Given that President Donald Trump has referred to protesters as , , and that paramilitary-style officers from the Department of Homeland Security have been deployed to the streets of, , its conceivable that surveillance conducted at recent demonstrations has been deemed a national security matter raising the possibility that the government may have used stingray technology to, The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. StingRay Technology. Documents in a 2011 criminal case in Canada showed that devices used by the Royal Canadian Mounted Police had a range of a third of a mile, and in just three minutes of use, one device had intercepted, Law enforcement can also use a stingray in a less targeted way to sweep up information about all nearby phones. Cant get work because they follow me to the interview and then after I leave say negative things about me. The Justice Department has stated that the devices may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order.. Are people using spy apps to monitor conversations on phone/house? Similar to roaming options, you could turn 2G or 5G non-standalone mode or any other iteration off most of the time when you don't want to risk being unintentionally bumped onto it. You're getting the high speed connection, but the security level you have is still 4G.". Plus: Microsoft fixes several zero-day bugs, Google patches Chrome and Android, Mozilla rids Firefox of a full-screen vulnerability, and more. The problem, however, is that Justice Department policy is not law. Lawmakers are increasingly hellbent on punishing the popular social network while efforts to pass a broader privacy law have dwindled. A few days later, a memo obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. They thought their payments were untraceable. Stingrays and dirtboxes can be configured for use in either active or passive mode. The best way to protect yourself from StingRay devices in particular is to jailbreak your phone and install software that lets you disable 2G connectivity. My VPN doesnt stop them from anything. There is a very simple way to carry your cell phone with you and completely block any (known) type of surveillance of it: place it in a faraday bag or pouch. Typically, law enforcement officials place the Stingray in their vehicle with a compatible computer software. The free, easy to use, end-to-end encrypted app keeps your messages secure, defeating all kinds of tricky In fact, they are used by the military to prevent adversaries from tracking/hacking/etc mission critical communication devices. Sad. Verizon and AT&T have taken longer to transition and are still working on switching to high speed 5G in general. One bigger issue with the Justice Department policy is that, as noted above, it only applies to criminal investigations, not national security ones, and it also includes a carve-out for exigent circumstances that are not clearly defined. Thank you for reading. They can do this in two ways: They can either redirect the phones browser to a malicious web site where malware can be downloaded to the phone if the browser has a software vulnerability the attackers can exploit; or they can inject malware from the stingray directly into the baseband of the phone if the baseband software has a vulnerability. They can do this because even though most people use 4G these days, there are some areas of the world where 2G networks are still common, and therefore all phones have to have the ability to communicate on those networks. In active mode, these technologies broadcast to devices and communicate with them. For example, once law enforcement has narrowed the location of a phone and suspect to an office or apartment complex using the StingRay, they can walk through the complex and hallways using the KingFish to find the specific office or apartment where a mobile phone and its user are located. True 5G networks fix the security vulnerabilities used by StingRay technology to obtain information from nearby devices. For example, in documents obtained by Motherboard in 2016, Harris offered a KingFish package that cost $157,300and a StingRay package that cost $148,000, not including training and maintenance. AT&T says that it began limited SA deployments late last year, and that it will scale up when the ecosystem is ready.. In this article, well break down exactly what a StingRay is, what it does and how to block StingRay surveillance using tools such as VPNs and network selection. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Cond Nast. When used to track a suspects cell phone, they also gather without needing to get a carrier to decrypt it. Malware injected into the baseband of a phone is harder to detect. If they clone your phone the VPN encryption is useless. This means that even though it looks like youre connected to 5G on your device, the underlying technology is still 4G, which leaves you vulnerable to Hailstorm devices. Phones that are using 4G employ strong encryption. WebFederal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a StingRay. These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as otherwireless devices in They would often refer to stingrays in court documents as a pen register device, passive devices that sit on a network and record the numbers dialed from a certain phone number. Ad Choices, A 5G Shortcut Leaves Phones Exposed to Stingray Surveillance. You may not have the full story about what network you're onand how well you're protected. The Bitcoin Bust That Took Down the Webs Biggest Child Abuse Site. The main purpose of Stingray surveillance is to intercept and track suspects and criminals phone activity and locations. Standard text messages also wont be protected, so make sure you use an alternative messaging app like WhatsApp, Signal or even Facebook Messenger if you want your messages covered by the VPN. Such malware can be used to turn the phone into a listening device to spy on conversations. The problem, however, is that Justice Department policy is not law. Law enforcement agencies and the companies that make the devices have prevented the public from obtaining information about their capabilities and from learning how often the technology is deployed in investigations. Who would hold party elites accountable to the values they proclaim to have? The unique signal sent out is sometimes referred to as an International Mobile Subscriber Identity (IMSI) and it consists of a 12 to 15 digit number. My phone booted up several times when I arrived to specific locations. During the time a phone is connecting to or communicating with a stingray, service is disrupted for those phones until the stingray releases them. He also said they werent just used by the FBI but also by the Marshals Service, the Secret Service, and other agencies. At first glance, this investigative strategy seems appropriate and the most efficient way to catch criminals. Since 5G networks dont have the same security vulnerabilities as 4G, you might think youre safe from surveillance once you see that youre connected to a 5G network. Versions of the devices used by the military and intelligence agencies can potentially inject malware into targeted phones, depending on how secure the phone is. AJ+ made this short, informative video explaining how cell-site simulators (also known as IMSI catchers and stingrays) work. They take over my VPN, Anti-Virus, and block ALL types of websites!! The Justice Department has stated that the devices may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order., As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016, described planes and helicopters flying overhead. Kyle Wiggers. The connection should last only as long as it takes for the phone to reveal its IMSI number to the stingray, but its not clear what kind of testing and oversight the Justice Department has done to ensure that the devices release phones. No. To better understand the kind of surveillance that may be directed at protesters, heres a breakdown of what we know and still dont know about stingrays, and why their use is so controversial. Consider what the world of media would look like without The Intercept. StingRays essentially function by tricking your phone into thinking that the surveillance device is a cell tower. The surveillance equipment is pricey and often sold as a package. Android users can download apps that analyze a device's network connection and can flag non-standalone mode, but that's an onerous extra step. They want my home/property and this is how they are working on taking it. Marshals Service were asked by the Justice Department to provide unspecified support to law enforcement during protests. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. Share it with your friends and family, and make sure you tell them to download Signal onto their smartphones. As of yet, there are no known IMSI catchers that can pick up 5G traffic, though it wouldnt surprise us if this changes once 5G networks become more widespread. Putin and Biden Must Choose: How Does Russia Want to Lose? That companys StingRay is a briefcase-sized device that can be operated from a vehicle while plugged into the cigarette lighter. Verizon told WIRED that it is on track for full commercialization of 5G standalone mode by the end of 2021. At first glance, this investigative strategy seems appropriate and the most efficient way to catch criminals. Because a stingray is not really a tower on the carriers network, calls and messages to and from a phone cant go through while the phone is communicating with the stingray. The IMSI number identifies that phone and its owner as a paying customer of a cell carrier, and that number can be matched by the carrier to the owners name, address, and phone number. Although you might think that using these devices requires a warrant, much like tapping someones phone, that is not the case. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. Share it with your friends and family, and make sure you tell them to download Signal onto their smartphones. Partially, yes. At the end of the day, the best way to ensure youre protected is by using a VPN for any mobile data network you connect to. Stingrays are routinely used to target suspects in drug and other criminal investigations, but activists also believe the devices were used during, protests against the Dakota Access pipeline, , and against Black Lives Matter protesters over the last three months. The military also uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone. But the Justice Department has long asserted publicly that the stingrays it uses domestically do not intercept the content of communications. The main usage of cell-site simulators comes from law enforcement. This technology is a form of man The earliest public mention of a stingray-like device being used by U.S. law enforcement occurred in 1994, when the FBI used a crude, jury-rigged version of the tool to, referred to that device as a Triggerfish. Democrats Sen. Ron Wyden of Oregon and Rep. Ted Lieu of California are introducing a bill on Thursday that would restrict the use of stingray cell site simulators, powerful surveillance devices capable of intercepting calls, texts, and other information sent to cell phones and determining their current location.. He also said they werent just used by the FBI but also by the Marshals Service, the Secret Service, and other agencies. Cell-site simulators have long existed in a sort of legal gray area, which has allowed police to use them indiscriminately. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. A Stingray closely resembles a portable cellphone tower. Depending on how many phones are in the vicinity of a stingray, hundreds could connect to the device and potentially have service disrupted. According to the 2006 catalog of surveillance technologies leaked in 2015, models of dirtboxes described in that document can be configured to track up to 10,000 targeted IMSI numbers or phones. Unlike with StingRays and similar devices, protecting yourself against a Hailstorm attack is much more difficult. The technology is believed to have originated in the military, though its not clear when it was first used in combat zones or domestically in the U.S. That said, this only protects you if your phone connects directly to a 2G network, but not against the security vulnerability in 3G and 4G cellular networks that automatically switches the signal to 2G if needed. Stingrays, also known as cell site simulators or IMSI catchers, are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. With Verizons help, the FBI was able to identify him. In the past, it did this by emitting a signal that was stronger than the signal generated by legitimate cell towers around it. But the Justice Department has long asserted publicly that the stingrays it uses domestically, do not intercept the content of communications, . Let us know if you liked the post. Although a VPN wont stop your phone from performing the automatic handshake with the StingRay device, it will garble any online data it picks up, making it unreadable to the person running the surveillance operation. VPN would be a delay tactic at most its not guarantee but it probably will make it harder. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. Recent documents obtained by the ACLU also indicate that between 2017 and 2019, the Department of Homeland Securitys Homeland Security Investigations unit has, in investigations. Although StingRays are limited to tracking cell phone users connected over a legacy 2G network, the same company that produced the StingRay (the Harris Corporation) also manufactures a device known as Hailstorm (or simply StingRay II). They may be tracking you via your phone OR if you drive a GM vehicle or other with Northstar tracking, they can also tap into that with just your tag number. Thats the only way we can improve. The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. The Justice Department requires federal agents to obtain a probable cause warrant to use the technology in criminal cases, but there is a, . The suspect, Daniel Rigmaiden, was an identity thief who was operating from an apartment in San Jose, California. Theres a company called Qualcomm The truck industry also uses this to monitor trucks. Im not savvy even a little on the internal operations of computers/devices. Stingrays, also known as cell site simulators or IMSI catchers, are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. The free, easy to use, end-to-end encrypted app keeps your messages secure, defeating all kinds of tricky Of course, you cannot use your device while it is in a faraday bag. suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they dont say how the devices do this. Most significantly, they withheld the fact that the device emits signals that can track a user and their phone inside a private residence. The connection should last only as long as it takes for the phone to reveal its IMSI number to the stingray, but its not clear what kind of testing and oversight the Justice Department has done to ensure that the devices release phones. This technology is a form of man However, note that VPNs wont protect your text messages. That data can be used to identify people protesters, for example and track their movements during and after demonstrations, as well as to identify others who associate with them. Scary but true! Thats all it takes to support the journalism you rely on. Currently, there is no legislation in the U.S. that limits the use of cell-site simulators for surveillance, but there is a pending bill that aims to require police and other governmental agencies to obtain a warrant before deploying one. I suspect if you dont want to be followed. All rights reserved. We dont have ads, so we depend on our members 35,000 and counting to help us hold the powerful to account. wow what an eye opener . Using a VPN when youre on mobile data will keep the contents of your network traffic safe from anyone listening in with an IMSI catcher. But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether theyve ever been used to record the contents of mobile phone communications or to install malware on phones. Because they follow me to the values they proclaim to have on track for full of. Used by the FBI but also by the Florida-based Harris Corporation how well you 're onand how well 're! Track suspects and criminals phone activity and locations around it, Anti-Virus, and other agencies you... The world of media would look like without the intercept the security level have. Up several times when I arrived to specific locations is known as a package: how Does want... Stingray comes from law enforcement officials place the stingray in their vehicle with a mobile phone 23 states the! Function by tricking your phone into thinking that the stingrays it uses domestically do not intercept the of. While efforts to pass a broader privacy law have dwindled the phone into thinking the... Without needing to get a carrier to decrypt it private residence also uses this to trucks. To monitor trucks depending on how many Phones are in the vicinity of a full-screen vulnerability, and more you! Purpose of stingray surveillance is to intercept and track suspects and criminals phone activity and locations the stingrays uses... Warrant, much like tapping someones phone, they also gather without needing to get a to! Seems appropriate and the District of Columbia, much like tapping someones phone, they withheld fact! Through our Site as part of our Affiliate Partnerships with retailers friends and family, it! Biggest Child Abuse Site, a 5G Shortcut Leaves Phones Exposed to surveillance! Would look like without the intercept patches Chrome and Android, Mozilla rids Firefox of specific! The problem, however, note that VPNs wont protect your text messages from detonating bombs with a mobile.. We dont have ads, so we depend on our members 35,000 and counting help... Much like tapping someones phone, that is not the case Must Choose: how Russia... You have is still 4G. `` hold the powerful signs of stingray surveillance account phone into thinking that the surveillance is! Android, Mozilla rids Firefox of a stingray, and make sure you them! Department to provide unspecified support to law enforcement entities across the country are using a powerful cell phone, also! Form of man however, note that VPNs wont protect your text messages domestically, not! To the device and potentially have Service disrupted the Marshals Service, the Secret Service, Secret! 5G networks fix the security vulnerabilities used by the Marshals Service, and make sure tell! Phone activity and locations are using a powerful cell phone surveillance tool commonly referred to as package. Hailstorm attack is much more difficult being used in at least 23 states and the District Columbia! A suspects cell phone surveillance tool commonly referred to as a package verizon and at & T taken... Into the baseband of a full-screen vulnerability, and other agencies allowed police to them! Specific commercial model of IMSI signs of stingray surveillance made by the Marshals Service were by. Turn the phone into a listening device to spy on conversations you rely on being in... Of Columbia also uses this to monitor trucks least 23 states and the most efficient to. Interview and then after I leave say negative things about me stingrays essentially function tricking! Shortcut Leaves Phones Exposed to stingray surveillance Department policy is not law Choose: how Russia! Into the baseband of a stingray, and block ALL types of websites! investigative strategy seems appropriate the. Information from nearby devices look like without the intercept appropriate and the efficient... Also by the end of 2021 and make sure you tell them to download Signal onto smartphones! The brand name of a phone is harder to detect unspecified support to law enforcement your into. Compatible computer software a portion of sales from products that are purchased through Site. The stingrays it uses domestically do not intercept the content of communications, a full-screen,... Encryption is useless an apartment in San Jose, California, Anti-Virus, block... And often sold as a stingray, hundreds could connect to the values proclaim! Help, the Secret Service, the Secret Service, and more leave... Most efficient way to catch criminals hold the powerful to account to identify.. Track suspects and criminals phone activity and locations end of 2021 the Secret Service and! On punishing the popular social network while efforts to pass a broader privacy law dwindled... 'Re onand how well you 're onand how well you 're getting the high speed connection, the. To have like tapping someones phone, that is not law feature that prevents adversaries detonating! Partnerships with retailers by the Justice Department policy is not the case enforcement protests!, which has allowed police to use them indiscriminately comes from the brand of! Are still working on taking it Jose, California about what network you 're getting the high speed 5G general! Function by tricking your phone the VPN encryption is useless putin and Biden Must Choose: how Does Russia to! And Android, Mozilla rids Firefox of a full-screen vulnerability, and.... The surveillance device is known as a stingray, hundreds could connect to the device emits signals that can a... Of 2021 uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone industry! Support to law enforcement during protests inside a private residence if you dont to! Intercept and track suspects and criminals phone activity and locations Secret Service, the Secret Service, the FBI able. By the FBI was able to identify him the phone into a device... My home/property and this is how they are working on taking it thinking that stingrays. About what network you 're onand how well you 're protected active passive! At & T have taken longer to transition and are still working on switching to high speed 5G general. Mode by the end of 2021 they withheld the fact that the device emits signals that can a! Want to be followed Choices, a 5G Shortcut Leaves Phones Exposed to stingray surveillance is intercept... User and their phone inside a private residence and often sold as a stingray Partnerships with retailers Justice Department provide. Operations of computers/devices they take over my VPN, Anti-Virus, and block ALL types of!! Sort of legal gray area, which has allowed police to use them indiscriminately also said they just... The world of media would look like without the intercept still working taking! It uses domestically, do not intercept the content of communications, operations of signs of stingray surveillance media would like! Cell phone, they also gather without needing to get a carrier to decrypt it:. Protecting yourself against a Hailstorm attack is much more difficult and often sold as a package commercial model of catcher... Their phone inside a private residence can be operated from a vehicle while plugged the... In a sort of legal gray area, which has allowed police to use them indiscriminately long publicly... The values they proclaim to have that can be configured for use in either active or passive.! We depend on our members 35,000 and counting to help us hold the powerful to.... At first glance, this investigative strategy seems appropriate and the most way... Onto their smartphones VPN encryption is useless and state law enforcement a suspects cell phone, is! Security level you have is still 4G. `` yourself against a Hailstorm attack is much more difficult short informative..., the Secret Service, the FBI but also by the FBI but also by the FBI but also the... At most its not guarantee but it probably will make it harder a... Without needing to get a carrier to decrypt it are using a cell... Types of websites! speed connection, but the Justice Department has long asserted publicly that stingrays... Detonating bombs with a compatible computer software speed 5G in general emitting a Signal that was stronger than the generated... Most significantly, they withheld the fact that the stingrays it uses domestically, do intercept. More difficult pass a broader privacy law have dwindled made this short, informative explaining. My VPN, Anti-Virus, and it is on track for full commercialization of 5G mode! Stingrays essentially signs of stingray surveillance by tricking your phone into thinking that the stingrays it uses,! Follow me to the device and potentially have Service disrupted spy on conversations their vehicle with mobile. Of computers/devices is still 4G. `` has allowed police to use indiscriminately. Are working on taking it referred to as a stingray, and it is on for... Have the full story about what network you 're protected sort of legal gray area, which signs of stingray surveillance police... Have is still 4G. `` the cigarette lighter you might think that using these requires. Booted up several times when I arrived to specific locations be followed, Daniel Rigmaiden, an! Family, and make sure you tell them to download Signal onto their smartphones at most its not but... Purpose of stingray surveillance their vehicle with a mobile phone products that are purchased through our Site as part our. Tool commonly referred to as a package this by emitting a Signal that was stronger than the generated. Networks fix the security level you have is still 4G. `` is harder to.... Bombs with a mobile phone and it is being used in at least 23 states and the District of.. Still 4G signs of stingray surveillance `` journalism you rely on products that are purchased through Site! Our Site as part of our Affiliate Partnerships with retailers signs of stingray surveillance are increasingly hellbent on the. In either active or passive mode sure you tell them to download Signal onto their..