CBP Sign

ICE, Customs and Border Protection Face Lawsuit Over ‘Stingray’ Cell Phone Surveillance Tech

There is little known about the government’s use of “stingrays,” which tracks the locations of a cell phone and all devices within its range.

Two agencies within the Department of Homeland Security are facing a lawsuit over documents related to the government’s use of cell phone surveillance technology to track immigrants in the U.S.

Lawyers from the American Civil Liberties Union filed the suit on Wednesday against Customs and Border Protection and Immigration and Customs Enforcement, alleging that the agencies stonewalled them when asked to produce records relating to the government’s cell site simulators, known as “stingrays.”

Stingrays work by tricking cell phones into connecting them as if they were cell towers. The technology can capture unique identifiers and location data from not only the cell phone of the target, but of all devices that are within range of the targeted device. More advanced devices are believed to intercept calls and text messages in range of the targeted phone, TechCrunch reported.

There is little known about the government uses such surveillance technology because it is sold exclusively to law enforcement authorities and federal agencies. Those departments operate under strict non-disclosure agreements with the stingray manufacturers.

That’s why the ACLU has decided to file suit for records of how ICE and CBP use, purchase and conduct oversight of stingrays. While ICE claims that it has been processing the ACLU’s Freedom of Information Act request for more than two years, the CBP says that they are unable to “locate or identify any responsive records.”

ACLU attorneys claim that the CBP’s response is “completely implausible” because a December 2016 report from the House of Representatives found that the two agencies had spent $13 million on purchasing and operating at least 92 cell-site simulators. This report indicates that there are records kept on how the agencies use stingrays, the lawyers argue.

“The public has a right to know if and how often ICE and CBP are using Stingrays, which were originally intended for use by the military and intelligence agencies, for civil immigration enforcement operations,” Alexia Ramirez and Bobby Hodgson, both of the ACLU, wrote in an announcement.

The group is also seeking to find out if the agencies notify people in immigration court proceedings about when a stingray is used against them and if any limits exist on the use of the surveillance. (Spokespeople for CBP and ICE either did not comment on the issue, or said they do not comment on pending litigation).

In filing the suit, the ACLU cited a Univision report alleging that ICE used stingrays to track down an undocumented immigrant in New York. The man is now serving a one-year prison sentence for re-entering the U.S. illegally and faces deportation in 2020.

“It is only with a better understanding of how Stingrays are being utilized within the Trump administration’s immigration enforcement operations that we help ensure people are being protected from unjustified surveillance and targeting,” Ramirez and Hodgson wrote.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.


  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

Featured Cybersecurity

New Products

  • BIO-key MobileAuth

    BIO-key MobileAuth

    BIO-key International has introduced its new mobile app, BIO-key MobileAuth™ with PalmPositive™ the latest among over sixteen strong authentication factors available for BIO-key's PortalGuard® Identity-as-a-Service (IDaaS) platform. 3

  • LiftMaster Garage Door Opener

    LiftMaster Garage Door Opener

    LiftMaster Transforms the Garage Door Opener Into a Sleek Smart Home Device That Does More Than Open and Close the Garage Door 3

  • LenelS2 BlueDiamond™ mobile app

    enelS2 has introduced its Indoor Location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. 3