RADIO LAW: FBI AND STINGRAY VS PUBLIC RIGHT TO KNOW Tracking cell phones by tricking them into operating on a bogus network is a law enforcement tactic shrouded in secrecy. Now the FBI is under pressure to release information about it-but the bureau doesn't want to let go of 25,000 pages of documents on sophisticated cell surveillance technology. In an Arizona court case last year it was made public that the FBI had used a cell-site simulator in order to track down a suspect. The portable equipment, sometimes described as either an I-M-S-I catcher or a Stingray, covertly sends out a signal that fools all phones within a specific area into connecting to a fake network. The spy tool can force targeted phones to release unique identity codes that can then be used to track a person's movements in real time. But not everyone likes the idea of this type of law enforcement tool being used. Among them is the Electronic Privacy Information Center which is attempting to obtain internal FBI documents relating to the technology. In fact the Center is taking legal action to force the prompt disclosure of records concerning Stingray devices or other cell site simulator technologies. It alleges that the FBI has failed to comply with statutory deadlines by not handing them over quickly enough following a freedom of information request made last February. For its part, the FBI says that it has found 25,000 pages of documents that relate to the request, about 6,000 of which are classified. Because of this the agency says that it may need up to three years to process the files before they can be released. In light of the FCC's recent enforcement activities against cellular telephone jamming devices, it will be interesting to see if the regulatory agency can or will become involved in this controversial issue.