ST. PAUL, Minn. (April 26, 2017) –  A bill introduced in the Minnesota Senate would limit warrantless electronic data collection in the state. Final passage of the bill would not only protect privacy in Minnesota, but would also hinder at least two aspects of the federal surveillance state.

Sen. Dave Dibble (D) Introduced Senate Bill 2037 (SF2037) in March. Titled the “Minnesota Electronic Communications Privacy Act,” the legislation would limit two methods of electronic data collection.

The legislation would help block the use of cell site simulators, known as “stingrays.” These devices essentially spoof cell phone towers, tricking any device within range into connecting to the stingray instead of the tower, allowing law enforcement to sweep up communications content, as well as locate and track the person in possession of a specific phone or other electronic device.

The bill would require police to obtain a warrant or wiretap order before deploying a stingray device, unless they have the explicit permission of the authorized possessor of the device, or the authorized owner if the device is lost or stolen. SF2037 does provide an exception to the warrant requirement for emergency situations. Even then, police must apply for a warrant within 3 days and destroy any information obtained if the court denies the application.

SF2037 would also bar law enforcement agencies from compelling a service provider, or any person other than the owner of the device, to provide access to electronic communications data without a warrant or wiretap order. This would include actual communication content such as phone conversations, text messages and email, location information, and other metadata such as IP addresses pertaining to a person or device participating in the communication.

A service provider could still share information voluntarily under the law. Law enforcement would have to destroy such information within 90 days unless it gets consent of the owner or a court order.

SF2037 would severely limit sharing of any legally obtained data.

The legislation provides a legal remedy for anybody whose data is obtained in violation of the law.

Any person in a trial, hearing, or proceeding may move to suppress any electronic communication information obtained or retained in violation of the United States Constitution, Minnesota Constitution, or of sections 626A.45 to 626A.49. The motion shall be made, determined, and subject to review according to section 626.21 7.14 or 626A.12.

IMPACT ON FEDERAL SURVEILLANCE PROGRAMS

The federal government funds the vast majority of state and local stingray programs, attaching one important condition. The feds require agencies acquiring the technology to sign non-disclosure agreements. This throws a giant shroud over the program, even preventing judges, prosecutors and defense attorneys from getting information about the use of stingrays in court. The feds actually instruct prosecutors to withdraw evidence if judges or legislators press for information. As the Baltimore Sun reported in April 2015, a Baltimore detective refused to answer questions on the stand during a trial, citing a federal non-disclosure agreement.

Defense attorney Joshua Insley asked Cabreja about the agreement.

“Does this document instruct you to withhold evidence from the state’s attorney and Circuit Court, even upon court order to produce?” he asked.

“Yes,” Cabreja said.

As privacysos.org put it, “The FBI would rather police officers and prosecutors let ‘criminals’ go than face a possible scenario where a defendant brings a Fourth Amendment challenge to warrantless stingray spying.”

The feds sell the technology in the name of “anti-terrorism” efforts. With non-disclosure agreements in place, most police departments refuse to release any information on the use of stingrays. But information obtained from the Tacoma Police Department revealed that it uses the technology primarily for routine criminal investigations.

Some privacy advocates argue that stingray use can never happen within the parameters of the Fourth Amendment because the technology necessarily connects to every electronic device within range, not just the one held by the target. And the information collected by these devices undoubtedly ends up in federal data bases.

The feds can share and tap into vast amounts of information gathered at the state and local level through a system known as the “information sharing environment” or ISE. In other words, stingrays create the potential for the federal government to track the movement of millions of Americans with no warrant, no probable cause, and without the people even knowing it.

According to its website, the ISE “provides analysts, operators, and investigators with information needed to enhance national security. These analysts, operators, and investigators… have mission needs to collaborate and share information with each other and with private sector partners and our foreign allies.” In other words, ISE serves as a conduit for the sharing of information gathered without a warrant.

The federal government encourages and funds stingrays at the state and local level across the U.S., thereby undoubtedly gaining access to a massive data pool on Americans without having to expend the resources to collect the information itself. By placing restrictions on stingray use, state and local governments limit the data available that the feds can access.

In a nutshell, without state and local cooperation, the feds have a much more difficult time gathering information. Passage SF2037 would represent a major blow to the surveillance state and a win for privacy.

PARALLEL CONSTRUCTION

By allowing defendants to suppress information obtained in violation of the law, SF2037 would hinder one practical effect of NSA spying in Minnesota.

Reuters revealed the extent of such NSA data sharing with state and local law enforcement in an August 2013 article. According to documents obtained by the news agency, the NSA passes information to police through a formerly secret DEA unit known Special Operations Divisions and the cases “rarely involve national security issues.” Almost all of the information involves regular criminal investigations, not terror-related investigations.

In other words, not only does the NSA collect and store this data, using it to build profiles, the agency encourages state and local law enforcement to violate the Fourth Amendment by making use of this information in their day-to-day investigations.

This is “the most threatening situation to our constitutional republic since the Civil War,” Binney said.

WHAT’S NEXT

SF2037 was referred to the Senate Judiciary and Public Safety Finance and Policy Committee where it must pass by a majority vote before moving forward in the legislative process.

Mike Maharrey

The 10th Amendment

“The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

LEARN MORE

01

Featured Articles

On the Constitution, history, the founders, and analysis of current events.

featured articles

02

Tenther Blog and News

Nullification news, quick takes, history, interviews, podcasts and much more.

tenther blog

03

State of the Nullification Movement

232 pages. History, constitutionality, and application today.

get the report

01

Path to Liberty

Our flagship podcast. Michael Boldin on the constitution, history, and strategy for liberty today

path to liberty

02

Maharrey Minute

The title says it all. Mike Maharrey with a 1 minute take on issues under a 10th Amendment lens. maharrey minute

Tenther Essentials

2-4 minute videos on key Constitutional issues - history, and application today

TENTHER ESSENTIALS

Join TAC, Support Liberty!

Nothing helps us get the job done more than the financial support of our members, from just $2/month!

JOIN TAC

01

The 10th Amendment

History, meaning, and purpose - the "Foundation of the Constitution."

10th Amendment

03

Nullification

Get an overview of the principles, background, and application in history - and today.

nullification