{"id":12459,"date":"2016-04-25T10:12:18","date_gmt":"2016-04-25T14:12:18","guid":{"rendered":"http:\/\/www.megalextoria.com\/wordpress\/?p=12459"},"modified":"2016-04-25T10:12:18","modified_gmt":"2016-04-25T14:12:18","slug":"eff-and-aclu-expose-governments-secret-stingray-use-in-wisconsin-case","status":"publish","type":"post","link":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/2016\/04\/25\/eff-and-aclu-expose-governments-secret-stingray-use-in-wisconsin-case\/","title":{"rendered":"EFF and ACLU Expose Government\u2019s Secret Stingray Use in Wisconsin Case"},"content":{"rendered":"<p>Thanks to EFF and the ACLU, the government has finally <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-government-letter-admitting-stingray-use\" target=\"_blank\">admitted<\/a> it secretly used a Stingray to locate a defendant in a Wisconsin criminal case, <a href=\"https:\/\/www.eff.org\/press\/releases\/eff-aclu-court-accessing-cell-phone-location-records-without-warrant-violates\" target=\"_blank\"><i>United States v. Damian Patrick<\/i><\/a>. Amazingly, the government didn\u2019t disclose this fact to the defendant\u2014or the court\u2014until we raised it in an\u00a0<a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-eff-amicus\" target=\"_blank\">amicus brief<\/a> we filed in the case. In the <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-governmentappellee-brief\">government\u2019s brief<\/a>, filed late last week, it not only fails to acknowledge the impact of hiding this fact from the defendant but also claims its warrantless real-time location tracking didn\u2019t violate the Fourth Amendment.<\/p>\n<p>We first learned about this case when it was already on appeal to the Seventh Circuit Court of Appeals and filed an amicus brief arguing the Fourth Amendment protects all of us from warrantless, real-time location tracking. The government <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-defendant-motion-new-trial\">suggested<\/a> to both Patrick and the trial court that it had relied on location information obtained directly from Sprint. However, we suspected they had instead used a Stingray.<\/p>\n<p><strong>Stingrays Allow Indiscriminate Dragnet Searches of All Cell Phones in an Area<\/strong><\/p>\n<p>Stingrays, otherwise known as <a href=\"https:\/\/www.eff.org\/sls\/tech\/cell-site-simulators\" target=\"_blank\">cell-site simulators<\/a>, act as a fake cell-phone tower. They can be small enough to fit in a car and allow the government to direct all cell phones in the area to connect to it instead of the real tower. In doing so, the government can get a very precise picture of exactly where those phones are located\u2014much more precise than many other types of location tracking technologies.<\/p>\n<p>Stingrays are especially pernicious surveillance tools because they collect information on every single phone in a given area\u2014not just the suspect\u2019s phone\u2014this means they allow the police to conduct indiscriminate, dragnet searches\u2014in some cases on up to <a href=\"https:\/\/theintercept.com\/2015\/12\/17\/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone\/\" target=\"_blank\">10,000 phones<\/a> at one time. They are also able to locate people inside traditionally-protected private spaces like homes, doctors\u2019 offices, or places of worship and can be configured to capture the <a href=\"http:\/\/www.justice.gov\/sites\/default\/files\/criminal\/legacy\/2014\/10\/29\/elec-sur-manual.pdf\">content of communications<\/a>.<\/p>\n<p><strong>The Milwaukee Police Department Tried to Hide its Use of a Stingray<\/strong><\/p>\n<p>In this case, the police first told Patrick they\u2019d relied on \u201cinformation obtained from an anonymous source\u201d to find him sitting in the passenger seat of a car parked in an alley in Milwaukee.\u00a0 It wasn\u2019t until six months after his arrest that they revealed they\u2019d tracked him through his cell phone, and even then they implied they\u2019d gotten location information directly from the cell phone service provider. The government never got a search warrant to use any kind of technology to find Patrick in real time.<\/p>\n<p>As we\u2019ve seen in other cases involving Stingrays, the government did everything it could in this case to hide the fact that it used a Stingray\u2014from the court that issued the pen register\/trap and trace order, the court that heard Patrick\u2019s motion to suppress the evidence, and even from Patrick, himself. In police reports, the officers <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-magistrate-judge-order-denying-motion-suppress\" target=\"_blank\">said<\/a> only that they \u201c\u2018obtained information\u2019 of Patrick\u2019s location; . . . had \u2018prior knowledge\u2019 that Patrick was occupying the vehicle; . . . [and] \u2018obtained information from an unknown source\u2019 that Patrick was inside the vehicle at that location.\u201d And even at an <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-evidentiary-hearing-transcript\" target=\"_blank\">evidentiary hearing<\/a> where officers admitted to cellphone tracking, they would only acknowledge, cryptically, that they\u2019d received \u201celectronic information\u201d confirming Patrick was in the vehicle. When Patrick\u2019s attorney asked what \u201celectronic information\u201d meant, the officer on the stand would say only that it involved \u201ctracking [a] cell phone.\u201d The judge cut off any further questioning at that point.<\/p>\n<p>Luckily, in our amicus brief we were able to point the court to <a href=\"http:\/\/www.cehrp.org\/wp-content\/uploads\/2015\/09\/Milwaukee_PD_StingRay_use_log_Sep2015.pdf\" target=\"_blank\">Milwaukee Police Department logs<\/a> showing the police had used a Stingray on the very same day Patrick was arrested, under strikingly similar circumstances.<a title=\"\" href=\"https:\/\/www.eff.org\/deeplinks\/2016\/04\/eff-and-aclu-expose-governments-secret-stingray-use-wisconsin-case#_ftn1\">[1]<\/a> We also directed the court to a <a href=\"https:\/\/assets.documentcloud.org\/documents\/2190206\/milwaukee-pd-fbi-nda-13aug2013.pdf\" target=\"_blank\">non-disclosure agreement<\/a>, which the Milwaukee police signed just months before Patrick was arrested. In this standard FBI-issued NDA, signed by <a href=\"http:\/\/www.wired.com\/2014\/03\/harris-stingray-nda\/\" target=\"_blank\">many other state and local agencies across the country<\/a>, the police department agreed not to tell anyone (even the judge) in any civil or criminal proceeding that it had used a Stingray. It also agreed to dismiss any case\u2014at the FBI\u2019s request\u2014if the court tried to force it to reveal anything about the device.<\/p>\n<p>Once we presented these facts to the appellate court, the government finally <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-government-letter-admitting-stingray-use\" target=\"_blank\">admitted<\/a> it used a Stingray but would not concede this should have any impact on the legal analysis in this case. In a footnote to the brief the government filed last week, it even appeared to blame Patrick for failing to raise this at the trial court.<\/p>\n<p><strong>The Government Admits it Needs a Probable Cause Warrant to Conduct Real-Time Location Tracking<\/strong><\/p>\n<p>Interestingly, even though the government doesn\u2019t think it\u2019s secret use of a Stingray impacts this case, it <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-governmentappellee-brief\" target=\"_blank\">admits<\/a> that using technology to track someone\u2019s location in real time (whether through location information obtained from the phone company or by using a Stingray) is a \u201csearch\u201d for Fourth Amendment purposes. It also admits it needs probable cause and a search warrant to legally execute such a search. This appears to be the first time the government has admitted these things in an appellate case.<\/p>\n<p>But the government also argues it didn\u2019t violate the Fourth Amendment in this case because it actually got a warrant\u2014or maybe, in the alternative, the equivalent of a warrant (the police had a warrant to arrest (not search) Patrick and a court order (not a search warrant) to track Patrick\u2019s phone). In a confusing and somewhat circular argument, the government asserts that because it submitted a \u201csworn affidavit\u201d in support of its request for the pen\/trap order, the order must have actually been a search warrant\u2014if it hadn\u2019t been a warrant, then it \u201cwouldn\u2019t have needed a finding of probable cause, which it contained.\u201d<\/p>\n<p><strong>The Seventh Circuit Should Follow Maryland and Find Secret, Warrantless Stingray Use Unconstitutional<\/strong><\/p>\n<p>It\u2019s now up to the Seventh Circuit to try to make sense of this argument (or maybe just to <a href=\"https:\/\/www.eff.org\/document\/us-v-patrick-defendant-motion-new-trial\">send the case back to the trial court<\/a> for a new trial). If the appellate court decides to take this issue on, we hope it follows a recent Maryland appellate decision, <a href=\"https:\/\/www.eff.org\/document\/state-v-andrews-appellate-court-order-finding-stingray-use-violated-fourth-amendment\"><i>State of Maryland v. Andrews<\/i><\/a>(another case where we were <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/12\/eff-joins-aclu-amicus-brief-supporting-warrant-requirement-cell-site-simulators\" target=\"_blank\">amicus<\/a>), where the court held unanimously that the Baltimore Police Department\u2019s very similar secretive behavior and failure to get a search warrant before using a Stingray violated the defendant\u2019s constitutional rights. <i>Andrews<\/i> is the first appellate decision that we know of where a court has ever looked at police use of a Stingray. We hope it sets a very persuasive precedent to all courts that secret, warrantless Stingray use violates the Fourth Amendment.<\/p>\n<div>\n<\/div>\n<p>Source: <em><a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/04\/eff-and-aclu-expose-governments-secret-stingray-use-wisconsin-case\">EFF and ACLU Expose Government\u2019s Secret Stingray Use in Wisconsin Case | Electronic Frontier Foundation<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to EFF and the ACLU, the government has finally admitted it secretly used a Stingray to locate a defendant in a Wisconsin criminal case, United States v. Damian Patrick. Amazingly, the government didn\u2019t disclose this fact to the defendant\u2014or the court\u2014until we raised it in an\u00a0amicus brief we filed in the case. In the government\u2019s brief, filed late last week, it not only fails to acknowledge the impact of hiding this fact from the defendant but also claims its warrantless real-time location tracking didn\u2019t violate the Fourth Amendment. We first learned about this case when it was already on appeal to the Seventh Circuit Court of Appeals and filed an amicus brief arguing the Fourth Amendment protects all of us from warrantless, real-time location tracking. The government suggested to both Patrick and the trial court that it had relied on location information obtained directly from Sprint. However, we suspected they had instead used a Stingray. Stingrays Allow Indiscriminate Dragnet Searches of All Cell Phones in an Area Stingrays, otherwise known as cell-site simulators, act as a fake cell-phone tower. They can be small enough to fit in a car and allow the government to direct all cell phones in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[106,131,625,1637,1941],"class_list":["post-12459","post","type-post","status-publish","format-standard","hentry","category-news-and-politics","tag-4th-amendment","tag-aclu","tag-eff","tag-stingray","tag-wisconsin"],"_links":{"self":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/12459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/comments?post=12459"}],"version-history":[{"count":0,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/12459\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/media?parent=12459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/categories?post=12459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/tags?post=12459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}