Home
Subscribe (free)
About NaturalNews
Contact Us
Write for NaturalNews
Media Info
Advertising Info

CONFIRMED: Stingray devices used illegally by IRS and other federal agencies can record phone calls after all


Stingray devices

Most Viewed Articles
http://www.naturalnews.com/051944_stingray_devices_violation_of_privacy_ACLU.html
Delicious
diaspora
Print
Email
Share

(NaturalNews) For the past several years, the Obama administration has been fighting against transparency calls in a bid to hide details about the government's use of so-called "stingray" surveillance technology from the general public.

The devices, which we have reported on here and here, are designed to conduct covert surveillance by simulating cell phone towers in order to trick nearby mobile phones into connecting to them to reveal the phone's (and the user's) locations. Talk about monitoring someone.

Now, as reported by Wired magazine in online editions, newly released documents confirm what privacy advocates long believed: the controversial devices are also able to record the phone numbers of a mobile phone's incoming and outgoing calls and intercept the actual content of voice and text communications.

In addition, the documents reveal that there is the possibility of flashing a phone's firmware "so that you can intercept conversations using a suspect's cell phone as a bug."

Wired notes:

The information appears in a 2008 guideline prepared by the Justice Department to advise law enforcement agents on when and how the equipment can be legally used.

The American Civil Liberties Union's Northern California chapter obtained the documents at long last[PDF] following a protracted legal fight involving a two-year public records request. Included in the documents are not only guidelines involving policy but also templates for submitting surveillance requests in order to get permission to deploy the interceptors.

Government has "resorted to extreme measures to prevent disclosure"

The Department of Justice admits in the documents that the use of the Stingrays to locate cell phones "is an issue of some controversy" but it does not elaborate on the nature of that controversy (which, of course, is limitless, warrantless surveillance). In the interim, civil rights organizations such as the ACLU have been warring with the government since 2008 to get information about how the Feds are using the technology and what authority provides them the powers to do so.

As Natural News has reported, local law enforcement agencies in Chicago and elsewhere have used Stingrays on a number of occasions. From our April 22 report:

Federal, state and local governments are increasingly doing all that they can to hide their activities from the citizenry paying them to serve.

The latest example comes from the Chicago Police Department -- the same one with a secret "black site," Constitution-free interrogation facility -- where officials are fighting to keep hidden information regarding how, when and where officers employ covert cell phone tracking systems.


As we noted and as Wired reports, these uses often occurred in secret without departments first obtaining court orders as required by the Fourth Amendment. Sometimes, departments (and, most probably, the federal government) deceived courts about the nature of the technology in order to get the authority to use it, the newly released documents show.

"And they've resorted to extreme measures to prevent groups like the ACLU from obtaining documents about the technology," Wired added.

Trove of data can be stolen

A stingray might also be called different names, such as a cell-site simulator, triggerfish, IMSI-catcher, Wolfpack, Gossamer and swamp box, the documents noted. The devices can be employed to intercept the locations of cell phones, computers that are using open wireless networks, and PC wireless data cards, which are also called air cards.

The devices are about the size of a small suitcase and they work by emitting a signal that is stronger than nearby cell towers in order to force phones or mobile devices to connect to them instead of real cell towers.

Once phones connect, they reveal their unique device identification. The Stingrays later release the phones so they can connect to legitimate towers, thereby allowing data and voice calls to go through.

Besides learning a device ID, the Stingrays can also collect a trove of additional electronic data and information.

Sources include:

Wired.com

ACLUNC.org

NaturalNews.com

Join the Health Ranger's FREE email newsletter
Get breaking news alerts on GMOs, fluoride, superfoods, natural cures and more...
Your privacy is protected. Unsubscribe at any time. | Learn more...

More news on stingray devices



comments powered by Disqus

The War on Independent Media Has Begun

A coordinated censorship attack is being waged against the entire independent media by Google, YouTube and Facebook. After we were banned by Google for nearly a week, now Facebook is deliberately blocking the sharing of our stories to further censor our important reporting for human freedom and medical choice. Soon, the only way we will be able to reach you is via email, and Google is sometimes blocking our email delivery to gmail users.

Enter your email address below to subscribe to our email announcement list (but don't use gmail). Your privacy is protected and you can unsubscribe at any time. If you don't join our email list, you may never see our valuable content again via Facebook, Google or YouTube. CENSORSHIP has now reached EXTREME levels across the 'net. The truth is being suffocated. Subscribe now if you want to escape the delusional bubble of false reality being pushed by Google and Facebook.

Once you click subscribe, we will send you an email asking you to confirm your free subscription.