Swordsmyth
04-03-2018, 07:03 PM
The Department of Homeland Security (DHS) has acknowledged a 2017 discovery of several "rogue devices" placed throughout Washington D.C. often used by spies and criminals to track and eavesdrop on private cellular devices, AP (https://apnews.com/d716aac4ad744b4cae3c6b13dce12d7e?utm_campaign=Soci alFlow&utm_source=Twitter&utm_medium=AP&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true) reports.
The DHS admission came in a March 26 response to a November request (https://www.wyden.senate.gov/imo/media/doc/wyden-rogue-imsi-catcher-letter-to-dhs.pdf) from Oregon Sen. Ron Wyden (D), however the agency did not say how many devices were detected or where they found them.
The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly. -AP (https://apnews.com/d716aac4ad744b4cae3c6b13dce12d7e?utm_campaign=Soci alFlow&utm_source=Twitter&utm_medium=AP&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true)
American intelligence and law enforcement agencies use similar eavesdropping equipment in the field, which can cost anywhere between $1,000 to around $200,000. The devices are typically the size of a briefcase but can be as small as a cell phone. Police use Stingrays to track down and implicate perpetrators of mainly domestic crimes.
The devices can be mounted in vehicles, drones, helicopters, and airplanes, allowing police to gain highly specific information on the location of any particular phone, down to a particular apartment complex or hotel room.
The Stingray units operate by tricking a cellular device into locking onto them instead of a legitimate cell tower - revealing the exact location of a particular phone. As AP notes, more sophisticated versions can eavesdrop on calls by forcing phones to step down to the older, unencrypted 2G wireless channel. Other Stingray devices can plant malware on a phone.
https://www.zerohedge.com/sites/default/files/inline-images/IMG_20170927_095405_179_0.jpg
https://www.zerohedge.com/sites/default/files/inline-images/20171129_stingray_0_0.jpg
Thousands of members of the military, the NSA, the CIA, the FBI and the rest of the national-security apparatus live and work in the Washington area. The surveillance-savvy among them encrypt their phone and data communications and employ electronic countermeasures. But unsuspecting citizens could fall prey. -AP
The DHS reply from official Christopher Krebs said that the agency had observed "anomalous activity" consistent with Stingrays in the Washington area. Another DHS official speaking anonymously to AP says that the devices were detected during a three-month trial of equipment (https://www.rsaconference.com/videos/project-overwatch-multinational-effort-to-combat-imsi-catchers) provided by Las Vegas-based agency contractor, ESD America (http://esdamerica.com/).
More at: https://www.zerohedge.com/news/2018-04-03/rogue-network-cellular-eavesdropping-devices-discovered-throughout-dc
The DHS admission came in a March 26 response to a November request (https://www.wyden.senate.gov/imo/media/doc/wyden-rogue-imsi-catcher-letter-to-dhs.pdf) from Oregon Sen. Ron Wyden (D), however the agency did not say how many devices were detected or where they found them.
The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly. -AP (https://apnews.com/d716aac4ad744b4cae3c6b13dce12d7e?utm_campaign=Soci alFlow&utm_source=Twitter&utm_medium=AP&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true&__twitter_impression=true)
American intelligence and law enforcement agencies use similar eavesdropping equipment in the field, which can cost anywhere between $1,000 to around $200,000. The devices are typically the size of a briefcase but can be as small as a cell phone. Police use Stingrays to track down and implicate perpetrators of mainly domestic crimes.
The devices can be mounted in vehicles, drones, helicopters, and airplanes, allowing police to gain highly specific information on the location of any particular phone, down to a particular apartment complex or hotel room.
The Stingray units operate by tricking a cellular device into locking onto them instead of a legitimate cell tower - revealing the exact location of a particular phone. As AP notes, more sophisticated versions can eavesdrop on calls by forcing phones to step down to the older, unencrypted 2G wireless channel. Other Stingray devices can plant malware on a phone.
https://www.zerohedge.com/sites/default/files/inline-images/IMG_20170927_095405_179_0.jpg
https://www.zerohedge.com/sites/default/files/inline-images/20171129_stingray_0_0.jpg
Thousands of members of the military, the NSA, the CIA, the FBI and the rest of the national-security apparatus live and work in the Washington area. The surveillance-savvy among them encrypt their phone and data communications and employ electronic countermeasures. But unsuspecting citizens could fall prey. -AP
The DHS reply from official Christopher Krebs said that the agency had observed "anomalous activity" consistent with Stingrays in the Washington area. Another DHS official speaking anonymously to AP says that the devices were detected during a three-month trial of equipment (https://www.rsaconference.com/videos/project-overwatch-multinational-effort-to-combat-imsi-catchers) provided by Las Vegas-based agency contractor, ESD America (http://esdamerica.com/).
More at: https://www.zerohedge.com/news/2018-04-03/rogue-network-cellular-eavesdropping-devices-discovered-throughout-dc