Federal Court Says Warrants Are Needed For Stingray Deployment

from the little-more-Fourth-for-cellphone-users dept

A federal court in Oakland, California has come to a conclusion the DOJ definitely didn't want it to reach, as Cyrus Farivar reports for Ars Technica.

In the 39-page ruling, US District Judge Phyllis Hamilton notably found that the use of stingray to find a man named Purvis Ellis was a "search" under the Fourth Amendment—and therefore required a warrant.

The DOJ -- despite issuing its own guidance requiring warrants for Stingrays in 2015 -- argued in court earlier this year that no warrant was needed to deploy the Stingray to locate a shooting suspect. It actually recommended the court not reach a conclusion on the Fourth Amendment implications of Stingray use, as it had plenty of warrant exceptions at the ready -- mainly the "exigent circumstances" of locating a suspect wanted for a violent crime.

Unfortunately for the federal government (and all other law enforcement agencies located in the court's jurisdiction), the court declined the DOJ's offer to look the other way on Constitutional issues. It found a Stingray's impersonation of cell tower to obtain real-time location information is a search under the Fourth Amendment.

The court adopts Judge Koh’s reasoning in In re Application for Telephone Information, 119 F. Supp. 3d at 1026, to hold that cell phone users have an expectation of privacy in their cell phone location in real time and that society is prepared to recognize that expectation as reasonable. While Judge Koh limited her analysis to the privacy interest in historical CSLI, the court determines that cell phone users have an even stronger privacy interest in real time location information associated with their cell phones, which act as a close proxy to one’s actual physical location because most cell phone users keep their phones on their person or within reach, as the Supreme Court recognized in Riley. In light of the persuasive authority of Lambis, and the reasoning of my learned colleagues on this court recognizing a privacy interest in historical cell site location information, the court holds that Ellis had a reasonable expectation of privacy in his real-time cell phone location, and that use of the Stingray devices to locate his cell phone amounted to a search requiring a warrant, absent an exception to the warrant requirement.

The court also has something to say about the FBI/Oakland PD's use of a pen register order as a stand-in for a warrant specifically detailing the type of device to used to obtain these so-called "phone records."

The government contends that since the Stingray devices used in this case were configured in compliance with the pen register statute, then the provisions of the pen register statute, including the “emergency” provisions, govern their operation. Doc. no. 321 at 9 (citing 18 U.S.C. § 3125). The government does not address the key issue in dispute, namely, whether the provisions of the pen register statute and the SCA provide the appropriate standard for using a CSS to locate a cell phone in real-time. The court follows Judge Illston’s determination in Cooper, 2015 WL 881578, that the provisions of the pen register statute and the SCA do not authorize the use of a CSS to disclose realtime information about a cell phone user’s physical location, and that such location monitoring must be authorized by a showing of probable cause.

It also points out the DOJ's reliance on the Stored Communications Act to salvage its warrantless Stingray use is misplaced -- something that could be gathered by the name of the statute.

[C]ongress intended that the SCA “was to be used as a means to obtain data which has already been stored at the time the government seeks to obtain it,” as opposed to real-time data.

Ultimately, though, the court denies the suppression of the evidence, allowing the government's "exigent circumstances" argument to prevail. This may prove to be a good thing in the long run (although it does little for the defendant). Allowing the government to keep its evidence gives it no reason to appeal the decision. And this decision implements a warrant requirement for obtaining real-time cell site location info and gives certain third-party records an expectation of privacy.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: 4th amendment, imsi catcher, oakland, purvis ellis, stingray, surveillance, warrant

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    Anonymous Coward, 31 Aug 2017 @ 9:58am

    Re: Re: The rule that I WANT them to reach...

    Even probable cause is a weak standard for a dragnet like this. It's fine to use against the target, but a stingray is going to affect all cellphone users in the area.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Make this the First Word or Last Word. No thanks. (get credits or sign in to see balance)    
  • Remember name/email/url (set a cookie)

Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

Introducing the new Techdirt Insider Chat, now hosted on Discord. If you are an Insider with a membership that includes the chat feature and have not yet been invited to join us on Discord, please reach out here.

Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.