Harris Corp.’s Stingray surveillance device has been one of the most closely guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.
Harris has fought to keep its surveillance equipment, which carries price tags in the low six figures, hidden from both privacy activists and the general public, arguing that information about the gear could help criminals. Accordingly, an older Stingray manual released under the Freedom of Information Act to news website TheBlot.com last year was almost completely redacted. So too have law enforcement agencies at every level, across the country, evaded almost all attempts to learn how and why these extremely powerful tools are being used — though court battles have made it clear Stingrays are often deployed without any warrant. The San Bernardino Sheriff’s Department alone has snooped via Stingray, sans warrant, over 300 times.
Group items matching
in title, tags, annotations or url
2More
No one should have to use proprietary software to communicate with their government - F... - 0 views
2More
Lynis 2.2.0 Released - Security Auditing and Scanning Tool for Linux Systems - 0 views
2More
[# ! #Tech:] Discover to which package a file belongs to - Linux Audit - 0 views
1More
How to Scan for Rootkits, backdoors and Exploits Using 'Rootkit Hunter' in Linux - 0 views
2More
The Best Travel Apps You Should Have When On Vacation - Icecream Tech Digest - 0 views
2More
A Memory Comparison of Light Linux Desktops | l3net - a layer 3 networking blog - 0 views
2More
Build Your Own Linux Distro | Linux Voice [# ! + Note...] - 0 views
1More
Save Wifi :the FCC is attempting to criminalize freedom via new regulations | ThinkPeng... - 1 views
2More
Windows 10 updates to be automatic and mandatory for Home users | Ars Technica - 0 views
1More
How to install closed drivers, media codecs, and other forbidden stuff on Linux PCs | P... - 0 views
1More
How to Install and Set Up Tor Browser on Linux - 1 views
3More
US government won't seek encryption-backdoor legislation | Ars Technica UK [# ! Note] - 0 views
1More
Google eavesdropping tool installed on computers without permission | Technology | The ... - 0 views
2More
Leaked Oscar Movie Screeners Flood Torrent Sites | TorrentFreak (wikinote @ lead)) - 0 views
‹ Previous
21 - 40 of 126
Next ›
Last »
Showing 20▼ items per page