Is There a Programmatic Stingray?
The NYT yesterday had a story on the secrecy surrounding Stingrays including these admissions from an FBI affidavit to explain the secrecy.
A fuller explanation of the F.B.I.’s position is provided in two publicly sworn affidavits about StingRay, including one filed in 2014 in Virginia. In the affidavit, a supervisory special agent, Bradley S. Morrison, said disclosure of the technology’s specifications would let criminals, including terrorists, “thwart the use of this technology.”
“Disclosure of even minor details” could harm law enforcement, he said, by letting “adversaries” put together the pieces of the technology like assembling a “jigsaw puzzle.” He said the F.B.I. had entered into the nondisclosure agreements with local authorities for those reasons. In addition, he said, the technology is related to homeland security and is therefore subject to federal control.
In a second affidavit, given in 2011, the same special agent acknowledged that the device could gather identifying information from phones of bystanders. Such data “from all wireless devices in the immediate area of the F.B.I. device that subscribe to a particular provider may be incidentally recorded, including those of innocent, nontarget devices.”
But, he added, that information is purged to ensure privacy rights.
In response, a bunch of smart people had an interesting conversation today about why the government is so secretive about them (start at this tweet).
My wildarseguess is that they’re hiding some kind of programmatic Stingray program. I think so for three reasons:
- Any programmatic Stingray program would (have) been hidden by carve-outs in USA Freedom Act’s transparency provisions
- At least one of the liberated non-disclosure agreements suggests ongoing obligations between localities and the FBI
- FISC appears to have permitted more expansive versions of criminal PRTT programs
In past legislative debates the Intelligence Community revealed secret programs by defending them
I believe one of the best ways to see vague outlines of undisclosed domestic surveillance is to watch where the Intelligence Community is most intransigent on legislation.
When Michaels Mukasey and McConnell wrote a transparently bullshit response to a Russ Feingold effort to segregate incidentally collected US person data under FISA Amendments Act in early 2008, I guessed they were doing back door searches of that data. 4 and 5 years later (with the report on the reauthorization and Snowden disclosures, respectively), that was proven correct.
When the IC repeatedly and successfully defeated efforts to require some real connection between a target and the records collected using Section 215 in 2009 all while boasting they had used it in the Najibullah Zazi investigation, I guessed they were using Section 215 to collect bulky data. I even guessed that they had migrated Bush’s illegal wiretap program to Section 215 and PRTT (though a former prosecutor friend soon dissuaded me from pushing my PRTT analysis because, she pointed out, there was no way in hell PRTT could authorize a dragnet).
There were 3 parts of the USA Freedom Act which struck me as particularly notable in the same way. First, the government’s insistence on expanding the chaining process to include “connections” in addition to contacts; I strongly believe that indicates they ask cell companies to match up the various identities with a particular handset.
Then there were two kinds of programmatic collection that would not only not be shut down by the prohibition on bulk collection in the bill, but which were specifically excluded from individualized transparency reporting (in addition to back door searches and upstream domestic collection, but we already knew about both of those), because transparency in the bill only covered “communications.” The first is any kind of dragnet tied to a non-communication corporate name, such as a financial dragnet or hotel records. See this post for an explanation. USAF would not require individualized reporting on this collection at all. Particularly given that the bill would permit using corporate names as identifiers and would exclude that from transparency, I think reasonable people should assume that kind of bulky collection would continue unabated.
More interesting, though, the transparency provisions also appear to exempt tracking device collection from individualized reporting, because those aren’t considered “communications” from individualized transparency reporting (I believe it would also exempt cloud data but I don’t understand what this is yet). I don’t think the government could use “Harris Corporation” as a identifier (they wouldn’t need to anyway, because the FBI would be using the tool not collecting all of Harris’ data). But they could collect the tracking data on 310 million people and only need to report targets (which currently number in the hundreds, though there already is some gaming of the required US person target reporting).
Like a Stingray, which looks for one phone, but obtains the records of everyone in a cell area.
Which is why I love this quote from the NYT article:
Christopher Allen, an F.B.I. spokesman, said “location information is a vital component” of law enforcement. The agency, he said, “does not keep repositories of cell tower data for any purpose other than in connection with a specific investigation.”
The government currently collects phone records of some significant subset of 310 million Americans for the purposes of “specific investigations.” It’s just that they consider enterprise investigations to be “specific” and therefore every American to be “relevant.” The same may well apply to location data.
FBI’s non-disclosure agreement(s) suggests ongoing cooperation between local and federal law enforcement
We’ve already seen plenty of evidence that local law enforcement retain their ties and obligations to federal law enforcement, largely in the demands the Marshal service puts on secrecy.
But as I lay out in this post, that seems to involve ongoing cooperation using the Stingray. An NDA liberated in MN specifically requires deconfliction of missions, indicating that multiple entities would use one Stingray at once.
That all seems to suggest a key part of this top-down hierarchical non-disclosure requirement involves that kind of mission-sharing.
Which is another way of saying that FBI probably relies on these local Stingrays.
FISC appears to permit more expansive PRTT programs than in criminal context
In this post and this one, I showed that the FISC-authorized use of PRTT relates the criminal context but may not be bound by it. That’s significant, because we know where the government has obtained permission for Stingray use in the criminal context, they’ve often relied on PRTT.
In both the use of combined PRTT/215 orders to get location data and in the collection of Post-Cut Through Dialed Digits, FISC has reconsidered PRTT orders after magistrates challenged similar criminal uses. At least in the latter example, FISC permitted FBI to continue a more expansive collection even after it was prohibited in the criminal context, requiring only that FBI comply with Fourth Amendment protections using minimization (as I’ll show when I finally write up the remainder of the FISC opinions, this practice has early foundation in other FISC applications).
What becomes clear reviewing the public records (these reports say this explicitly) is that the 2002 DOJ directive against retaining PCTDD applies to the criminal context, not the FISA context. When judges started challenging FBI’s authority to retain PCTDD that might include content under criminal authorities, FBI fought for and won the authority to continue to treat PCTDD using minimization procedures, not deletion. And even the standard for retention of PCTDD that counts as content permits the affirmative investigative use of incidentally collected PCTDD that constitutes content in cases of “harm to the national security.”
Whateverthefuck that is.
Which is, I guess, how FBI still has 7 uses of PCTDD, including one new one since 2008.
In other words, the Stingray use we see glimpses of in the criminal and fugitive context may be far short of what FISC has permitted in the national security context, if it tracks other practice. And accused terrorists (or spies) would not get notice of any such PRTT use so long as it wasn’t entered into a criminal proceeding (there have been several instances where the government has seemed to suggest PRTT was used, but evidence from it not entered into evidence).
All of this, of course, is speculative.
But there’s some reason the government is insisting on its expansive NDAs even while more and more people are discussing them. Hiding a more comprehensive program targeted at national security targets (terrorists and spies) might explain why the government is increasingly willing to forgo prosecutions of alleged criminals to keep what they’re doing with dragnets secret.
Update: Meanwhile, in NY, a judge has ordered the Erie County Sheriff to come clean on its Stingray use.
Just effing shoot me already, enuffs wit duh torture alreadies.
“In the affidavit, a supervisory special agent, Bradley S. Morrison, said disclosure of the technology’s specifications would let criminals, including terrorists, “thwart the use of this technology.””
I just luvs me some courts with no discovery, no rules and no accountability, and FBI boners who get shredded in an open court like the Boston turrurrizzt trial. Fascism much, empire of chaos?
I’ve now read the Erie County opinion. It’s a breath of fresh air, and certainly required reading. Is this the first one that goes so far, in ordering the provision of so many documents? (I note that we likely won’t get the underlying ‘why’ of the FBI’s NDA, but still ….) This Judge ceded next to nothing to the cops and their protestations of ‘But Crime!’- wow. Maybe a follow-up post on the opinion?
quote”I’ve now read the Erie County opinion. It’s a breath of fresh air, and certainly required reading.”unquote
INDEED. And, if I’m not mistaken(please correct me if I am wrong)this ruling can now be used as a precedent? No matter, breath of fresh air is an understatement. Had I been in the gallery, I’d probably got removed from the proceedings for jumping in the air in raucous joyous applauding. :)
In that light..my hat is off to…
The HON. PATRICK H. NeMOYER, J.S.C
HONORABLE indeed. After 13 yrs of watching Federal judge after judge acquiesce to USG/DOJ bullshit lies , twisted logic and fracturing the rule of law..I’m absolutely astounded. Especially at the Judges logic and the way he mocked the respondents bullshit with civil yet devastating authority . It’s about fucking time. GO JUDGE NeMOYER!!!!
I only wish I was a fly on the wall in the respondents councils office when they got the news. I’ve got $25 that says a few heads were exploding…notwithstanding at James Colby and the US Marshal’s offices. Moreover..every law enforcement offices around the nation that currently use Stingrays AND those fuckers in Congress too. I hope they fucking choke.
Btw..that reminds me…
Thanks for the link emptywheel. It’s times like this when I really appreciate your work.
Wonder if Senator Wyden’s question about US Citizen Geolocation Info or the proposed GPS bill relate to this programmatic stingray possibility too..
ps..I also bet the people at the ACLU were high fiveing in utter glee. On their behalf..to all those law enforcement bastards who’ve tried to pull the wool over the rule of law eyes..and to those at the NSA who supply the SOD with illegal criminal data, and the US Attorneys who lie through their teeth to judges faces using that data to parallel construct probable cause…..
eat shit and die.
Meanwhile.. your not fooling anyone. Your jig is up.
Imagine that, the FBI demanding and local governments agreeing to keep secret their cooperation in the use of constitutionally questionable mass surveillance. What could go wrong with that?
Very possible a programmatic Stingray in place, as a part of the Stingray equipment. How else would a device *immediately* kick out (minimize) non-target material when the content of intended but as yet un-located targets needs to be screened to be identified? Seems to me a rather simple algorithm would be in place to winnow down results, and likely without 100% assurance on first pass when target’s cellphone identity is unknown.
But does the Stingray device have on-board computing capability? Is it really just a network device more like a network sniffer? In which case the programmatic portion of the Stingray isn’t local — it’s in the cloud, over a network. And that’s the invisible and larger danger here, like the iceberg beneath the water. If the Stingray device uses algorithms generated in real time, non-locally, who’s at the other end? What’s at the other end?
Let’s say this theory is correct, that there is a programmatic Stingray, but it’s not local. There’s a legitimate fear, then, that a criminal/ terrorist/ enemy/ bogeyman-of-the-day could use the Stingray to totally screw with whatever is at the other end. The Stingray looks like a fairly simple network-attached device; it’s made to US specifications, meaning it will have similar vulnerabilities the NSA has insisted on building into electronics designed to operate in US-based networks. Could be treasure mapped to locate its physical address, right? Blowback, baby, boom.
The other risk here, apart from a programmatic shadow Stingray and its likely network attachment to the cloud, is the possibility the system is big. Really widespread. And then the public might begin to ask, “How has this actually stopped any crime/terror?” If they were to begin to ask what these Stingrays are actually programmed to do, they might find they weren’t sniffing for the expected cellphones, but for something else altogether.
this certainly goes a long way towards explaining the network of uniform-designed “cell towers” that punctuate the landscape of most of the country. The permanent infrastructure supporting “collect it all” is visible everywhere, and it’s not just “suitcase-sized” mobile devices that can fit into a car
Your noting the cell towers brings up an interesting point. The NYS Supreme Court decision linked above wrt Erie County’s StingRay documents very nicely outlined the operations of StingRay’s use in locating targets, specifically mentioning triangulation.
Triangulation in itself implies there is more than one network device in play in order to locate a target cellphone. What are the other network devices used in the StingRay process? Another StingRay-enabled tower? Or the network itself?
Leads me to wonder: Does the recent treasure mapping of JP Morgan Chase, in which adequate information identifying physical location of account holders, figure into any misuse of StingRay-based targeting?