UNCOVERING THE SECRECY OF STINGRAYS - What Every Practitioner Needs to Know - American Bar Association

Page created by Brian Reynolds
 
CONTINUE READING
UNCOVERING THE SECRECY OF STINGRAYS - What Every Practitioner Needs to Know - American Bar Association
UNCOVERING
     THE SECRECY OF
     STINGRAYS
     What Every Practitioner Needs to Know

     NICOLE VALDES HARDIN

o       n a cold night in February 1995, federal agents and a
        computer hacker huddled together in a van. The hacker
        and the Federal Bureau of Investigation (FBI) sought
a different at-large fugitive hacker named Kevin Mitnick.
And they sought him using a device called the Triggerfish.
The hacker noted, “I was able to extract that the Triggerfish
was a five-channel receiver, able to monitor both sides of a
                                                                Shimomura, Catching Kevin, W ired (Feb. 1, 1996), https://
                                                                tinyurl.com/y76q8zw6.) The next time the public heard
                                                                mention of such a device would be 16 years later, in 2012.
                                                                   In 2013, when Edward Snowden revealed classified
                                                                surveillance programs by the United States government,
                                                                the revelations shook the country. But plenty of cell phone
                                                                surveillance by federal, state, and local law enforcement
conversation simultaneously.” The Triggerfish also pinpointed   long preceded the revelations. And that type of surveillance
Kevin Mitnick’s location, leading to his arrest. (Tsutomu       probably snared a client or two of practitioners—and no one

20                                                                               CRIMINAL JUSTICE nWinter 2018
UNCOVERING THE SECRECY OF STINGRAYS - What Every Practitioner Needs to Know - American Bar Association
had any idea.                                                      and searched for the strongest signal? That search caused the
   The name brand Stingray has become synonymous with              phone to check in with every cell tower in range to find the
international mobile subscriber identity (IMSI) catchers, also     strongest signal. All those towers the phone checked in with
known as cell-site simulators. Each cell phone has an IMSI,        “saw” that particular phone. All one needs for triangulation of
a unique number, usually 15 digits. The three components           a cell phone is the location of those cell towers that can “see”
within the assigned IMSI number are the mobile’s country           the phone—all of them. The more towers, the more accurate
code, the mobile’s network code, and the mobile subscriber’s       it is. The tower with the strongest signal is the one that the
identification number. The IMSI number is stored in the            phone will utilize, but all those other towers can also “see”
subscriber identity module (SIM) card located inside the           the phone as it moves. The tracking is akin to a Venn diagram,
phone.                                                             where the cell phone uses one tower while being in range and
   The Stingray is a specific IMSI catcher manufactured            “seeing” other towers. Those towers begin overlapping in a
by Harris Corporation and sold solely to military and law          smaller and smaller area, allowing the location of the cell
enforcement. But numerous IMSI catcher products exist to           phone to be tracked more accurately.
track unsuspecting cell phone customers. As criminal law               In traditional cell phone cases, the prosecution and law
practitioners, we must understand the tools law enforcement        enforcement often cannot triangulate because cell phone
routinely use, and the constitutional implications of that use.    companies only maintain records of the actual tower the cell
                                                                   phone used—until an IMSI catcher is deployed. An IMSI
HOW IMSI CATCHERS WORK                                             catcher works by mimicking a conventional cell phone tower.
The first step is to understand what an IMSI catcher is, and       A user’s phone connects to an IMSI catcher because it offers
what it can do. To understand the method used to locate cell       the strongest signal. The IMSI catcher then maintains the
phones, it is necessary to understand the basic way a cell         connection, allowing police to track the cell phone’s location
phone operates. In theory, when a cell phone is turned on, it      and leaving the cell phone owner none the wiser.
will search for the strongest signal and connect to that tower.        Prior IMSI catchers worked by exploiting a vulnerability
Other factors can change that basic assumption, but typically      in the country’s cell phone network. Though most newer cell
that occurs when a cell phone is turned on. Once the cell          phones use 4G and 3G networks, the base network in this
phone powers on, the mobile switch determines what cell            country is actually 2G. Cell phones operating in 2G cannot
tower will carry the call and assigns a vacant radio channel       authenticate cell towers, so IMSI catchers appear to be part
within that cell tower to take the conversation. The switch will   of an actual cellular network. Both 3G and 4G authenticate
select the cell tower to serve the phone based on measuring        cell towers, but IMSI catchers jam those networks and force
signal strength and connecting the cell phone to the strongest     cell phones onto the vulnerable 2G network. All cell phones
signal.                                                            are backward compatible—even the latest smartphones—
   When a cell phone is on the move, it uses multiple towers.      allowing the phone to function if it is taken to a rural location
When the cell phone handset moves from tower to tower, it is       or foreign country where the only service offered is 2G. Most
called a handoff or handover. Managing handoffs or handovers       phones are programmed to gracefully “fail over” to 2G when
is handled in a similar manner to when a cell phone is turned      a 3G or 4G connection appears unavailable.
on. The original tower handling the call sends a handoff               The 2G networks remain, particularly in rural areas, and so
request to the mobile switch after the signal drops below a        do the vulnerabilities, regardless of how recently a smartphone
certain threshold. The cell site makes several scans to confirm    was produced. (Stephanie Pell, We Must Secure America’s
this and then switches the call to the next cell. A person may     Cell Networks—From Criminals and Cops, Wired (Aug. 27,
drive 50 miles, use eight different cell phone towers, and         2014), https://www.wired.com/2014/08/we-must-secure-
never once realize that his or her call has been transferred.      americas-cell-networks-from-criminals-and-cops-alike/.)
At least, that is the goal of a cell phone company—seamless        Because companies moved away from the 2G network,
use for the phone user.                                            Harris Corporation released a new version of the Stingray
   When the phone company keeps the information of the             that can exploit 3G and 4G networks—the Hailstorm. (Tim
cell phone “checking in” with multiple towers, such as when        Cushing, Law Enforcement Agencies Scramble for Pricey
a user powers on his or her cell phone, that data then can         Cell Tower Spoofer Upgrades as Older Networks Are Shut
triangulate the cell phone’s location. After global positioning    Down, T ech D irt (Sept. 3, 2014), https://tinyurl.com/
system (GPS) tracking, triangulation is the most accurate way      y7z4nhhh.) The government obviously isn’t waiting for a
of locating a cell phone. The triangulation process is not that    new vulnerability—they already have one. And they are not
complicated. Remember when the cell phone was powered on           sharing the information.
                                                                       Because each cell phone has a unique IMSI number, police
 NICOLE VALDES HARDIN is an assistant federal defender             can enter that IMSI number into their device and simply
 in the Middle District of Florida, in the Tampa Division. She     follow the signal, triangulating a user’s location. But police
 is co-author of two publications attacking the science of cell    may instead just request the device search the area, netting
 phone tracking in criminal cases, and speaks nationwide on        hundreds to thousands of innocent users’ locations. IMSI
 tracking and surveillance by law enforcement. Ms. Hardin          catchers allow law enforcement to obtain detailed location
 is board certified in the area of criminal trial law.             information of cell phones normally unavailable from a cell
                                                                   phone company without a subpoena. But locating cell phones

CRIMINAL JUSTICE nWinter 2018                                                                                                   21
turns out to be only the tip of the iceberg. Despite assurances      eventually winning release. (Nathan Freed Wessler, Victory:
from various law enforcement agencies that the devices are           Judge Releases Information about Police Use of Stingray Cell
used only to locate a cell phone, the machines have far greater      Phone Trackers, ACLU (June 3, 2014), https://tinyurl.com/
capabilities. As noted earlier, the Stingray’s predecessor           ybztyfr2.) The officer also testified that “[u]sing portable
Triggerfish had the capability to monitor the content of calls       equipment we were able to actually basically stand at every
way back in 1995, 22 years ago.                                      door and every window in that complex and determine,
   In December 2015, a source in the intelligence community          with relative certainty you know, the particular area of the
grew concerned at the immense surveillance capability of law         apartment that that handset was emanating from.” (Transcript
enforcement. Acting on the concern, the source gave a copy of        of Motion Hearing at 15, State v. Thomas, No. 2008-CF-3350A
an IMSI catcher device catalog to The Intercept. The catalog         (Fla. Cir. Ct. Aug. 23, 2010), https://tinyurl.com/y9t2k9fj.)
contained numerous machines with far greater capabilities            Such use pales in comparison to other jurisdictions such as
than previously known.                                               Baltimore, where a detective admitted to the secret use of an
                                                                     IMSI catcher on at least 4,300 occasions since 2007. (Justin
                                                                     Fenton, Baltimore Police Used Secret Technology to Track
     A few of the devices can house a “target list” of as many       Cellphones in Thousands of Cases, Balt. Sun, Apr. 9, 2015.)
     as 10,000 unique phone identifiers. Most can be used to            Despite the Tallahassee officer’s physically holding the
     geolocate people, but the documents indicate that some          Stingray up to every window, the use was undisclosed—a
     have more advanced capabilities, like eavesdropping             commonplace occurrence. When law enforcement purchases
     on calls and spying on SMS messages. Two systems,               IMSI catchers, something else comes with the devices: a
     apparently designed for use on captured phones, are             nondisclosure agreement, which law enforcement signs
     touted as having the ability to extract media files,            to procure the IMSI catcher. The agreements explicitly
     address books, and notes, and one can retrieve deleted          prohibit law enforcement agencies from telling anyone,
     text messages.                                                  even judges, about their use of the secretive equipment. The
                                                                     agreement is a contract, signed by Harris Corporation and
                                                                     local law enforcement officials, and the agreement mandates
(Jeremy Scahill & Margot Williams, Stingrays: A Secret               extraordinary restrictions. For example:
Catalogue of Government Gear for Spying on Your Cellphone,
I ntercept (Dec. 17, 2015), https://tinyurl.com/hfzrms6.)
    The Intercept released the catalog to the public through            The [law enforcement agency] shall not, in any civil
its website. (Government Cellphone Surveillance Catalogue,              or criminal proceeding, use or provide any information
Intercept (Dec. 17, 2015), https://tinyurl.com/jxlx5lj.) Not to         concerning the Harris Corporation wireless collection
be outdone, Meganet Corporation advertises an IMSI catcher              equipment/technology . . . including, but not limited to,
called the VME Dominator. Among the Dominator’s attributes              during pre-trial matters, in search warrants and related
are interception of voice and text, voice manipulation, and             affidavits, in discovery, in response to court ordered
text intercept and modification, as well as calling and sending         disclosure, in other affidavits, in grand jury hearings,
text on behalf of the user. (VME—Cell Phone Interceptors,               in the State’s case-in-chief, rebuttal, or on appeal, or in
M eganet C orp ., https://tinyurl.com/m643ebu (last visited             testimony in any phase of civil or criminal trial, without
Dec. 3, 2017).)                                                         the prior written approval of the FBI.

SECRECY AND NONDISCLOSURE AGREEMENTS
An IMSI catcher can be found in vehicles, on drones, and even        (Letter from Christopher M. Piehota, Special Agent in Charge,
in the arms of officers. In a case in Tallahassee, Florida, police   FBI, to Scott R. Patronik, Chief, Erie Cty. Sheriff’s Office
entered an apartment during an investigation while tracking          (June 29, 2012), https://tinyurl.com/yahslj62.)
a stolen cell phone. Police knocked on the door and asked to            Additional provisions include that the agency will “at
enter. The suspect’s girlfriend cracked the door and refused         the request of the FBI, seek dismissal of the case in lieu
to let them in. Police pushed the door open and searched the         of using or providing, or allowing others to use or provide,
apartment, eventually locating the stolen cell phone. During         any information concerning the Harris Corporation wireless
a motion to suppress, defense counsel asked police how they          collection equipment/technology, its associated software,
tracked the phone. The officer refused to answer the question,       operating manuals, and any related documentation.” (FDLE-
causing the judge to force an answer. However, that answer           FBI Non-Disclosure Obligations/Guidelines (Mar. 8, 2012),
came only after the judge closed the courtroom and sealed            https://tinyurl.com/y97v4anj.) And if the police think a
the transcript of the proceedings.                                   prosecutor is “considering” including such information in
   On appeal, one of the appellate judges questioned the             a trial, they must notify the FBI, to allow the FBI sufficient
state about the use of the IMSI catcher, noting that as of           time to intervene and prevent disclosure.
2010 the Tallahassee Police Department had used Stingrays               Citing nondisclosure agreements, law enforcement
a staggering 200 times without ever disclosing their use to          routinely cover up the use of IMSI catchers. In the rare case
any judge. The American Civil Liberties Union (ACLU) got             where law enforcement gets caught using the devices, charges
involved, filing demands for the release of the transcript,          become reduced and even dismissed rather than divulging

22                                                                                     CRIMINAL JUSTICE nWinter 2018
information on the devices. In 2014 in Sarasota, Florida, an        catcher use because it is a basic or simple case. IMSI catchers
officer mistakenly listed the use of an IMSI catcher on a           have been deployed in trivial and routine matters. Prior cases
sworn probable cause document. The ACLU successfully won            with documented use involve a stolen cell phone from an
their public records request, and the records were set aside        unlocked vehicle, a broken car window, and check forgery.
for them at the local police station. But when the ACLU             (Brad Heath, Police Secretly Track Cellphones to Solve
attempted to pick up the records, they were gone, seized by the     Routine Crimes, USA T oday , Aug. 23, 2015.) While police
US Marshals Service. The US Marshals claimed the records            normally use the devices for suspects, no one is immune—
were federal property after deputizing the state detective,         released documents show police have used the devices to also
and federal records were not subject to a state public records      track down witnesses. “We’re out riding around every day,” said
order. The records were moved to an undisclosed location, and       one officer, who spoke on the condition of anonymity because of the
have never been released. (Kim Zetter, U.S. Marshals Seize          department’s nondisclosure agreement with the FBI. “We grab a lot of
Cops’ Spying Records to Keep Them from the ACLU, Wired              people, and we close a lot of cases.” (Id.) Various organizations post
(June 3, 2014), https://tinyurl.com/ycuuntlm.)                      maps showing confirmed acquisition of an IMSI device by police.
    In other cases where IMSI catcher use surfaced, criminal        But it is safer to assume that local police have the device and use it
cases rapidly changed. On October 28, 2013, in Saint Louis,         far more than is known.
seven people were victims of armed robbery during a two-
hour spree. One day before an officer was scheduled for a           IMSI CATCHERS AND THE LAW
deposition involving the use of an IMSI catcher, all charges        Case law remains scant for IMSI catchers, due to decades of intensive
were dismissed. A victim, who was pistol-whipped in one             concealment. State legislatures lead the charge in requiring warrants,
robbery and required 18 stitches, reporting being “shocked”         citing privacy concerns—at least 13 states passed laws requiring
when prosecutors told him the charges were dropped because          warrants to track cell phones in real time: Arizona, California,
“legal issues” had developed. (Robert Patrick, Controversial        Colorado, Illinois, Indiana, Maine, Minnesota, Montana, New
Secret Phone Tracker Figured in Dropped St. Louis Case,             Hampshire, Utah, Virginia, Washington, and Wisconsin. The
S t . L ouis T oday , Apr. 19, 2015.) In Baltimore, Maryland,       Department of Justice’s (DOJ’s) policy evolved slowly, beginning
an officer refused to answer questions under oath about             in 1997 with interpreting the law to permit unmediated surveillance
tracking devices. After a judge threatened to hold the officer      without the necessity of a pen register or trap and trace order. (Pen
in contempt of court, prosecutors withdrew key evidence             registers record telephone numbers, e-mail addresses, and other
in a homicide case rather than disclosing the use of an             dialing, routing, addressing, or signaling information, while trap and
IMSI catcher. (Justin Fenton, Judge Threatens Detective             trace devices record similar information received by such instruments
with Contempt for Declining to Reveal Cellphone Tracking            or facilities. Use of a pen register or a trap and trace device requires
Methods, Balt. S un , Nov. 17, 2014.)                               only a court order, based on a law enforcement officer’s declaration
    Perhaps the closest a defense attorney got to viewing an        that the information is relevant to an ongoing investigation.) In
actual Stingray happened in Tallahassee, Florida. After the         2005, the DOJ adopted the position that the pen register and trap
prior exposure of Stingray use, defense attorneys convinced         and trace device statute, as amended by the 2001 PATRIOT Act,
a judge to issue a subpoena duces tecum to view the machine,        “appears to encompass all of the non-content information passed
and access the manuals for the device. The case involved            between a cell phone and the provider’s tower.” (Dep’t of Justice,
armed robbery, a life felony in Florida. Rather than revealing      Electronic Surveillance Manual: Procedures and Case Law
the device as required by the court order, prosecutors offered      Forms 46 (2005), https://tinyurl.com/yby2ppy6.) The current
the client six months’ probation in exchange for pleading           policy, issued on September 3, 2015, now requires a warrant
guilty to a second-degree misdemeanor, the lowest-degree            for IMSI catcher use. (Press Release, Dep’t of Justice, Justice
crime in the state. (Ellen Nakashima, Secrecy Around Police         Department Announces Enhanced Policy for Use of Cell-Site
Surveillance Equipment Proves a Case’s Undoing, W ash .             Simulators (Sept. 3, 2015), https://tinyurl.com/hfvds85.)
P ost, Feb. 22, 2015.)                                                  Courts, unfortunately, are slower to catch up. Not too many
    Suffice it to say, practitioners will not receive notice if     courts directly address the Stingray, partly because the government
police deployed cell phone surveillance in their case. Quite        masks the applications in pen register requests. In Daniel
the opposite—recognizing its use takes constant vigilance and       Rigmaiden’s case, the use of an IMSI catcher was deployed to
sometimes luck. IMSI catchers, after all, are undetectable. A       track him through his airbus card in his computer. (United States
practitioner’s analysis begins with the origin of the stop or       v. Rigmaiden (Rigmaiden II), No. CR 08-814-PHX-DGC, 2013
police contact. If the police pull over a client or find a client   WL 1932800 (D. Ariz. May 8, 2013).) The card used cellular
in a place they would not know about, dig. For example, in a        data to connect to the Internet. The interesting part is that the
prior initial meeting with a client, the arrest location seemed     DOJ conceded that its behavior required a warrant because the
strange. When asked if the apartment belonged to a friend, the      tracking was within a private space. The court found that because
client remarked that he had never been to the apartment before      there was probable cause for a warrant, it did not matter how the
that night. Such reports should raise a red flag. Practitioners,    tracking happened.
doing cases day in and day out, should trust their gut. If it           United States v. Lambis became the first federal court decision
seems off or does not add up, work the case as if something         to decisively rule that a search warrant is required to deploy an
is off—it probably is.                                              IMSI catcher. (197 F. Supp. 3d 606 (S.D.N.Y. 2016).) US District
    Do not assume that a case is an unlikely candidate for IMSI     Judge William Pauley in the Southern District of New York ruled

CRIMINAL JUSTICE nWinter 2018                                                                                                          23
that defendant Raymond Lambis’s rights were violated when the            use by law enforcement. Practitioners dragging these cases into
US Drug Enforcement Administration (DEA) used such a device              the light remains the only hope of receiving meaningful judicial
without a warrant to find his Washington Heights apartment.              review of the practice.
The DEA had used a Stingray to identify Lambis’s apartment                  Despite IMSI catchers being around for decades, due to their
as the most likely location of a cell phone identified during a          hidden use, the technology remains new to courts. Unlike other
drug trafficking probe. Judge Pauley said doing so constituted an        forensic disciplines, such as fingerprints, DNA, and eyewitness
unreasonable search. “Absent a search warrant, the Government            identification, IMSI catcher case law does not arrive with reams of
may not turn a citizen’s cell phone into a tracking device.” (Id.        established case law. Knowing and understanding the technology
at 611.)                                                                 are the first steps in recognizing and fighting the secret use of
   The other recent case that dealt with an IMSI catcher punted          IMSI devices by law enforcement. Practitioners are in a unique
on the IMSI catcher question. The Seventh Circuit in United              position to shape the discussion on the intersection of the Fourth
States v. Patrick involved the police first telling Mr. Patrick they     Amendment, privacy, and technology—and possible change
had relied on information obtained from an anonymous source              Fourth Amendment jurisprudence for generations. n
to find him sitting in the passenger seat of a car parked in an
alley in Milwaukee. (842 F.3d 540 (7th Cir. 2016).) Officers
finally admitted to using a Stingray. The government argued that
they had an arrest warrant so there was no Fourth Amendment
violation. The court said the arrest and tracking took place in
public with a valid warrant and thus was not a violation of the
Fourth Amendment. The court declined to wade into the privacy
and Fourth Amendment issues any more than necessary, writing:

     Questions about whether use of a simulator is a search, if so
     whether a warrant authorizing this method is essential, and
     whether in a particular situation a simulator is a reasonable
     means of executing a warrant, have yet to be addressed by
     any United States Court of Appeals. We think it best to
     withhold full analysis until these issues control the outcome
     of a concrete case.

(Id. at 545.)
   On the state court level, appellate level courts diverged. The
Supreme Court of Wisconsin held that a pen register order was
good enough, while the Court of Appeals for both Maryland
and the District of Columbia held that’s IMSI catchers require
a warrant. (See Wisconsin v. Tate, 849 N.W.2d 798 (Wis. 2014),
cert. denied, 135 S. Ct. 1166 (2015); State v. Andrews, 134 A.3d
324, 348 (Md. Ct. Spec. App. 2016); Jones v. United States,
168 A.3d 703 (D.C. 2017).) Wisconsin’s decision lacks real-
world application though—the state legislature responded with
legislation requiring a warrant, rendering the court decision moot.

A NEW FRONTIER
Many argue, convincingly, that the United States Supreme Court’s
Fourth Amendment rulings lag behind technological advances.
However, recent cases give hope that the Court may rectify the
lapse. In the past five years, the Court ruled on location in 2012 and
cell phone searches in 2014, and is finally poised to rule on location
tracking through historical cell-site records in their October 2017
term. (See United States v. Jones, 565 U.S. 400 (2012); Riley v.
California, 134 S. Ct. 2473 (2014); United States v. Carpenter,
819 F.3d 880, 887–90 (6th Cir. 2016), cert. granted, 137 S. Ct.
2211 (2017).) It seems inevitable that an IMSI catcher case winds
its way up to the highest court. Unlike other technologies though,
IMSI catchers are not that new. The failure of getting case law on
the devices directly results from the relentless cover-up of their

24                                                                                          CRIMINAL JUSTICE nWinter 2018
You can also read