Houston PD conceals Stingray use details from prosecutors, citing NDA; warrant for cell-phone location data bill filed
"For about seven years, the Houston Police Department has owned devices that can trick your cellphone into sharing its location and call log by pretending to be a cell tower," reported Karen Chen at the Houston Chronicle (Feb. 27).
But little is known about how they are deployed, only what they are capable of: telling law enforcement where you are and to whom you've been talking.
In Texas, police are not required to obtain a warrant before using a Stingray, and the net is indiscriminate. The devices sweep up all nearby information, regardless of whether the cellphone is involved in a crime.
Your correspondent was quoted briefly in the story. The most interesting news was something told to me several weeks ago by the Harris DA's office, but made public in this story for the first time: That the Houston PD refuses to tell even the District Attorney's office, much less local judges, what they're doing with this technology, citing a non-disclosure agreement with the Harris Corporation which makes the device.
Harris County prosecutor Bill Exley said the arrangement doesn't put people's minds at ease. As far as he is aware, Stingrays do not amount to wiretaps, which reveal the content of what's being communicated. That said, Exley said, the nondisclosure agreement has prevented him, too, from knowing what exactly Stingrays are capable of or being used for. He said he has never offered evidence in court that was produced by a Stingray.
HPD has told him that Stingrays are most useful in catching fugitives.
"If there's a warrant for your arrest, the cops should be able to do anything lawful to find you," Exley said. "The question becomes, at what level do you start requiring police officers to ask judges so they can do things they are otherwise legally able to do?"
Exley said as far as he knows the Stingrays aren't wiretapping. But the truth is, the Stingray captures private calls and routes them through a fake cell phone tower operated by the police, and that includes call content as well as metadata. So we have nothing but HPD's say so to support the assertion that they're not accessing content, it's not because the technology they have isn't capable of doing so. If "trust us, we're the government" is good enough for you, you ought to be okay with this.
http://gritsforbreakfast.blogspot.co...ngray-use.html
other PDs have adminted stingrays can disrupt non-targeted connections.