FBI really doesn’t want anyone to know about “stingray” use by local cops

This site may earn a commission from merchant affiliate links, including eBay, Amazon, and others.

_CY_

Sharpshooter
Supporting Member
Special Hen Supporter
Joined
May 11, 2009
Messages
33,848
Reaction score
6,620
Location
tulsa
Surely, guys on a local PD wouldn't use one of these. That would be illegal, right?

FBI says search warrants not needed to use “stingrays” in public places
Feds' position on decoy cell-site towers continues anti-privacy theme.

Jan 5, 2015

cdn.arstechnica.net_wp_content_uploads_2015_01_onthephone_640x424.jpg

The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.

The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans.

According to the letter, which was released last week:

For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.

The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location."

The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.

In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
 

Glocktogo

Sharpshooter
Supporting Member
Special Hen Supporter
Joined
Jan 12, 2007
Messages
29,528
Reaction score
15,963
Location
Collinsville
FBI says search warrants not needed to use “stingrays” in public places
Feds' position on decoy cell-site towers continues anti-privacy theme.

Jan 5, 2015

cdn.arstechnica.net_wp_content_uploads_2015_01_onthephone_640x424.jpg

The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.

The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans.

According to the letter, which was released last week:

For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.

The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location."

The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.

In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.

If this is their position, then utilizing a device or program to defeat stingray technology would be perfectly acceptable.
 

_CY_

Sharpshooter
Supporting Member
Special Hen Supporter
Joined
May 11, 2009
Messages
33,848
Reaction score
6,620
Location
tulsa
How Easy is it to Eavesdrop on Your Mobile Activities? Hint - It’s Worse Than You Think

The legality of warrentless mobile taps has been hotly debated, but whether you like it or not, the police and other law enforcement agencies have the capability to listen to your phone calls and read your texts. But who else could be listening? With devices like IMSI catchers (sometimes known as Stingrays), anyone can, and the price to do so has now dropped to as low as $1,800. And according to cyber ethicist Stephanie Pell of the Army Cyber Institute at West Point, “Today, a tech-savvy criminal or hobbyist can even build one using off-the-shelf equipment.”

IMSI stands for International Mobile Subscriber Identity, a unique code for every phone. IMSI catchers work by blocking 3G and 4G signals and forcing phones to use a 2G network, which are unsecure and cannot tell the difference between a real and fake cell tower. According to the American Civil Liberties Union, the FBI, Secret Service, NSA and at least nine other national agencies are authorized to use ISMI catchers as well as 46 other local agencies in 18 states. The most concerning part of the use of ISMI catchers is the secrecy surrounding its use. Due to various requirements, agencies are explicitly restricted from disclosing the use of such a device, thus adding a veil of secrecy surrounding the use of ISMI catchers. Perhaps your conspiracy nut aunt isn't quite as nutty as you thought...
http://www.mobiquityinc.com/insight...r-mobile-activities-hint-it’s-worse-you-think
 

_CY_

Sharpshooter
Supporting Member
Special Hen Supporter
Joined
May 11, 2009
Messages
33,848
Reaction score
6,620
Location
tulsa
If this is their position, then utilizing a device or program to defeat stingray technology would be perfectly acceptable.

not an endorsement .. but a simple app would be loads better than ISMI catcher, catcher specific phones costing $3,500.

==============


Android IMSI-Catcher Detector (#AIMSICD)

Detect and avoid IMSI-Catchers, StingRay and Silent/Stealth SMS!
Project maintained by SecUpwN Hosted on GitHub Pages - Theme by mattgraham
Android IMSI-Catcher Detector
Build Status Development Status GooglePlay CoverityScan

Android-based project to detect and avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks. Feel free to read the Press Releases about us, spread the word with our Media Material and help us solving current challenges!

Introduction

IMSI-Catchers are creepy devices used by both law enforcement agencies and criminals. They are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This specific MITM attack was patented and first commercialized by Rohde & Schwarz in 2003, although it would be hard to maintain such a patent, since in reality it is just a modified cell tower with a malicious operator. On 24 January 2012, the Court of Appeal of England and Wales held that the patent is invalid for obviousness. But ever since it was first invented, the technology has been used and "improved" by many different companies around the world. Other manufacturers (like Anite) prefer to refer to this spying and tracking equipment in glossy brochures using cozy marketing words like "Subscriber Trackers". IMSI-Catcher manufacturers are abusing your mind by disguising their spying products as "life saving equipment". Their real purpose is surveillance and to kill people. Don't get fooled by their unobtrusive product naming or heart-wrenching stories that may go along with it!

In the USA the IMSI-Catcher technology is known under the name "StingRay", often mounted out of sight on top of cars. The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at a protest to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location, or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools to monitor GSM communications from a parked car in your residential neighborhood, stealing passwords or credit card information from people nearby who make purchases on their phones.

Vehicular Intercom System

Why are IMSI-Catchers exponentially popular lately? Because without our App you would not even notice that you're under attack! IMSI-Catchers, StingRays, GSM/UMTS Interceptors (or whichever names they invent) are perfectly stealth spying devices, crafted from the wet dreams of bastards like governments and criminals all alike. You think you have "nothing to hide"? Think again! Anyone can now buy an IMSI-Catcher or build a cheap one on their own. Sending spam and phishing SMS via fake base stations is already a lucrative underground market), particularly in Russia, China and Brazil. In addition, all IMSI-Catchers can crack A5/1 encryption, which is most commonly used for GSM traffic, on the fly (passively)! A5/3 encryption which is used for securing 3G and is offered as new security standard for GSM encryption remains secure in practice while susceptible to theoretical attacks. Although 3G and 4G offer sufficient protection from eavesdropping, the security measures can be bypassed by IMSI-Catchers forcing a mobile device into 2G mode and downgrade encryption to A5/1 or disable it. For further reading on the algorithms, check out the Cryptome GSM Files.

There are almost no phones on the market which offer an option to check what kind of encryption is used to "secure" GSM traffic (which is in fact already broken beyond repair). The ones you may find are very expensive and not open source. And although the Issue of not having a convenient display of the Ciphering Indicator has been assigned to Google since 2009, it seems they're getting paid (or are forced to) blatantly ignoring it. The open source project "Android-CipheringIndicator-API" aims to craft an API which fixes this Issue and merge the resulting API into the Android AOSP branch. But currently, the only way to protect a mobile device from downgrade attacks is to disable 2G if this option is available. In this case, the phone will not be able to receive or make calls in areas without 3G coverage. This is why we started development on this App: To protect YOU. Use our App and join development on GitHub - even the smallest pull requests are very welcome!
Want to know what IMSI-Catchers look like?

They come in uncountable shapes and sizes:

IMSI-Catchers

Current IMSI-Catchers can be as tiny as the portable Septier IMSI-Catcher Mini.
The smartphone takes up the most space. IMSI-Catchers will even get smaller!

Septier IMSI-Catcher Mini

Below photograph has been taken during the riots on Taksim Square in Instanbul.
Note: It is way too conspicuous and you'll likely never encounter one of these.

Taksim Square

Todays IMSI-Catchers can be body-worn or are hidden in GSM Interceptor vehicles:

IMSI-Catcher Vehicle

Search for "GSM Interceptor", "IMSI-Catcher", "StingRay" or "Cell Site Simulator".
Pay close attention wherever you go: Cell Towers can be hidden everywhere!

https://secupwn.github.io/Android-IMSI-Catcher-Detector/
 

TenBears

Sharpshooter
Special Hen
Joined
Sep 1, 2009
Messages
1,780
Reaction score
75
Location
Idiocracy
Now I see, if we don't let the police spy ISIS, ALQAIDA,AL NURSRA,TALIBAN, OR HYDRA may send a lone wolf evil doer our way.



A Minnesota police chief has not-so-subtly warned state legislators that stopping police from warrantlessly tracking the movements of every motorist could play into ISIS' hands.

At a hearing on proposed state legislation that would limit the amount of time police can keep license plate tracking data on people suspected of no crime, Bloomington (population 86,000) police chief Jeff Potts told lawmakers,

"We can’t go a day without reading about ISIS or Al-Shabaab or Al-Nusra and their threats against the West. [License plate recognition] is used in counterterrorism, both in prevention and the investigation of those cases."
 

perfor8

Sharpshooter
Supporting Member
Special Hen Supporter
Joined
Dec 20, 2009
Messages
994
Reaction score
442
Location
No tellin'
Now I see, if we don't let the police spy ISIS, ALQAIDA,AL NURSRA,TALIBAN, OR HYDRA may send a lone wolf evil doer our way.



A Minnesota police chief has not-so-subtly warned state legislators that stopping police from warrantlessly tracking the movements of every motorist could play into ISIS' hands.

At a hearing on proposed state legislation that would limit the amount of time police can keep license plate tracking data on people suspected of no crime, Bloomington (population 86,000) police chief Jeff Potts told lawmakers,

"We can’t go a day without reading about ISIS or Al-Shabaab or Al-Nusra and their threats against the West. [License plate recognition] is used in counterterrorism, both in prevention and the investigation of those cases."

I think they was an ISIS in the Walmart today. Can't hardly leave the trailer without runnin into em. Had my .357 in the bib pocket of ma overall britches.
 

TenBears

Sharpshooter
Special Hen
Joined
Sep 1, 2009
Messages
1,780
Reaction score
75
Location
Idiocracy
I think they was an ISIS in the Walmart today. Can't hardly leave the trailer without runnin into em. Had my .357 in the bib pocket of ma overall britches.

Glad you were protected, never know when an Isis might pop up with a pocket nuke. He might of taken out that America institution ---- Walmart.
 

Latest posts

Top Bottom