The Center for Investigative Reporting has recently told you about how local law enforcement agencies in California are using emerging technology – such as license-plate scanners and facial recognition software – to collect citizens’ data in new ways. But did you know the extent to which police can tap directly into information about your cellphone?
A new investigation by USA Today and Gannett offers a window into the new technologies and tactics police are using to bulk collect cellphone data. Their reporting reveals how many law enforcement agencies use a device that impersonates a cellphone tower – called a Stingray – to capture location and activity information from cellphones in the area.
Of 125 police agencies in 33 states that were reviewed by USA Today and Gannett, at least 25 own a Stingray. Most of the devices were purchased through federal antiterrorism grants, which have helped fund an array of high-tech, combat-ready gear for state and local police.
One in four police agencies analyzed also have used a tactic called a “tower dump” to obtain data on the identity, activity and location of any phone that connects to an individual cellphone tower over a set timespan. While police say the data can assist in solving and preventing crimes, USA Today also highlights a few cases in which data collection has been abused. In Minnesota, for example, state auditors found that 88 police officers across the state improperly looked up Minnesotans’ driver’s license information without authorization or relevance to an investigation last year.
As part of Gannett’s investigation, The Desert Sun surveyed how Southern California law enforcement agencies have collected cellphone data. See the infographic on its website for a breakdown of how the technology works.
What are the legal implications for bulk collection of cellphone data? As USA Today points out, they’re fuzzy, and privacy advocates have questioned the legal standards. Last year, CIR reporter G.W. Schulz highlighted a court brief filed by the Electronic Frontier Foundation and American Civil Liberties Union of Northern California that argued that Stingrays are “highly intrusive and indiscriminate.”
But as the technology is deployed, states are responding in different ways. Montana and Maine passed laws requiring police to show probable cause and get a search warrant to obtain some cellphone data this year, while California Gov. Jerry Brown vetoed a similar measure last year. See ProPublica’s overview of data collection laws for a look at state-level developments.
USA Today’s investigation comes on the heels of new revelations that the National Security Agency is gathering nearly 5 billion cellphone location records a day, as reported by The Washington Post.
Republish this article
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Republish Our Content
Thanks for your interest in republishing a story from Reveal. As a nonprofit newsroom, we want to share our work with as many people as possible. You are free to embed our audio and video content and republish any written story for free under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 license and will indemnify our content as long as you strictly follow these guidelines:
-
Do not change the story. Do not edit our material, except only to reflect changes in time and location. (For example, “yesterday” can be changed to “last week,” and “Portland, Ore.” to “Portland” or “here.”)
-
Please credit us early in the coverage. Our reporter(s) must be bylined. We prefer the following format: By Will Evans, Reveal.
-
If republishing our stories, please also include this language at the end of the story: “This story was produced by Reveal from The Center for Investigative Reporting, a nonprofit news organization. Learn more at revealnews.org and subscribe to the Reveal podcast, produced with PRX, at revealnews.org/podcast.”
-
Include all links from the story, and please link to us at https://www.revealnews.org.
PHOTOS
-
You can republish Reveal photos only if you run them in or alongside the stories with which they originally appeared and do not change them.
-
If you want to run a photo apart from that story, please request specific permission to license by contacting Digital Engagement Producer Sarah Mirk, smirk@revealnews.org. Reveal often uses photos we purchase from Getty and The Associated Press; those are not available for republication.
DATA
-
If you want to republish Reveal graphics or data, please contact Data Editor Soo Oh, soh@revealnews.org.
IN GENERAL
-
We do not compensate anyone who republishes our work. You also cannot sell our material separately or syndicate it.
-
You can’t republish our material wholesale, or automatically; you need to select stories to be republished individually. To inquire about syndication or licensing opportunities, please contact Sarah Mirk, smirk@revealnews.org.
-
If you plan to republish our content, you must notify us republish@revealnews.org or email Sarah Mirk, smirk@revealnews.org.
-
If we send you a request to remove our content from your website, you must agree to do so immediately.
-
Please note, we will not provide indemnification if you are located or publishing outside the United States, but you may contact us to obtain a license and indemnification on a case-by-case basis.
If you have any other questions, please contact us at republish@revealnews.org.