Baltimore Police Use ‘Stingray’ Cellphone Surveillance

stingray.jpg

US Baltimore Mayor Stephanie Rawlings-Blake defended the widespread use of a cellphone surveillance device that sweeps up phone signals, echoing the Baltimore Police Department's stance that it's used to track criminals and limited in the type of data it collects.
Kevin Harris, a spokesman for Rawlings-Blake, said the mayor was aware of the program and supports it as an "effective tool" that has proved useful for police departments across the country. Nonetheless, Harris said, the mayor is open to discussing ways to make the program more transparent.
 
How a stingray device works:

Baltimore Police used secret technology to track cellphones in thousands of cases and the extent of Baltimore police's use of the so-called stingray device was largely secret until this week, when a detective testified in court that the department has used it 4,300 times since 2007 and that a 2011 nondisclosure agreement with the FBI prevented police from discussing details about it.
 
As part of the agreement, the FBI retains the right to ask local police departments and prosecutors to drop cases against criminals before revealing information about stingray programs.
The stingray has come under scathing criticism from privacy advocates. Christopher Soghoian, a technology expert with the American Civil Liberties Union, said focusing on ways the stingray aids police investigations disregards the indiscriminate collection of phone signals and the device's ability to jam phone service in areas where police use it.
Soghoian said the shroud of secrecy surrounding stingrays leaves judges in the dark about the type of police operations they are allowing and law-abiding citizens unaware of their vulnerabilities to such technology. He also noted that enough information is already publicly available for criminals to create their own stingray-like tools.
City Councilman Brandon Scott said he understands why police did not disclose its widespread use until recently. "We all know if they make an agreement with the federal government, they need to honor that agreement," he said.
Still, Scott said he wants assurances that police are not tracking the phones of individuals not involved in criminality.
Such devices act as mobile cellphone towers, forcing phones within a certain radius to connect to them and share their unique identifying information. That information allows police to track the location of a targeted phone.
The technology is increasingly being used by local law enforcement officers and is used at the national level, by the US Marshals Service for surveillance planes. Members of Congress and the ACLU have been pressing for more information about the devices and asked the Federal Communications Commission to look into their use.
Rep. C.A. Dutch Ruppersberger, a Maryland Democrat, said that he has asked the FBI for "greater clarification" about how the device is deployed. Sen. Chuck Grassley, an Iowa Republican and chairman of the Senate Judiciary Committee, said there should be reporting on how often the technology is used, under which legal authorities, and what independent audit controls are in place to prevent abuse.
Baltimore Sun: http://bsun.md/1JMxbNh

« INTERPOL Targets Cybercrime in Asia
JP Morgan Algorithm Identifies Rogue Employees »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Information Network Security Agency (INSA)

Information Network Security Agency (INSA)

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.