Back to News & Commentary

New Evidence Shows Milwaukee Police Hide Stingray Usage From Courts and Defense

Justice figure statue holding cell phone
Justice figure statue holding cell phone
Nathan Freed Wessler,
Deputy Director, 老澳门开奖结果 Speech, Privacy, and Technology Project
Share This Page
January 25, 2016

(Updated below)

Late on Friday, the 老澳门开奖结果 and 老澳门开奖结果 of Wisconsin joined the Electronic Frontier Foundation in filing an amicus brief in a Seventh Circuit case involving real-time cell phone location tracking by police. In the case, the Milwaukee Police Department disclosed that they asked the suspect鈥檚 cellular service provider to track the phone using its network equipment. Our brief explains why a probable cause warrant should be required for this kind of location tracking.

As we read through documentation from the case, however, we began to suspect that something else was going on. It appears that police secretly used a cell site simulator, also known as a Stingray, to track the phone, but successfully concealed that fact from the defense and the court.

Our suspicion was first raised because police initially did not disclose to the defendant that they had located him by tracking his phone, only revealing it at an evidentiary hearing. In reports prepared after the defendant鈥檚 arrest, police officers used oddly vague language to explain how they located him: one officer merely wrote that law enforcement had 鈥渙btained information鈥 about the defendant鈥檚 location; another said that police 鈥渙btained information from an unknown source鈥 about where he was. This sounded to us a lot like the kind of intentionally ambigous language used by police across the country to hide their Stingray use. Indeed, Milwaukee Police have signed a with the FBI promising to keep information about their use of Stingrays secret.

And then we found the smoking gun. Last fall, privacy activist Mike Katz-Lacabe obtained a in which the Milwaukee Police Department used Stingrays. (Here are Mike鈥檚 public records and MPD鈥檚 letter). That previously unpublicized list includes an entry for a case that matches the date and description of this one: an October 28, 2013, apprehension of a 鈥渇ugitive鈥 鈥渞elated to [an] FBI roundup.鈥

As our brief argues, 鈥淚f the government did, in fact, use a Stingray in this case and failed both to disclose this fact to the judge who issued the pen/trap order and to the Defendant, this would be sufficient grounds for suppressing the evidence gathered as a result of using the device.鈥

The importance of the court closely scrutinizing this issue is underlined by the fact that this is apparently not the first time a case has reached the Seventh Circuit in which police used a Stingray, but never informed judges. In a law review , Stephanie Pell and the 老澳门开奖结果鈥檚 Chris Soghoian noted that in 2013, the Department of Justice indicated in a that a 2007 case in the Seventh Circuit had involved a Stingray. It appears from the in that case, however, that the court was ignorant of that fact.

Evidence of police hiding their Stingray use from defense attorneys, judges, and the public is widespread. It was recently revealed that in , for example, police 鈥渘ever told judges or prosecutors that they were using the so-called 鈥榗ell site simulators鈥 - nor did they specifically ask for permission to use one.鈥 In , Washington, local judges raised concerns when they learned that they had been unwittingly signing orders used to justify Stingray use without police ever explaining what was at stake. In , thousands of Stingray uses were concealed behind 鈥渧ague terms鈥 and omissions. The pattern has repeated in city after city across the country.

But rarely have we obtained such direct evidence of Stingrays being hidden from the courts in particular cases鈥攅specially in a case that has gone as high as the 7th Circuit Court of Appeals.

If courts are ever to explain how the Fourth Amendment applies to invasive surveillance technologies like Stingrays, the government must candidly describe its use of the devices and their capabilities. This kind of intentional obfuscation must end.

UPDATE (4/6/16):
In a letter sent to the defendant鈥檚 attorney in this case, the U.S. Attorney鈥檚 office has now acknowledged that 鈥渙n October 28, 2013, the Milwaukee Police Department used a cell site simulator to locate Damian Patrick.鈥 The government should have disclosed this to the defense and the original judge in the case more than two years ago. That the government only made the disclosure after the 老澳门开奖结果 and Electronic Frontier Foundation uncovered the Stingray use in an amicus brief is yet more evidence of the corrosive regime of secrecy that has undermined courts鈥 ability to keep government surveillance in check. As a Maryland appeals last week, this secrecy is 鈥渋nimical to the constitutional principles we revere.鈥

UPDATE (5/25/16):
Audio from the Seventh Circuit鈥檚 oral argument is available . During argument, Chief Judge Diane Wood pressed the attorney for the government about the government鈥檚 secrecy and lack of disclosure, noting that the government 鈥渃ompletely concealed鈥 information about its Stingray use, and that 鈥渢here鈥檚 a huge lack of candor on the government鈥檚 part that is very troubling.鈥

Learn More 老澳门开奖结果 the Issues on This Page