Stingrays (AKA IMSI catchers) are a widespread class of surveillance devices that target cellular phones by impersonating cellular towers to them (they're also called "cell-site simulators").
Every year, security researchers, hardware hackers and other deep geeks from around the world converge on an English nature reserve for Electromagnetic Field, a hacker campout where participants show off and discuss their research and creations.
The use of fake cellphone towers, known as Stingrays or IMSI catchers, plays well with the nation's spy agencies and in some police jurisdictions. The authorities just can't get enough of being able to locate or listen in on private phone calls! — Read the rest
UT Austin sociologist Sarah Brayne spent 2.5 years conducting field research with the LAPD as they rolled out Predpol, a software tool that is supposed to direct police to places where crime is likely to occur, but which has been shown to send cops out to overpolice brown and poor people at the expense of actual crimefighting.
A group of researchers from Oxford and TU Berlin will present their paper, White-Stingray: Evaluating IMSI Catchers Detection Applications at the Usenix Workshop on Offensive Technologies, demonstrating countermeasures that Stingray vendors could use to beat Stingrays and other "cell-site simulators" (AKA IMSI catchers).
Rudy Carcamo-Carranza was an undocumented restaurant worker in Michigan wanted for a DUI and a hit-and-run; the FBI and ICE used IMSI catchers — powerful, secretive cellphone tracking tools that the agencies bill as a kind of superweapon in the war on terror — to catch him and put him up for deportation.
Companies in the EU and China have been caught offering to commit fraud to launder sales of mass surveillance weapons to Al Jazeera reporters posing as representatives of autocratic regimes under sanction for gross human rights abuses; these weapons would allow their users to target and round up political dissidents for arbitrary detention, torture and murder.
Police who rely on vulnerabilities in crooks' devices are terminally compromised; the best way to protect crime-victims is to publicize and repair defects in systems, but every time a hole is patched, the cops lose a tool they rely on the attack their own adversaries.
The Women’s Marches last weekend were collectively some of the largest protests ever conducted in the United States. While we would love to have some hard data to be able to inform the public about what type of surveillance being used on the demonstrations, unfortunately many of the police department’s we have requested in our Cell Site Simulator Census have either not given us any documents yet, or used sweeping law enforcement exemptions in order to not disclose some of the more sensitive, and important, information about their use.
During the Standing Rock confrontations, the Electronic Frontier Foundation got reports of police use of IMSI Catchers — secretive surveillance devices used to gather data from nearby cellphones, often called Stingrays or Dirtboxes — so it dispatched lawyers and technologists to monitor the situation, and filed 20 public records requests with law enforcement agencies.
Muckrock has been sending Freedom of Information requests to state police forces to find out how they're using "cell-site simulators" (AKA IMSI catchers/Stingrays), and they hit the motherlode with the Virginia State Police.
Unblinking Eye, EFF's giant, deep research report (available in Spanish, English and Portuguese) on the state of surveillance law in latinamerica, reveals an alarming patchwork of overbroad powers given to police forces and government agencies.
An outstanding post on the EFF's Deeplinks blog by my colleague Ernesto Falcon explains the negligent chain of events that led us into the Stingray disaster, where whole cities are being blanketed in continuous location surveillance, without warrants, public consultation, or due process, thanks to the prevalence of "IMSI catchers" ("Stingrays," "Dirtboxes," "cell-site simulators," etc) that spy indiscriminately on anyone carrying a cellular phone — something the FCC had a duty to prevent.
Motherboard used public records requests to extract 3,000+ pages of court docs from a massive 2010 RCMP mafia/drug bust in Montreal, codenamed "Project Clemenza," which revealed the full extent of the Mounties' secret use of Stingrays — AKA "IMSI Catchers," the fake cellular towers that let cops covertly track whole populations by tricking their phones into revealing information about them.
If you really want to be scared this Hallowe'en, spare a moment to ponder six ways that the state engages in widepread and indiscriminate surveillance, from social media monitoring to license plate and toll-transponder readers to IMSI catchers, biometrics and more.
The Electronic Frontier Foundation's new Law Enforcement Technology Primer for Civilian Oversight Bodies is a short, easy-to-understand guide for non-technical people that explains the new surveillance technology that local law-enforcement agencies are increasingly relying upon, often in secret, and without any civilian oversight.