure agreements prevented them from getting a warrant to use the technology. And then, there was the recent news that the federal government was regularly stepping in to claim ownership of documents related to the technology (even when it's used by local police) in order to block them from being obtained under Freedom of Information laws. Just this morning, we wrote about some new evidence that police are claiming they need these devices to stop "weapons of mass destruction," though they then just use them to spy on people suspected of everyday crimes instead.Late last night, the ACLU came out with perhaps the most explosive information so far: a set of internal police emails showing that the US Marshals have been instructing police to lie to courts about the use of such devices . Specifically, rather than revealing the use of the tool, they're told to just tell the court they got the information from a "confidential source." While affidavits may initially note the use of such a device, the police are told to submit a new affidavitwithout mentioning the Stingray, and seal the old one, so that it never becomes public. The key parts of the email are highlighted below:This is. Just to repeat: this is the federal government loaning out equipment to spoof mobile phone towers to spy on people and then instructing (practically demanding) that the police hide or suppress this information by claiming that it came from a "confidential source" and by sealing any affidavits that accidentally mention the use of the equipment. As the ACLU notes this practice "deprives defendants of their right to challenge unconstitutional surveillance ." It also seems like a fairly straightforward due process violation. This even goes beyond "parallel construction" in which illegal surveillance is concealed by "recreating" it in other ways. In this case, you have illegally obtained evidence... and then police are just told to lie to the court about it.This is stunningly bad.As some legal experts are quick to note, this seems like an astoundingly stupid move by both the US Marshals and the local police who took them up on their request. That link, includes quotes from a number of legal experts interviewed by Cyrus Farivar at Ars Technica, some of whom are actually supportive of the use of Stingrays, but who note that this effort could very well be fraud on the court.

Filed Under: cell phone spoofing, fraud on the court, law enforcement, lying to court, sarasota, stingray, surveillance, us marshals