CBP Sign

ICE, Customs and Border Protection Face Lawsuit Over ‘Stingray’ Cell Phone Surveillance Tech

There is little known about the government’s use of “stingrays,” which tracks the locations of a cell phone and all devices within its range.

Two agencies within the Department of Homeland Security are facing a lawsuit over documents related to the government’s use of cell phone surveillance technology to track immigrants in the U.S.

Lawyers from the American Civil Liberties Union filed the suit on Wednesday against Customs and Border Protection and Immigration and Customs Enforcement, alleging that the agencies stonewalled them when asked to produce records relating to the government’s cell site simulators, known as “stingrays.”

Stingrays work by tricking cell phones into connecting them as if they were cell towers. The technology can capture unique identifiers and location data from not only the cell phone of the target, but of all devices that are within range of the targeted device. More advanced devices are believed to intercept calls and text messages in range of the targeted phone, TechCrunch reported.

There is little known about the government uses such surveillance technology because it is sold exclusively to law enforcement authorities and federal agencies. Those departments operate under strict non-disclosure agreements with the stingray manufacturers.

That’s why the ACLU has decided to file suit for records of how ICE and CBP use, purchase and conduct oversight of stingrays. While ICE claims that it has been processing the ACLU’s Freedom of Information Act request for more than two years, the CBP says that they are unable to “locate or identify any responsive records.”

ACLU attorneys claim that the CBP’s response is “completely implausible” because a December 2016 report from the House of Representatives found that the two agencies had spent $13 million on purchasing and operating at least 92 cell-site simulators. This report indicates that there are records kept on how the agencies use stingrays, the lawyers argue.

“The public has a right to know if and how often ICE and CBP are using Stingrays, which were originally intended for use by the military and intelligence agencies, for civil immigration enforcement operations,” Alexia Ramirez and Bobby Hodgson, both of the ACLU, wrote in an announcement.

The group is also seeking to find out if the agencies notify people in immigration court proceedings about when a stingray is used against them and if any limits exist on the use of the surveillance. (Spokespeople for CBP and ICE either did not comment on the issue, or said they do not comment on pending litigation).

In filing the suit, the ACLU cited a Univision report alleging that ICE used stingrays to track down an undocumented immigrant in New York. The man is now serving a one-year prison sentence for re-entering the U.S. illegally and faces deportation in 2020.

“It is only with a better understanding of how Stingrays are being utilized within the Trump administration’s immigration enforcement operations that we help ensure people are being protected from unjustified surveillance and targeting,” Ramirez and Hodgson wrote.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.