A Letter to the President on Surveillance Tech

By Eric Neville, Oakland Privacy Member.

Dear President Obama:

I question the legitimacy of using any secret technology in attempt to uphold the law.  As an illustration of the inherent vitiation of the legal process, I offer the Stingray cell site simulator equipment, and I reference the issues addressed in the attached letter from twelve United States Senators.[1a][1b]  I must immediately point out that even the name of this technology may be disputed, having been referred to even in courts by various “inscrutable euphemisms“, showing from the first step impedance to the proper understanding which is necessary for justice.[1c]

This equipment, among its other capabilities, hijacks the signalling of mobile phones by overpowering and/or jamming cell tower radio waves and forcing thousands of mobile phones within about one mile to drop their connection to cell service and connect instead to the equipment.[2a][2b][2c][2d][2e]  Once connected to the device, phones can be commanded to reveal their telephone number (silent call), increase transmission strength, use a weakened encryption protocol or no encryption at all, or send onboard information such as unique identifiers and location data.[2f][2g][2h][2i][2j][2k]  An undisclosed and unverifiable number of times, its use has surreptitiously violated the Communications Act; swept up data on innocent people and violated the Fourth Amendment; blocked or dropped innocent person’s calls and data access, including emergency calls; broken advanced encryption; recorded texts and calls; and snooped contacted numbers and stored photos.[2l][2m][2n][2o][2p][2q][2r][2s][2t][2u][2v][2w][2x]  (Via the same telephony vulnerabilities, related equipment has also been used to track movement, send text message spam, and surveil then blackmail municipal governance personnel.[2y][2z][2zz])

The fundamental issue is that technology that cannot be inspected for performance by the body politic cannot be assessed as to legal propriety, including not least civil rights.  The stakes are only multiplied in an era of burgeoning automation, technology which carries its own agency, thus becoming an inherently unknown quantity.  The agency of automation is so powerful that, as anyone who has used a personal computer can attest, it regularly deviates in performance from even the intent of designers, let alone the understanding of users.  The quantum leap in power that the agency of automation presents means that secret technology is secret policing.

One must also note that the Senators’ letter derives from concerns first raised by common citizens, and that — disappointingly — no one in law enforcement came forward to take issue with the equipment’s violations of laws or rights.  Apparently, even after years of use, no one in law enforcement sufficiently understood the actual performance of the equipment, that performance’s interaction with laws and rights, and the consequences to a free society.  This proves that the body politic must have access to scrutinize equipment considered for use in law enforcement, and the opportunity to assess collectively the actual performance and its ramifications on society, not least in re laws and civil rights.

Hundreds of articles have been published describing the physical militarization of police agencies, and the employment of this signal hijacking equipment with military origins apparently reflects the same cultural approach, applied in the information sphere, including summarily viewing the public as a “adversaries“.[5a][5b][5c][5d]

The fact that key evidence has been dropped and criminal cases have been reduced and apparently even dropped entirely to avoid cross examination and to obscure the use and even the secrecy itself of signal hijacking equipment is proof that the public welfare has not been the first priority in adoption of such equipment, and that technological secrecy is fundamentally incompatible with justice.[6a][6b][6c][6d][6e][6f][6g][6h][6i][6j][6k]

In fact, the use of Stingray has been racially biased in violation of law, systematically suborned officers of the law by demanding concealment of evidence, and in at least one case even lead to an armed confrontation of an innocent person in their home.[7a][7b][7c]

This clouded history betrays the inherent conflict in deploying secret technology for democratic governance. Only now, after many years of offenses against the American people, yet based on insights from that same American people, are underlying violations of law and rights and public trust exposed, showing that technology cannot be properly understood and vetted for fitness in upholding the law if it cannot be publicly assessed.

In further support of this observation, I note that we live in an era in which the daily business of government is vastly larger than any one person can comprehend.  The still-expanding organizational complexity of humanity is taking on the scale of complexity of systems such as the human body.  Although we all have lungs, a liver, and a blood system and rely on them to survive, understanding them is hardly a given, even though we own them.  We face a similar challenge governmentally, in that understanding the structure and impacts of our systems built of humans is hardly a given, even though we own them:  regulatory capture, mass incarceration, carbon emissions, etc.  Just because we rely on a system built of humans, or even are ourselves part of such a system, does not perforce grant us understanding of that system.  In our own way, we are like a formicary, which through its emergent properties effects much more collectively than any individual ant comprehends.[9a][9b][9c]  As humans, consciously comprehensive coordination is our opportunity, and our responsibility.  The best possible government requires the best possible understanding of government, which requires all hands on deck.  And that absolutely includes public scrutiny of technology — not least automated technology, which compounds the complexity and agency of systems, and thus compounds our challenge in tracking the actions and impacts of those systems.

Even the corpus of our federal statues alone, a human product that is not automated and is but a fraction of total American legal constructs, exceeds in bulk and complexity the comprehension of any single person, or even subgroup.[10a][10b][10c][10d][10e]  Just as computer security is only effective if it responds to failure reports from all corners, and public health programs must respond to reports from all corners, legal integrity too can only be protected if it is open to reports from all corners.  Prejudicially ruling out observations by any individual jeopardizes the welfare of the whole.  The countless violations of laws and rights perpetrated over many years by use of Stingray, born and cocooned in secrecy, are testament to what happens when we fail to grasp this truth: that we are capable of creating more than we intend or even understand, and secrecy undermines the comprehension necessary for collective welfare and national advancement.[10f][10g][10h][10i][10j][10k][10l][10m][10n]

Moreover, the normalization of violating the law within a siloed culture of law enforcement itself illuminates how expectations of secrecy sabotage hallowed American values, such as rule of law, that are necessary to realize justice.  That American government has been systematically violating its own law is proof positive — if any new proof were necessary — that our government is still dependent on its originator, the American people, for legal and moral oversight.

Additional examples such as Tor exploits, Stuxnet, and Hemisphere further illustrate the legal liabilities of secrecy in technology.[12a][12b][12c]

Essentially, because the nature of humanity and its laws exceeds the comprehension of any individual or subgroup, and automation in technology has transformed it into a protean actor, secrecy in technology applied to law enforcement inherently subverts the collective effort necessary for legality.

Sincerely,
Eric Neville

 

2016-11-16


[1a]  Wikipedia.  “Stingray phone tracker”.  https://en.wikipedia.org/wiki/Stingray_phone_tracker

[1b]  Franken, Al, et al.  2016-10-06.  Letter to Tom Wheeler.  https://assets.documentcloud.org/documents/3124334/Senate-Letter-to-FCC-on-Stingray-Devices.pdf

[1c]  Woolf, Nicky.  2015-09-04.  “2,000 cases may be overturned because police used secret Stingray surveillance”.  The Guardianhttps://www.theguardian.com/us-news/2015/sep/04/baltimore-cases-overturned-police-secret-stingray-surveillance

 

[2a]  Daniel, Larry E.  “Cellular Analysis for Legal Professionals”.  Guardian Digital Forensics.  https://law.duke.edu/sites/default/files/ccjpr/cellular.pdf

[2b]  Stone, Jeff.  2015-03-02.  “StingRay Phone Tracker Knocks Out Cell Networks, FBI Reveals”.  International Business Timeshttp://www.ibtimes.com/stingray-phone-tracker-knocks-out-cell-networks-fbi-reveals-1832598

[2c]  “3G-GSM Tactical Interception & Target Location”.  Gamma Group.  https://info.publicintelligence.net/Gamma-GSM.pdf

[2d]  Kelly, John.  2013-12-08.  “Cellphone data spying: It’s not just the NSA”.  USA Todayhttp://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/

[2e]  Gallagher, Ryan.  2013-09-25.  “Meet the machines that steal your phone’s data”.  Ars Technicahttp://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/

[2f]  Israel, Tamir, et al.  2016.  “Gone Opaque?  An Analysis of Hypothetical IMSI Catcher Overuse in Canada”.  Telecom Transparency Project, et al.  https://citizenlab.org/wp-content/uploads/2016/09/20160818-Report-Gone_Opaque.pdf

[2g]  The Secret Surveillance Catalogue.  “Stingray I/II”.  The Intercept.  https://theintercept.com/surveillance-catalogue/stingray-iii/

[2h]  Zetter, Kim.  2016-05-06.  “Hacker Lexicon: Stingrays, the Spy Tool the Government Tried, and Failed, to Hide”.  Wiredhttps://www.wired.com/2016/05/hacker-lexicon-stingrays-spy-tool-government-tried-failed-hide/

[2i]  Dabrowski, Adrian, et el.  2014.  “IMSI-Catch Me If You Can: IMSI-Catcher-Catchers”.  https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf

[2j]  “Department of Justice Policy Guidance:  Use of Cell-Site Simulator Technology”United States Department of Justice.  https://www.justice.gov/opa/file/767321/download

[2k]  Omand, Geordon.  2016-03-24.  “Rights groups want to know if police use ‘Stingray’ device to collect cell data”.  The Canadian Presshttp://www.cp24.com/news/rights-groups-want-to-know-if-police-use-stingray-device-to-collect-cell-data-1.2830587

[2l]  Barrett, Devlin.  2014-11-13.  “Americans’ Cellphones Targeted in Secret U.S. Spy Program”.  Wall Street Journalhttp://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533

[2m]  KXTV ABC 10.  2016-01-08.  “New developments in Sacramento “Stingray” case”.  http://www.abc10.com/news/local/sacramento/new-developments-in-sacramento-stingray-case/24444110

[2n]  Barrett, Brian.  2016-08-16.  “The Baltimore PD’s Race Bias Extends to High-Tech Spying, Too”.  Wiredhttps://www.wired.com/2016/08/baltimore-pds-race-bias-extends-high-tech-spying/

[2o]  Pagliery, Jose.  2014-11-14.  “U.S. planes spy on American phones”.  Cable News Network.  http://money.cnn.com/2014/11/13/technology/security/federal-planes-spy/

[2p]  Zetter, Kim.  2014-10-17.  “Cops Need a Warrant to Grab Your Cell Tower Data, Florida Court Rules”.  Wiredhttps://www.wired.com/2014/10/florida-court-requires-warrant-cell-tower-data/

[2q]  Fenton, Justin.  2016-04-25.  “Key evidence in city murder case tossed due to stingray use”.  Baltimore Sunhttp://www.baltimoresun.com/news/maryland/crime/bs-md-ci-stingray-murder-evidence-suppressed-20160425-story.html

[2r]  Emmons, Alex.  2016-03-31.  “Maryland Appellate Court Rebukes Police for Concealing Use of Stingrays”.  The Intercepthttps://theintercept.com/2016/03/31/maryland-appellate-court-rebukes-police-for-concealing-use-of-stingrays/

[2s]  Weiser, Benjamin.  2016-07-12.  “D.E.A. Needed Warrant to Track Suspect’s Phone, Judge Says”.  New York Timeshttp://www.nytimes.com/2016/07/13/nyregion/dea-needed-warrant-to-track-suspects-phone-judge-says.html

[2t]  Zetter, Kim.  2015-03-01.  “Feds Admit Stingrays Can Disrupt Cell Service of Bystanders”.  Wiredhttps://www.wired.com/2015/03/feds-admit-stingrays-can-disrupt-cell-service-bystanders/

[2u]  Freeze, Colin.  2016-04-18.  “RCMP listening device capable of knocking out 911 calls, memo reveals”.  Globe and Mailhttp://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memo-reveals/article29672075/

[2v]  Winston, Ali.  2015-08-07.  “
Chicago and Los Angeles have used ‘dirt box’ surveillance for a decade”Revealhttps://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/

[2w]  Zetter, Kim.  2015-10-28.  “Turns Out Police Stingray Spy Tools Can Indeed Record Calls”.  Wiredhttps://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/

[2x]  Baker, Karl.  2016-02-20.  “Delaware police can covertly collect cellphone data”.  The News Journalhttp://www.delawareonline.com/story/news/2016/02/20/delaware-police-can-covertly-collect-cellphone-data/80470880/

[2y]  Gallager, Sean.  2011-11-25.  “We’re watching: malls track shopper’s cell phone signals to gather marketing data”.  Ars Technicahttp://arstechnica.com/business/2011/11/were-watching-malls-track-shoppers-cell-phone-signals-to-gather-marketing-data/

[2z]  Muncaster, Phil.  2014-03-26.  “Chinese cops cuff 1,500 in fake base station spam raid”.  The Registerhttp://www.theregister.co.uk/2014/03/26/spam_text_china_clampdown_police/

[2zz]  Maphumulo, Solly.  2015-08-04.  “Man in dock over R25m bugging device”.  Independent Onlinehttp://www.iol.co.za/news/crime-courts/man-in-dock-over-r25m-bugging-device-1895186

 

[5a]  Google news search for terms: united states police militarization.  https://www.google.com/search?sclient=psy-ab&hl=en&gl=us&authuser=0&tbm=nws&btnG=Search&q=united+states+police+militarization

[5b]  Fenton, Justin.  2014-11-17.  “Judge threatens detective with contempt for declining to reveal cellphone tracking methods”.  Baltimore Sunhttp://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-officer-contempt-20141117-story.html

[5c]  Heath, Brad.  2016-04-20.  “FBI warned agents not to share tech secrets with prosecutors”.  USA Todayhttp://www.usatoday.com/story/news/2016/04/20/fbi-memos-surveillance-secrecy/83280968/

[5d]  The Economist.  2016-01-30.  “The StingRay’s tale”.  http://www.economist.com/news/united-states/21689244-courts-take-aim-technology-beloved-countrys-police-forces-secretive

 

[6a]  Farivar, Cyrus.  2014-11-18.  “Prosecutors drop key evidence at trial to avoid explaining “stingray” use”.  Ars Technicahttp://arstechnica.com/tech-policy/2014/11/prosecutors-drop-key-evidence-at-trial-to-avoid-explaining-stingray-use/

[6b]  Nakashima, Ellen.  2015-02-22.  “Secrecy around police surveillance equipment proves a case’s undoing”.  Washington Posthttps://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html

[6c]  Patrick, Robert.  2015-04-19.  “Controversial secret phone tracker figured in dropped St. Louis case”.  St. Louis Post-Dispatchhttp://www.stltoday.com/news/local/crime-and-courts/controversial-secret-phone-tracker-figured-in-dropped-st-louis-case/article_fbb82630-aa7f-5200-b221-a7f90252b2d0.html

[6d]  Heath, Brad.  2015-08-24.  “Police secretly track cellphones to solve routine crimes”.  USA Todayhttp://www.usatoday.com/story/news/2015/08/23/baltimore-police-stingray-cell-surveillance/31994181/

[6e]  Farivar, Cyrus.  2015-04-29.  “Robbery suspect pulls guilty plea after stingray disclosure, case dropped”.  Ars Technicahttp://arstechnica.com/tech-policy/2015/04/alleged-getaway-driver-challenges-stingray-use-robbery-case-dropped/

[6f]  Zetter, Kim.  2014-06-19.  “Emails Show Feds Asking Florida Cops to Deceive Judges”.  Wiredhttps://www.wired.com/2014/06/feds-told-cops-to-deceive-courts-about-stingray/

[6g]  Wessler, Nathan Freed.  2016-01-25.  “New Evidence Shows Milwaukee Police Hide Stingray Usage From Courts and Defense”.  American Civil Liberties Union.  https://www.aclu.org/blog/free-future/new-evidence-shows-milwaukee-police-hide-stingray-usage-courts-and-defense

[6h]  Cameron, Dell, et al.  2016-10-07.  “Police documents reveal how law enforcement keep Stingray use secret”.  Daily Dothttp://www.dailydot.com/layer8/stingray-surveillance-doj-warrant-north-carolina/

[6i]  Pagliery, Jose.  2015-03-18.  “The FBI has a secret device to locate criminal suspects, but it would apparently rather let suspects go free than reveal in court any details of the high tech tracker”.  Cable News Network.  http://money.cnn.com/2015/03/18/technology/security/police-stingray-phone-tracker/

[6j]  Greenemeier, Larry.  2015-06-25.  “What Is the Big Secret Surrounding Stingray Surveillance?”.  Scientific Americanhttps://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/

[6k]  Valentino-DeVries, Jennifer.  2011-09-22.  “‘Stingray’ Phone Tracker Fuels Constitutional Clash”.  Wall Street Journal.  (“How can we litigate in this case whether this technology that was used in this case violates the Fourth Amendment without knowing precisely what it can do?”)  http://www.wsj.com/articles/SB10001424053111904194604576583112723197574

 

[7a]  “Complaint for Relief Against Unauthorized Radio Operation and Willful Interference with Cellular Communications”, In re Baltimore City Police Dep’t, Baltimore, Md.  2016-08-16.  https://ecfsapi.fcc.gov/file/10816659216934/CS%20Simulators%20Complaint%20FINAL.pdf

[7b]  Farivar, Cyrus.  2014-06-20.  “Legal experts: Cops lying about cell tracking “is a stupid thing to do””.  Ars Technicahttp://arstechnica.com/tech-policy/2014/06/legal-experts-cops-lying-about-cell-tracking-is-a-stupid-thing-to-do/

[7c]  Joseph, George.  2016-10-18.  “Racial Disparities in Police ‘Stingray’ Surveillance, Mapped”.  CityLabhttp://www.citylab.com/crime/2016/10/racial-disparities-in-police-stingray-surveillance-mapped/502715/

 

[9a]  Orphanides, K.G.  2015-11-12.  “Ant colonies react to attack like a single ‘superorganism'”.  Wiredhttp://www.wired.co.uk/article/ant-colonies-react-to-attack-like-a-single-superorganism

[9b]  Tyson, Peter.  “Everyday Examples” (Emergence).  http://www.pbs.org/wgbh/nova/sciencenow/3410/03-ever-nf.html

[9c]  Casti, John L.  “Complexity”.  https://www.britannica.com/science/complexity-scientific-theory

 

[10a]  United States Code.  Office of the Law Revision Counsel.  http://uscode.house.gov/

[10b]  Electronic Code of Federal Regulations.  United States Government Publishing Office.  http://www.ecfr.gov/cgi-bin/ECFR

[10c]  United States Case Law.  Justia.  http://law.justia.com/cases/

[10d]  National Conference of State Legislatures.  2011-12-27.  “New Laws Ring in the New Year”.  http://www.ncsl.org/press-room/new-laws-ring-in-the-new-year.aspx

[10e]  Ritz, Erica.  2014-11-04.  “David Barton Explains How You Could Be Committing Three Felonies a Day”.  The Blazehttp://www.theblaze.com/stories/2014/11/04/david-barton-explains-how-you-could-be-committing-three-felonies-a-day/

[10f]  Farivar, Cyrus.  2015-06-05  “County sheriff warrantlessly used stingray 500+ times, claims to have no records”.  Ars Technicahttp://arstechnica.com/tech-policy/2015/06/county-sheriffs-warrantlessly-use-stingray-500-times-claim-to-have-no-records/

[10g]  Zetter, Kim.  2014-03-03.  “Florida Cops’ Secret Weapon: Warrantless Cellphone Tracking”.  Wiredhttps://www.wired.com/2014/03/stingray/

[10h]  Fenton, Justin.  2015-04-09.  “Baltimore Police used secret technology to track cellphones in thousands of cases”.  Baltimore Sunhttp://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html

[10i]  Lewis, Renee.  2014-08-28.  “Tacoma police use stingray system to sweep cellphone data”.  Al Jazeera Americahttp://america.aljazeera.com/articles/2014/8/28/tacoma-cell-surveillance.html

[10j]  Goldstein, Joseph.  2016-02-11.  “New York Police Are Using Covert Cellphone Trackers, Civil Liberties Group Says”.  New York Timeswww.nytimes.com/2016/02/12/nyregion/new-york-police-dept-cellphone-tracking-stingrays.html

[10k]  Glawe, Justin.  2015-03-31.  “Freddy Martinez Is Exposing Chicago Cops’ NSA-Style Surveillance Gear”.  Vicehttp://www.vice.com/read/stingrays-and-secrets-how-the-chicago-police-department-was-forced-to-come-clean-330

[10l]  Zetter, Kim.  2016-01-27.  “California Police Used Stingrays in Planes to Spy on Phones”.  Wiredhttps://www.wired.com/2016/01/california-police-used-stingrays-in-planes-to-spy-on-phones/

[10m]  Vielmetti, Bruce.  2016-02-01.  “Groups decry Milwaukee police’s warrantless use of ‘Stingray’ tracking”.  Journal Sentinelhttp://archive.jsonline.com/news/crime/groups-decry-milwaukee-polices-warrantless-use-of-Stingray-tracking-b99660842z1-367246261.html

[10n]  Dobbyn, Paula.  2016-08-18.  “City officials silent on cell phone tracking device bought by APD”.  KTUU NBC TV.  http://www.ktuu.com/content/news/Anchorage-police-use-of-cell-phone-tracking-device-clouded-in-secrecy-390617651.html

 

[12a]  Cox, Joseph.  2016-01-05.  “The FBI’s ‘Unprecedented’ Hacking Campaign Targeted Over a Thousand Computers”.  Motherboardhttp://motherboard.vice.com/read/the-fbis-unprecedented-hacking-campaign-targeted-over-a-thousand-computers

[12b]  Butler, Alan.  2013.  “When Cyberweapons End up on Private Networks:  Third Amendment Implications for Cybersecurity Policy”.  American University Law Reviewhttp://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1886&context=aulr

[12c]  Lipp, Kenneth.  2016-10-25.  “AT&T Is Spying on Americans for Profit, New Documents Reveal”.  Daily Beasthttp://www.thedailybeast.com/articles/2016/10/25/at-t-is-spying-on-americans-for-profit.html

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.