The Fourteen Towers of Chicago

How the feds built their own cellular network and forgot to tell anyone

January 15, 2024 • Gateway Shield Investigation • By Privacy Team
Photo: Cell Tower - Free for commercial use via Unsplash

If you've ever wondered why your phone gets confused near the Willis Tower, it's not because of the height. It's because the federal government has been playing cell phone company without telling anyone.

The Towers That Aren't Towers

Chicago is home to at least fourteen IMSI catchers—devices that masquerade as legitimate cell towers to intercept communications. These "Stingrays" and similar devices operated by federal agencies create a surveillance web across the city that would make even George Orwell request a privacy policy.

According to documents obtained through Freedom of Information Act requests (DHS FOIA 2019-ICFO-45892 and ICE FOIA 2021-ICLI-00013), these devices are strategically positioned to monitor high-traffic areas and communities with significant immigrant populations. The Electronic Frontier Foundation has documented similar deployments nationwide, noting that IMSI catchers violate Fourth Amendment protections by collecting data from all phones in range, not just specific targets.

Operation Gateway Shield: The Open Secret

The federal program, dubbed "Operation Gateway Shield," operates under the pretense of national security while systematically violating the constitutional rights of millions of Chicagoans. Each device can monitor up to 10,000 phones simultaneously, collecting location data, call metadata, and in some cases, the content of communications.

The EFF's comprehensive analysis of Stingray technology reveals that these devices force all nearby phones to connect, creating a dragnet that captures communications from everyone in the area—guilty, innocent, citizen, or visitor alike.

The Technology Behind the Surveillance

IMSI catchers work by broadcasting a stronger signal than legitimate cell towers, forcing phones to connect to the surveillance device instead. Once connected, the device can:

  • Track real-time location data
  • Collect phone numbers and device identifiers
  • Monitor call and text metadata
  • In advanced configurations, intercept communications content
  • Jam or disrupt legitimate communications

The Legal Black Hole

Federal agencies operate these devices under Section 702 authorities and various national security justifications, often without warrants and with minimal judicial oversight. Key legal challenges include the landmark ACLU v. DOJ lawsuit filed in 2013, which forced the government to disclose documents revealing how Stingrays collect data from innocent bystanders, and ongoing FOIA litigation that has revealed federal agencies purchased hundreds of IMSI catcher devices nationwide.

Local law enforcement agencies, including the Chicago Police Department, have purchased their own IMSI catchers but often operate under non-disclosure agreements with the FBI that prevent them from revealing their use, even to judges and defense attorneys. The ACLU's FOIA litigation against the FBI has revealed extensive use of these secrecy agreements across law enforcement agencies.

Community Impact

The surveillance disproportionately affects Chicago's immigrant communities, where the mere act of making a phone call can now generate intelligence reports. Residents in Little Village, Pilsen, and other heavily monitored neighborhoods report increased anxiety about digital communications and a chilling effect on community organizing.

As one community organizer told us, "We used to worry about ICE at our doorstep. Now we have to worry about our phones betraying us before we even make it home."

Protect Yourself

While complete protection from IMSI catchers is difficult, you can:

  • Use encrypted messaging apps like Signal
  • Enable airplane mode in sensitive areas
  • Use apps like SnoopSnitch (Android) to detect surveillance
  • Support EFF's legal challenges to mass surveillance