County sheriff has used stingray over 300 times with no warrant | Ars Technica

Indiĝenaj Inteligenteco

Stingrays, or cell-site simulators, can be used to determine location by spoofing a cell tower, but they can also be used to intercept calls and text messages. Once deployed, the devices intercept data from a target phone as well as information from other phones within the vicinity. For years, federal and local law enforcement have tried to keep their existence a secret while simultaneously upgrading their capabilities. Over the last year, as the devices have become scrutinized, new information about the secretive devices has been revealed.This template application, surprisingly, cites no legal authority on which to base its activities. The SBSD did not respond to Ars’ request for comment.”This is astonishing because it suggests the absence of legal authorization (because if there were clear legal authorization you can bet the government would be citing it),” Fred Cate, a law professor at Indiana University, told Ars by e-mail.

via County sheriff…

View original post 13 more words

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s