Maryland Court Says Cops Need Warrants To Deploy Stingray Devices
from the pokes-some-very-nice-holes-in-the-Third-Party-Doctrine-as-well dept
The Baltimore Police Department’s warrantless deployment of Stingray devices has come to an end. It may have gotten away with more than 4,300 times so far, but the Maryland Special Appeals Court has declared these devices operate as searches under the Fourth Amendment.
The 74-page opinion — which belatedly follows its two-page order from nearly a month ago, indicating which side it had taken in this dispute — dives into every issue implicated by the warrantless use of Stingray devices and examines them alongside a long list of Fourth Amendment-related Supreme Court decisions and the Fourth Circuit Appeals Court’s precedent-setting US v. Graham opinion on cell site location info.
The court rejects the government’s arguments that location data is something cell phone users “share with the world,” along with its Third Party Doctrine assertions. It does this by using the government’s own testimony against it. The government maintained the defendant willingly shared location data and other info with the phone company by turning his phone on and using it. But, according to its own statements, the defendant “willingly shared” nothing. In fact, if he had been using his phone to make a call, it’s likely the PD would not have been able to locate him.
[DEFENSE COUNSEL]: So, how do you get information about where the phone is on the machine?
[DETECTIVE HALEY]: Because when it captures that identifier that you put into the machine or the equipment, it then tells you — it looks like a clock on the equipment. And it tells you where the signal’s coming from, like 12, 1, 2, 3 o’clock (indicating). And it will give you like a reading. Like if it says 1:00 at like an 80, well, then you know that you’re kind of close to it. But if it says 1:00 at like a 40, then you know that you’re probably within, I don’t know, probably, you know, 20 yards of it.
[DEFENSE COUNSEL]: The person doesn’t have to be using their phone for you to get that information, do they?
[DETECTIVE HALEY]: Actually, if they’re on their phone, then they’re already connected to — in this case, the Sprint network. And we’re not going to be able to pull them off of that until they’re — until they hang — until they hang the call up.
[…]
[DEFENSE COUNSEL]: When I am not on my phone, you will drive by my house, and you will get a signal from my phone indicating where I am, right?
[DETECTIVE HALEY]: Correct.
[DEFENSE COUNSEL]: If I am using the phone, you won’t get that signal, right?
[DETECTIVE HALEY]: Correct.
[DEFENSE COUNSEL]: So, the phone cannot be in use. You are searching for my phone as you’re driving through my neighborhood, right?
[DETECTIVE HALEY]: Yes.
[DEFENSE COUNSEL]: And in order to get to my phone, you are sending an electronic signal into my house, right?
[DETECTIVE HALEY]: Yes.
As the court notes, this is far from the passive acquisition of information the government has portrayed it as.
[I]t is clear from Det. Haley’s testimony that “the Hailstorm equipment acts like a cell tower,” but, unlike a cell tower awaiting incoming signals, the Hailstorm is an active device that can send an electronic signal through the wall of a house and “draw[] the phone to [the] equipment.”
The government sought to compare this to warrantless physical surveillance utilizing a beeper for tracking. The court finds nothing comparative in the two cases.
Here, there was no visual surveillance. The mere fact that police could have located Andrews within the residence by following him as he travelled over public thoroughfares does not change the fact that the police did not know where he was, so they could not follow him. Unlike Knotts, the information obtained in this case did reveal at least one critical detail about the residence; i.e., that its contents included Andrews’s cell phone, and therefore, most likely Andrews himself. Further, “pings” from Andrews’s cell phone to the nearest tower were not available “to anyone who wanted to look.”
Further dismantling the government’s notions about cell phone users being nothing more than convenient generators of a wealth of third-party records, the court notes Andrews performed no “affirmative” action.
In the present case, there was no affirmative act like “dialing.” This is made abundantly clear by Det. Haley’s testimony stating that “if they’re on the phone, then they’re already connected to . . . the [] network[, a]nd we’re not going to be able to pull them off of that until . . . they hang up the call.” Det. Haley’s testimony reveals that, in the event that an individual is actively using the cell phone to knowingly transmit signals to nearby cell towers, the cell site simulator will not be able to access the phone.
The pin-point location information that led to finding Andrews was obtained directly by law enforcement officers and not through a third-party. It is not the case that Andrews’s cell phone transmitted information to the service provider that was then recorded and shared with law enforcement. Thus, it cannot be said that Andrews “assumed the risk” that the information obtained through the use of the Hailstorm device would be shared by the service provider as in Smith. The function of the Hailstorm device foreclosed that possibility.
Having taken apart the government’s Third Party assertions, the court examines the search under the Fourth Amendment and finds the use of Stingray devices to track individuals in real-time by sending signals into residences to be invasive enough to require the use of warrants.
The court also takes time to point out the PD’s evasive behavior — supposedly “justified” by the FBI’s standard Stingray-device nondisclosure agreements.
The analytical framework requires analysis of the functionality of the surveillance device and the range of information potentially revealed by its use. A nondisclosure agreement that prevents law enforcement from providing details sufficient to assure the court that a novel method of conducting a search is a reasonable intrusion made in a proper manner and “justified by the circumstances,” obstructs the court’s ability to make the necessary constitutional appraisal.
And it wasn’t just the magistrate judge signing the pen register order that was cut out of the loop by the NDA. It was the defendant and his representation. In addition to the very belated notification about the technology used to locate the defendant, there was also a Brady violation.
On November 3, 2014, defense counsel filed a supplemental discovery request seeking, inter alia, “[a]ll evidence indicating how Andrews was located at 5032 Clifton Avenue.” The State’s response to that request, dated January 8, 2015, stated, “[a]t this time the State does not possess information related to the method used to locate [Andrews] at 5032 Clifton Avenue.” However, five months later defense counsel received an email from the Assistant State’s Attorney (“ASA”) assigned to the case indicating that it was her understanding that “the ATT used a stingray to locate[] your client via his cell phone,” but she was waiting for “the paperwork.” The next day, May 7, the ASA also notified defense counsel of exculpatory evidence in the form of a negative photo array that was conducted the previous January.
This all adds up to the Baltimore PD having all evidence obtained from its search warrant thrown out as “fruit of the poisonous tree,” thanks to its reliance on the use of a Hailstorm IMSI catcher to locate the suspect. The PD will no longer be able to use pen register orders to deploy the technology and won’t be allowed to hide its use from the courts or defendants because each warrant application must provide details on the methods and tech to be used to perform the search.
This won’t change much for the rest of the nation, as it only affects the state of Maryland, but it does apply the judicial brakes to one of the nation’s heaviest users of cell tower spoofers. Thanks to its very thorough examination of the issues at stake in light of several major decisions related to the Fourth Amendment and Third Party Doctrine, it will likely be referenced and cited by defense lawyers around the nation during suppression motions related to Stingray use.
Filed Under: fourth amendment, law enforcement, maryland, privacy, stingray
Comments on “Maryland Court Says Cops Need Warrants To Deploy Stingray Devices”
As if the police will care
I sort of suspect that the police will continue to use their toys, and just find other ways to claim that they got their information.
Newest terrorist profile
Great news,
After this court ruling has disclosed the capabilities of the device. The government has revised it’s terrorist watch list. All individuals who now use their cell phones are evil terrorist. Why else have a phone.
Re: Newest terrorist profile
The government has revised it’s terrorist watch list. All individuals who now use their cell phones are evil terrorist.
Also, all individuals who do not use a cell phone are put on the list because they are clearly evading law enforcement.
The devices aren't even legal
According to the fcc filings, they were intended to only be used in extreme emergencies. Instead we find them being used not only for locating people in danger of losing their life, but for things like theft, loveint along with whatever the local PD can think of. These are spy tools being used with no oversight and the creators should be barred from ever doing business in this country again.
… so the criminals in the Baltimore Police Dept will receive absolutely NO punishment or criminal prosecution– despite proven, large scale criminal violations of warrant requirements.
Pretty standard in America — the cops are above the law… and have little incentive to obey the law.
Re: Re:
While it doesn’t’ even come close to being enough, these days about the ‘harshest’ punishment police or government agencies typically face is along the lines of “You’re no longer allowed to use this toy or it’s resulting evidence openly in court, find another excuse for the evidence you get when you continue to use it anyway.”
So, if the reason why they don’t need a warrant is because everyone knows what information they’re giving up by using a cell phone, then why does the Department of Justice have non-disclosure agreements trying to hide exactly what the Stingrays do? Seems like a rather obvious fact that the NDAs are based on the exact opposite of what they’re claiming in this case.
So the Hollywood trope of keeping a suspect on the phone long enough to trace their location on landline phones is reversed when it comes to cell phone tracking? The “bad guys” now have to try to stay on the call as long as possible without the connection being dropped to avoid being located?
Re: Re:
They didn’t want to talk about the fact that they can force all phones in the area to disconnect from any towers they are currently on. This gives them the ability to instantly find their target phone, but also disrupts every other call in range, targeted or not.
no one understands.
What did it take for OLD phones to get the protections they HAVE…
Understand the FUN had before you COULD not randomly Tape, phone calls..
FEW to NONE of the laws pertain to WIRELESS…
You might as well get a CB radio and broadcast to 20 miles around you,…
Re: no one understands.
Perhaps not do not either, or I am misunderstanding because your wording is very ambiguous. Clarify what you mean by no one understands.
2 things.
the 4th is written broadly enough to cover paper, wired, wireless communications and clearly makes any medium you use to store your personal effects a protected personal effect.
The 4th does not protect you from citizens intercepting your communications (wire tap laws do that) but it does prevent agents of the government from doing so without a warrant.
so what are the consequences when they ignore this ruling and do it anyway? A sterm talking to, maybe a slap on the wrist.
Re: Re:
so what are the consequences when they ignore this ruling and do it anyway?
The risk of the evidence being thrown out.
Beautiful
I think the best part, besides the ruling itself, is how the court used the government’s own witness against them. They claim one thing, their witness claims another, and the court uses the conflict to highlight how wrong their argument was, shooting it down in the process.
It’s nice to see a court get it right. Is it really that hard to get a warrant? I cant wait until one of these devices finds it’s way into the public’s hands. Or some crooked cop uses it to track his girlfriend/ex-wife and gets caught.
Re: Re:
The reason that law enforcement is so allergic to getting warrants is not because they find the process difficult. It’s because getting a warrant results in a paper trail.
Re: Re:
I cant wait until one of these devices finds it’s way into the public’s hands. Or some crooked cop uses it to track his girlfriend/ex-wife and gets caught.
Which the police/government would claim to be a gross violation of the privacy of the (rich/well connected) individuals affected, and not that big of a deal because it’s only tracking non-private data respectively.
I don't get the problem
I don’t get the problem. Just ask for a warrant to use the Stingray, and they’ll be fine.
Re: I don't get the problem
Warrants need to be signed. One word: hand cramps. Ok, that’s two words, but only because English is stupid about compound words.
For the judicial system in Maryland. *clap* *clap* *clap*
Slow clap for the judicial system in Maryland.
More warrants?! Required for policemen?!
N-n-no…
NOOOOOOOOOOOOO!