Law enforcement agencies across the US deployed Stingray cell-site simulators that mimic cell towers to intercept communications and track the locations of every phone in an area - not just suspects. The FBI required police departments to sign non-disclosure agreements so restrictive that prosecutors were ordered to drop cases rather than reveal Stingray use. Officers were instructed to lie about how they located suspects.
“The government is using devices that impersonate cell towers to sweep up the communications of everyone in a neighborhood, including people not suspected of any crime.”
From “crazy” to confirmed
The Claim Is Made
This is the moment they called it crazy.
For years, civil liberties advocates made a peculiar accusation: law enforcement agencies were using secret technology to spy on entire neighborhoods, then lying about it in court. Judges and prosecutors dismissed the claims as paranoid conspiracy thinking. Then the documents started surfacing.
The technology in question is called Stingray, or more formally, a cell-site simulator. It works by mimicking a cellular tower, forcing every phone in range to connect to it instead of legitimate network infrastructure. Once connected, law enforcement can intercept calls, text messages, and pinpoint the exact location of devices—not just a suspect's phone, but every phone nearby.
Police departments began acquiring these devices in the early 2000s with minimal oversight. What made the practice particularly controversial was the scale of surveillance involved. A Stingray doesn't discriminate between targets and bystanders. Activate one in a neighborhood, and you're collecting data on potentially thousands of phones belonging to people never suspected of any crime.
For years, the official response from law enforcement and federal agencies was dismissive. When pressed about the technology, police departments either denied using it or claimed it was too sensitive to discuss. The FBI, which had developed partnerships with local law enforcement to deploy Stringrays, insisted the devices were only used to locate specific suspects in active investigations.
But investigative reporting and court filings told a different story. Documents obtained through FOIA requests and disclosed during criminal cases revealed that the FBI had required police departments to sign non-disclosure agreements so restrictive that prosecutors were ordered to drop criminal cases rather than risk exposing the technology in court. Officers were trained to construct alternative explanations for how they'd located suspects—attributing discoveries to tips from informants or routine patrol work, when they'd actually used Stingray technology.
Get the 5 biggest receipts every week, straight to your inbox — plus an exclusive PDF: The Top 10 Conspiracy Theories Proven True in 2025-2026. No spam. No agenda. Just the papers they couldn't hide.
You just read "Police secretly deployed cell tower spoofers to track phones…". We send ones like this every week.
No one's said anything yet. Be the first to drop your take.
Confirmed: They Were Right
The truth comes out. Officially documented.
Confirmed: They Were Right
The truth comes out. Officially documented.
The deception extended into the courtroom itself. Defense attorneys found that prosecutors and police could testify about suspect locations without disclosing they'd obtained that information through a cell-site simulator. This meant judges and juries were making decisions based on incomplete information about how evidence had been gathered. Some cases were dismissed only after defense teams discovered the Stingray use buried in documents months or years into proceedings.
The scope of deployment was also larger than initially acknowledged. By the mid-2010s, hundreds of law enforcement agencies across the country possessed Stingray technology or similar devices. Agencies in major cities and small towns alike had access to tools capable of mass surveillance, with little public knowledge and minimal judicial oversight.
What emerged from this documentation was a clear pattern: a technology with extraordinary surveillance capabilities had been deployed widely, its use hidden from courts and the public through systematic deception, and justified by federal agencies claiming national security concerns.
The implications remain significant. Citizens have a constitutional right to know how law enforcement obtained evidence against them. When that process is hidden, it undermines the entire premise of judicial review. The Stingray situation revealed not an isolated problem, but a systematic approach to surveillance that prioritized law enforcement convenience over constitutional protections.
Years later, as the practice has become public knowledge, meaningful regulation remains limited. That gap between what we now know and what we still allow speaks volumes about how easily surveillance infrastructure can be normalized once it's already in place.
Beat the odds
This had a 0.9% chance of leaking — someone talked anyway.
Conspirators
~500Large op
Secret kept
4.7 years
Time to 95% exposure
500+ years