Crime & Safety
Cell Phone Trackers Raise Secrecy Concerns in Maryland Courts
Maryland police evaded the court system with their use of technology that mimics a cell phone tower to track a person's movement.

By COURTNEY MABEUS, Capital News Service
BALTIMORE, MD β Police were waiting for Deon Batty when he stepped off a Baltimore City bus traveling along a commercial strip near the public Douglass Homes on Valentineβs Day three years ago.
When authorities asked Batty to empty his pockets, he pulled out a cell phone and handed it over.
An officer dialed the number of a 77-year-old woman who had been robbed of her phone and other items at gunpoint the night before. The phone in the officerβs hand rang.
The seamless chain of events baffled Battyβs public defender, Janine Meckler. How did police know he was on that particular bus? Why had they stopped him without a warrant? How did they know he had the womanβs phone?
Find out what's happening in Dundalkfor free with the latest updates from Patch.
The mystery deepened in the hours before Battyβs trial in Baltimore City Circuit Court in September 2014. As Meckler shifted through case files, she discovered something sheβd never noticed in her 25 years on the job: an after-action police report from the city policeβs Advanced Tactical Team. Though sheβd seen after action reports, what was unusual about this one was the phrase βtarget phone.β
A phone call to another attorney and a Google search led Meckler to a StingRay, the common name for a cell site simulator. It is a suitcase-size device developed for the foreign battlefield that mimics a cell tower, tricking nearby mobile phones into answering it with identifying information and location data.
Find out what's happening in Dundalkfor free with the latest updates from Patch.
WHAT ARE CELL SITE SIMULATORS?
Cell site simulators are among the most controversial of intelligence devices to have worked their way into the hands of law enforcement in recent years.
Because they indiscriminately scan phones while searching for their target, data from bystanders is also scooped up, dragnet-style.
Citing unusual secrecy agreements with the FBI or the need to protect an investigatory tool, most local law enforcement agencies using the equipment inMaryland refuse to answer questions about what happens to this data, or other rules governing its use.
Without this information, defense attorneys say they canβt challenge how they operate, like they can with radar equipment or even fingerprints. βWe have no clue how itβs being used, whether the machine is being used properlyβ¦ thereβs no accountability. Thatβs a huge problem,β Meckler said.
The problem, said lawyers and experts in law enforcement surveillance issues, is that technology has outpaced local laws. As public disclosures about cell site simulators increased in the last year, the Departments of Justice and Homeland Security began requiring their employees for the first time to obtain search warrants before they can use their devices, with some exceptions.
Each agency also enacted rules for deleting data. Those rules include provisions that say data must be deleted as soon as a target is found, and in no less than every 30 days in cases where the equipment is used to identify unknown devices. Each also added auditing requirements.
These new federal guidelines, however, donβt apply to local law enforcement. But some states, including California, Virginia and Washington have enacted similar legislation.
βThe main problem is that the police may be doing something illegal and we have to use mental gymnastics to try and uncover these secret aspects of an investigation that are never written down and turned over to us,β Jason Ricke, a Prince Georgeβs County assistant public defender, said. βThe police may be violating our clientsβ rights and we will never know it.β
Although some Maryland agencies have been using the technology for at least a decade, it wasnβt until October 2014 that police in the state were required even to show probable cause to use real-time cell site location information, according to a four-month investigation by Capital News Service.
The CNS investigation also found that police agencies in the seven counties closest to the Washington and Baltimore regions have spent at least $2.8 million on the sophisticated equipment.
At least 61 police agencies in 23 states and Washington, D.C., have deployed cell site simulators, according to the American Civil Liberties Union, which has pushed for greater oversight laws and transparency over how police use the technology.
βI would say that this shouldnβt ever be a secret,β David Rocah, senior staff attorney at ACLU of Maryland, said. βWeβre not talking about catching spies. Weβre talking about routine criminal investigations.β
Court records, public documents and interviews show that law enforcement agencies used their cell site simulators to set up wiretap cases, locate missing and suicidal persons and investigate homicides, assaults, drug trafficking and even robberies of gas stations and pizza deliverymen.
Among CNSβ findings:
- Maryland State Police has used its cell site simulator at least 125 times since 2012, most often in Baltimore County, which has its own cell site simulators, and in Wicomico County, on the Eastern Shore.
- Howard County has spent at least $452,000 on a cell phone tracking and jamming system that it has used at least 129 times since 2011, leading to at least 27 arrests.
- Governorβs Office of Crime Control and Prevention records show Annapolis Police received a $184,955 federal grant to buy its equipment.
- Heavily redacted records show Montgomery County Police, which obtained its equipment a decade ago, paid $260,944 in 2011 to continue its use. The county has paid an additional $222,961 since then, some of it for βupgrades/enhancements.β
- Anne Arundel County has spent more than $151,000 on its cell site simulator and maintenance agreement since 2013, according to purchase orders and other public records.
- The Prince Georgeβs County Sheriffβs Office received a $327,000 Justice Department grant in 2009 to buy its cell site simulator system. Within a month of installing it in a vehicle in December 2010, the agency had already used it five times and captured four suspects in cases that included an armed robbery, a carjacking and three attempted murders.
SECRECY SURROUNDS TECHNOLOGY
When Janine Meckler sought more information during a hearing about how police knew her client was carrying a stolen cell phone, the assistant stateβs attorney asked the judge to bar her from asking for more details about it.
βThatβs when I knew I had something,β Meckler said.
The stateβs attorneyβs attempt to stop Meckler is similar to reasons given by police departments to deny CNSβ requests for information under the law: Secrecy necessary to conceal details of the technology from criminals that would allow them to skirt capture.
Montgomery County also invoked executive privilege to withhold records, citing βsensitive information pertinent to matters of national security.β
In some cases, the FBI has required local agencies to sign confidentiality agreements prohibiting them from disclosing even whether they are using the devices.
The FBI βbelieves that this technology is a vital tool in homeland security operations and disclosure of this technology could expose ways to subvert this investigative tool to terrorists and criminals alike,β Baltimore County Police Cpl. Shawn Vinson wrote in a response to a CNS request for information.
Non-disclosure agreements signed by some agencies and the FBI direct local police to contact the bureau so it has the opportunity to intervene to stop public disclosures about cell site simulators.
That explains why Maryland State Police Sgt. Thomas Bonin told then-state Sen. Christopher Shank during a March 2014 hearing that he could not comment on whether or not the agency owns a StingRay, the name of the most commonly use simulator.
Maryland State Police signed its agreement with the FBI, which it released to CNS, on Feb. 12, 2012.
βIs it classified?,β Shank asked during the hearing. βIt is classified,β Bonin said.
Secrecy even surrounds the non-disclosure agreements. The FBI wonβt say how many such agreements it has signed with local jurisdictions.
At least 20 agreements have become public in recent years, largely as the result of public records requests. Baltimore City policeβs agreement surfaced in public court files last spring in a case against two teens charged in an armed carjacking. Anne Arundel Senior Assistant Attorney Philip Culpepper also acknowledged that county policeβs agreement with the FBI.
FBI Spokesman Christopher Allen said the non-disclosures arenβt meant to prevent all discussion about the devices. The FBI doesnβt tell local police how they can use their devices either, he said.
βThe goal is to protect the tradecraft capabilities of the device β¦ with the idea of preventing countermeasures,β Allen said.
But sometimes prosecutors have decided to offer plea deals in otherwise strong cases rather than disclose the use of cell site simulators.
When a Prince Georgeβs County public defender questioned whether U.S. Marshals, accompanied by county police, had used a cell site simulator to locate his client in a Laurel apartment in January 2015, his response was a plea deal.
Assistant Public Defender Ricke said it looked to him like the marshals had picked Stephon Summers βout of thin air.β
Summers is serving seven years for violating probation in addition to a concurrent five years for a weapons violation he was charged with when police found him in January 2015. Without the plea, he faced up to 25 years, Ricke said.
βThatβs something that law enforcement has to account for, that theyβre putting secrecy ahead of public safety,β said the ACLUβs David Rocah. βYou cannot say that these things are critical to public safety and then sell out public safety in the same breath.β
PRIVACY CONCERNS ABOUND
A summary of Annapolis Policeβs cell phone interceptor program says it βallows the department to locate and apprehend violent offenders, track persons of interest, monitor crowds when intelligence suggests threats; and intercept signals that could activate devices.β
Annapolis received a $184,965 Justice Department grant for that program in 2010, according to Governorβs Office of Crime Control and Prevention documents.
Little is known about the data local police agencies are gathering and how it is handled.
βIf the agency doesnβt have a policy in place to delete that data, who knows what theyβre doing with it?β said Jennifer Lynch, a senior staff attorney with the non-profit Electronic Frontier Foundation.
Brian Owsley, a former federal magistrate from Texas who has researched the technology, said Annapolisβ admission βfurther bolsters that theyβre big government coming in, theyβre watching everyone.β
Annapolis Police declined to comment.
Some agencies have been more willing to talk about what they donβt do
Maryland State Police said it does not retain third-party data and does not use its devices for crowd monitoring.
Baltimore County and Anne Arundel County both said they donβt store any data. Anne Arundel added that it does not intercept the content of communications.
Other police agencies, including those in Anne Arundel, Howard and Prince Georgeβs declined or did not respond to interview requests. Sheriffβs offices in Prince Georgeβs and Harford County also did not respond.
Baltimore City Policeβs acknowledgement, first reported by The Baltimore Sun, that it had used its StingRay in 4,300 cases going back to 2007 helped fuel a national conversation about the need to balance public safety while protecting bystander privacy.
Baltimore defense attorneys are now seeking additional information about those cases in an attempt to overturn them.
HARFORD COUNTY OFFICIAL EXPLAINS USE
Former Harford County Sheriff Jesse Bane said his office conducted internal audits of the deviceβs use and retained only data critical to an investigation. He didnβt rule out that other information wasnβt kept.
βIf we had a series of telephone numbers that were linked to drug dealers, we were going to hang on to those numbers,β said Bane, who lost his bid for sheriff in 2014 and now works as the town administrator of Bel Air.
Bane reviewed documents detailing the countyβs purchase of more than $400,000 in surveillance equipment in 2011, which he approved. The county bought the equipment using a Department of Homeland Security Urban Areas Security Initiative grant, according to the documents. It spent another $52,000 in June 2014 on equipment upgrades.
The grant is meant to enhance regional preparedness and capabilities against terrorism and other threats in high-risk, high-density areas, according to DHS.
But Bane said the county purchased its equipment to help its drug enforcement efforts. He estimated officers used the equipmentβwhich he said was installed in a vehicleβabout once a month. He could not provide specifics regarding how effective the cell site simulator was in locating targets.
βI wanted to stop the flow of drugs into the county as much as I could,β Bane said. βItβs very difficult to do if you donβt have the technology.β
Harford County Sheriffβs officers worked with the stateβs attorneyβs office to draftcourt orders when they used their cell site simulator, Bane said.
βI wanted to make sure we werenβt getting cases dismissed on technicalities,β Bane said.
LEGAL QUESTIONS ARISE FROM USE
The law governing use of cell site location information in Maryland changed in October 2014. It raised the burden of proof and required a court order before law enforcement could conduct real-time tracking, except in cases where a deviceβs owner had approved it or in cases of life or death. Even then, police must now retroactively get a court order within 48 hours, the law states.
Legislation introduced in February would have tightened the rules even further by requiring law enforcement agencies to tell the courts when they planned to use a cell site simulator. The bill also would have placed limits on data collection and required annual reporting by police agencies. It failed to make it out of committee.
But a 74-page state Court of Special Appeals decision issued March 30 is being hailed as the first of its kind in the country by civil liberties experts. The order upheld a ruling by a Baltimore City Circuit Court judge who said police violated Kerron Andrewsβ Fourth Amendment rights when they used a StingRay upgrade called Hailstorm to locate him without a warrant in May 2014. Police deployed the Hailstorm to find Andrews, who is accused of attempted murder, after obtaining a pen register/trap and trace order. The orders, which require less than probable cause, have long allowed police to obtain lists of numbers called and received by a user from phone companies.
The court called the city policeβs conduct in the case misleading and βunconstitutionally intrusiveβ and upheld the lower courtβs order throwing out evidence gathered by the Hailstorm.
The three-judge panel also took aim at the non-disclosure agreements between law enforcement and the FBI.
βA nondisclosure agreement that prevents law enforcement from providing details sufficient to assure the court that a novel method of conducting a search is a reasonable intrusion made in a proper manner and justified by the circumstances obstructs the courtβs ability to make the necessary constitutional appraisal,β the justices said.
A spokesman for Maryland Attorney General Brian Frosh said earlier this year that the office was evaluating the ruling and considering its options.
Rocah, of the ACLU, said the courtβs decision could mean a reopening of scores of cases across the state, not just in Baltimore.
Even then, defense attorneys may face an insurmountable challenge. Given the hidden history of cell site simulator use in Maryland, itβs near impossible to know in how many cases police have used the devices, Rocah said. Defense attorneys have said withholding discovery before a trial has been an on-going concern.
To add another challenge, the attorneys say police have obscured the use of simulators by using vague language in court documents, forcing them to read between the lines. In at least one case, a device was referred to as a βconfidential sourceβ in charging documents.
Text messages between two Montgomery County Police detectives made public defender Ron Gottlieb question if a cell site simulator was used to track Mauricio Morales-Caceres, who was convicted recently in a December 2014 homicide, according to Gottlieb.
Montgomery County Assistant Stateβs Attorney Douglas Wink acknowledged during a November hearing that a cell site was used in the case but said there was no additional documentation.
βIt should be disclosed upfront in discovery under the rules,β Gottlieb said during the hearing. βI had to ask for that.β
HOW CELL SITE SIMULATORS WORK
Cell site simulators were initially used overseas by intelligence agencies and federal law enforcement. Homeland Security agencies including the SecretService and Immigration and Customs Enforcement also now use the devices, as does the Internal Revenue Service.
As the technology improved and spread through federal agencies, local and state agencies learned of them, too. DHS and DOJ officials have said that domestically, their devices only scoop up metadata. They do not gather content, like emails or text messages.
Cell site simulators rely on signal strength and direction finding to locate a target device, Heath Hardman, a former signals analyst for the U.S. Marines Corps, said.
Hardman used the devices while deployed in Iraq and Afghanistan in 2007 and 2008 and also taught troops how to operate them. If done incorrectly an operator could kick users off a network, forcing them to power their phone off and on before reconnecting, he said.
Or, if an operator broadcasts too broad of a signal, it can overload a network with too many devices looking to jump from one cell tower to another.
βItβs a little bit of an art and a science,β Hardman said.
For these reasons, the Federal Communications Commission must authorize a manufacturer to sell the device. But that authorization only signifies that the equipment meets FCC standards to control radio frequency interference, FCC officials said.
Melbourne, Fla.-based Harris Corp produces the StingRay, which has become a generic name for similar devices. Harris spokesman Jim Burke said it is company policy not to comment on its product. A spokeswoman for Germantown-based Digital Receiver Technologies, Inc., a Boeing subsidiary that produces a cell site simulator referred to as DRTbox, also declined to comment.
HOW POLICE USE THE DEVICES
Many agencies say national security and the need to protect an investigatory tool prevents them from talking about cell site simulators. That extends to the cases themselves. Itβs unclear how many cases had links to national security. Logs released by some agencies do not explicitly cite national security but instead include violent crimes such as homicides and rape; others were more routine crimes, including burglaries, assaults and auto theft.
One case involved the theft of chicken wings.
βItβs supposed to be used for terrorism,β Meckler, the Baltimore public defender, said. βItβs not being used for the purpose for which itβs being designed.β
Montgomery County Police spokesman Capt. Paul Starks said the agency used its cell site simulator 80 times from April 1, 2015 through March 31. The number indicates uses, not individual cases, he said. About 30 percent, or 24, of those uses were for homicides and another three were kidnappings, Starks said.
The county may also use its cell site simulators to find critically missing people, like runaway children or those with mental, physical or emotional disabilities but the agency doesnβt track those, Starks said. The agency does not track how many times it successfully locates its target, Starks said. County police usually obtain a court order before using its devices or seek one soon afterwards, he said.
βWe absolutely use it to go after the worst criminals or the worst criminal offenses,β Starks said. βWe use it for violent felonies and do not use it for minor crimes and property crimes.β
Baltimore County Police spokeswoman Elise Armacost said the tool has been effective in local crimes. They successfully located 63 of 72 targets they sought using the device in 2015, according to a log released to CNS. In 2014, county police located 110 of the 119 targets they sought while using the device. The investigative unit that handles the device got 99 requests from county police to use it in 2015. In 2014, the unit got 150 requests, according to county logs.
The βtechnology is useful at helping us find missing persons and wanted suspects, thus furthering our public safety mission,β Armacost said in an email. βWe use this equipment only when there is law enforcement need and probable cause.β
Success rates in other counties were not as high.
Since 2011, Howard County has investigated more drug cases with its devices than any other type of crime. Of the 41 drug cases, which represent a little more than 30 percent of the investigations, police made only one arrest. Several of those cases were to develop targets for wiretaps, according to a log released to CNS.
Howard police also used the device in suicides, kidnappings and in at least three cases where threats were made to public officials.
Annapolisβ log shows police located their target in seven of the 17 cases in which the equipment was used since late 2011.
But Annapolis Police couldnβt find their target in the case of a Pizza Boliβs employee who reported being robbed of 15 chicken wings and three subs while out on delivery in March. In that case, police got a court order, according to the police log.
The value of the wings and subs totaled $56.77.
Ricke, the Prince Georgeβs County public defender, still questions the use of an invasive surveillance device in tracking his client, Summers.
βHeβs not a terrorist, heβs just a kid from the neighborhood,β Ricke said.
Jennifer Lynch, of the Electronic Frontier Foundation, did not know of any cases in which local police had uncovered terrorism using their cell site simulators.
βI donβt think it's happened at all,β she said
NATIONAL SECURITY IN BALTIMORE COURT
Deon Batty wasnβt accused of terrorism. He faced burglary and robbery charges after police found him with the 77-year-oldβs stolen cell phone when he stepped off a Baltimore bus holding a Valentineβs gift.
In court, Meckler moved to suppress the phone as evidence. It was a lark, she said.
βI never expected it to get anywhere,β Meckler said.
But during questioning, Baltimore City Circuit Court Judge Barry G. Williams threw the phone evidence out after Sgt. Scott Danielczyk refused to answer how it led police to stop Batty.
βIt kind of goes into Homeland Security issues, your honor,β Danielczyk told the judge.
βOK, if it goes into Homeland Security issues, the phone doesnβt come in,β Williams said. Battyβs stop by police amounted to a warrantless search, he ruled.
A jury hung 11-1 in the case. Batty got a deal for time served and pled to a second-degree assault charge. Heβs currently serving out the rest of a probation violation charge at Dorsey Run Correctional Facility in Jessup.
Meckler said she never determined from city police that they used StingRay to track Batty down. But a February 13, 2013 entry in a city log obtained by CNSconfirms it.
βI have a right to know why my client is stopped,β Meckler said in a recent interview. βYou canβt just come in here carte blanche, βOh, itβs national security.ββ
Get more local news delivered straight to your inbox. Sign up for free Patch newsletters and alerts.