EPIC v. FBI - Stingray / Cell Site Simulator
- Court Permits Police Use of Phony Cell Phone Tower: A federal court in Arizona has denied a motion to suppress evidence gathered by "StingRay" surveillance technology. The court in United States v. Rigmaiden held that investigators did not violate the Fourth Amendment. The court also held that the government's use of a cell site simulator or StingRay device was supported by a "mobile tracking device" warrant. EPIC recently argued that users have a reasonable expectation of privacy in the location of their mobile devices, and has also received hundreds of pages of documents related to the FBI's use of StingRay technology. For more information, see EPIC v. FBI: StingRay and EPIC: State v. Earls. (May. 10, 2013)
- EPIC Sues FBI to Obtain Details of Massive Biometric ID Database: EPIC has filed a Freedom of Information Act lawsuit against the FBI to obtain documents about "Next Generation Identification", a massive database with biometric identifiers on millions of Americans. The EPIC lawsuit follows the FBI's failure to respond to EPIC's earlier FOIA requests for technical specifications and contracts. According to EPIC's complaint, "When completed, the NGI system will be the largest biometric database in the world." NGI aggregates fingerprints, DNA profiles, iris scans, palm prints, voice identification profiles, photographs, and other identifying information. The FBI will use facial recognition to match images in the database against facial images obtained from CCTV and elsewhere. For more information, see EPIC v. FBI - Next Generation Identification, EPIC: Biometric Identifiers and EPIC: Face Recognition. (Apr. 8, 2013)
- Court Rules for EPIC, Denies FBI Request for Delay in StingRay Case: A federal judge in Washington, DC today issued an Opinion denying the FBI's motion to delay the release of records sought under the Freedom of Information Act. The decision follows from a lawsuit filed by EPIC against the FBI for records about the agency's use of cell-site simulator technology, commonly referred to as "StingRay." These devices track cell phones and collect a vast amount of data from telephone customers. The Court found that the FBI was not facing the "exceptional circumstances" necessary to justify its proposed two-year delay. The Court ordered the agency to produce all records, except those subject to classification review, by August 1, 2013. For more information, see EPIC v. FBI - StingRay. (Mar. 28, 2013)
- EPIC Obtains New Documents About FBI Cellphone Tracking Technology: In the fifth interim release of documents in EPIC v. FBI, a Freedom of Information Act lawsuit, the agency has turned over nearly 300 pages about the surveillance technique directed toward users of mobile phones. The documents obtained by EPIC reveal that agents have been using "cell site simulator" technologies, also known as "StingRay," "Triggerfish," or "Digital Analyzers" to monitor cell phones since 1995. Internal FBI e-mails, also obtained by EPIC, reveal that agents went through extensive training on these devices in 2007. In addition, a presentation from the agency's Wireless Intercept and Tracking Team argues that cell site simulators qualify for a low legal standard as a "pen register device," an interpretation that was recently rejected by a federal court in Texas. For more information, see EPIC v. FBI (StingRay). (Feb. 12, 2013)
A StingRay is a device that can triangulate the source of a cellular signal by acting "like a fake cell phone tower" and measuring the signal strength of an identified device from several locations. With StingRays and other similar "cell site simulator" technologies, Government investigators and private individuals can locate, interfere with, and even intercept communications from cell phones and other wireless devices. The Federal Bureau of Investigation ("FBI") has used such cell site simulator technology to track and locate phones and users since at least 1995. Recently, federal investigators used a similar device to track down a suspect in an electronic tax fraud ring. This case, United States v. Rigmaiden, No 08-814, 2012 WL 1038817 (D. Ariz. Mar. 28, 2012), has brought the use of this cell phone surveillance technology under public scrutiny, as the Government attempts to shield the methods from discovery. See Order, id. As the Government's own documents make clear, the use of cell site simulator technology implicates not only the privacy of the targets in federal investigations, it also affects other innocent users in the vicinity of the technology.
On July 23, 2008 Daniel David Rigmaiden was indicted on various counts of conspiracy, wire fraud, and identity theft by U.S. Attorneys in Phoenix, Arizona. United States v. Rigmaiden, No. 08-814-PHX-DGC, 2010 WL 3463723 (D. Ariz. Aug. 27, 2010). Since his indictment, Defendant Rigmaiden has submitted various discovery motions seeking information about the investigatory techniques used to locate him. See Rigmaiden, 2010 WL 1039917. The Government opposed Defendant Rigmaiden's request for disclosure of techical specifications and other details about the technology. The Government relied on the testimony of an FBI Supervisor, who described the device as a pen register/trap and trace device. Aff. Supervisory Special Agent Bradley S. Morrison at 1, United States v. Rigmaiden, No. 08-cr-00814 (D. Ariz. Oct. 27, 2011). However, Agenty Morrison also made clear that all data is deleted after an operation because the devices may tend to pick up information “from all wireless devices in the immediate area of the FBI device that subscribe to a particular provider … including those of innocent, non-target devices.” Id. at 3.
In an attempt to avoid disclosure of documents related to this technology, the Government was willing to concede that the "actions it took during the air card locating mission were sufficiently intrusive to constitute a search under the Fourth Amendment if Defendant has a reasonable expectation of privacy." Rigmaiden, 2010 WL 1039917. However, the Government is not willing to concede that Defendant did have a reasonable expectation of privacy in the location of his laptop aircard (in his apartment). Id. As a result of the Government's unwillingness to disclose documents related to this invasive cell site simulator technology that impacts the privacy of innocent communications, EPIC filed a Freedom of Information Act ("FOIA") request in February 2012.
EPIC's Freedom of Information Act Request and Subsequent Lawsuit
In February 2012, EPIC submitted a FOIA request to FBI for:
- All documents concerning technical specifications of the StingRay device or other cell site simulator technologies;
- All documents concerning procedural requirements or guidelines for the use of StingRay device or other cell site simulator technologies (e.g. configuration, data retention, data deletion);
- All contracts and statements of work that relate to StingRay device or other cell site simulator technologies;
- All memoranda regarding the legal basis for the use of StingRay device or other cell site simulator technologies; and
- All Privacy Impact Assessments or Reports concerning the use or capabilities of StingRay device or other cell site simulator technologies.
The FBI sent a letter confirming the receipt of EPIC's FOIA request on February 21, 2012. THe FBI Records Management Division assigned a FOIPA Request No: 1182490-000.
EPIC v. FBI
- Complaint, EPIC v. FBI, No. 12-667 (D.D.C. Apr. 27, 2012).
- Answer, EPIC v. FBI, No. 12-667 (D.D.C. Jun. 13, 2012).
- Joint Status Report, EPIC v. FBI, No. 12-667 (D.D.C. Jun. 27, 2012).
- FBI Motion for an Open America Stay, EPIC v. FBI, No. 12-667 (D.D.C. Jul. 30, 2012).
- EPIC Memorandum in Opposition to FBI's Motion for an Open America Stay, EPIC v. FBI, No. 12-667 (D.D.C. Aug. 20, 2012).
- FBI Reply to EPIC's Memorandum in Opposition, EPIC v. FBI, No. 12-667 (D.D.C. Aug. 31, 2012).
- Court Denial of FBI's Motion for Open America Stay
- EPIC's FOIA Request (Feb. 10, 2012)
- FBI Acknowledgement (Feb. 16, 2012)
- EPIC's Administrative Appeal (Mar. 19, 2012)
- FBI FOIA Releases, EPIC v. FBI, No. 12-0667 (D.D.C.)
- First Release - October 3, 2012.
- Second Release - November 15, 2012.
- Third Release - December 7, 2012.
- Fourth Release - December 31, 2012.
- Fifth Release - February 7, 2013.
- Sixth Release - February 22, 2013.
- Seventh Release - February 28, 2013.
- Eighth Release - March 29, 2013.
- Ninth Release - April 30 2013.
- In re U.S., ___ F. Supp. 2d ___, 2012 WL 2120492 (S.D. Tex. 2012)
- United States v. Rigmaiden, 844 F. Supp. 2d 982 (D. Ariz. 2012)
- In re U.S., 727 F. Supp. 2d 571 (W.D. Tex. 2010)
- In re U.S., 622 F. Supp. 2d 411 (S.D. Tex. 2007)
- In re Pen Register, 396 F. Supp. 2d 747 (S.D. Tex. 2005)
- United States v. Garey, No. 03-cr-83, 2004 WL 2663023 (M.D. Ga. Nov. 15, 2004)
- In re U.S., 885 F. Supp. 197 (C.D. Cal. 1995)
Other Related Documents
- Government Opposition to Discovery Motion, United States v. Rigmaiden, No. 08-0814, 2012 WL 27600 (D. Ariz. Jan 5, 2012).
- Jennifer Valentino-DeVries, 'Stingray' Phone Tracker Fuels Constitutional Clash, Wall St. Journal - What They Know (Sept. 21, 2011, 10:30 PM EST)
- Kim Zetter, Feds’ Use of Fake Cell Tower: Did it Constitute a Search?, Wired - Threat Level (Nov. 3, 2011, 5:46 PM)
- Ryan Gallagher, FBI Accused of Dragging Feet on Release of Info About "Stingray" Surveillance Technology, Slate (Oct. 19, 2012, 4:00 PM)
- Ryan Gallagher, FBI Documents Shine Light on Clandestine Cellphone Tracking Tool, Slate (Jan. 10, 2013, 2:14 PM)