Jump to content
  • Sign Up
2many secrets

Cellphone Sniffing: There’s “unusual surveillance activity” around D.C

Recommended Posts

Posted (edited)

I love these stories..  All the "Player Countries" spy on each other. Most in the US and our friends use Harris gear for cell snooping. The Russians have some really good tools too. I haven't been able to find out much about their hardware, an area of interest. If anyone can direct me to published info on the Russian Cell Sniffing hardware, I would love to read it. Israel has, what's likely, the best gear in this arena. I don't think anyone will publish anything about what they have or what they do.  2ms

 

 

There’s “unusual surveillance activity” around D.C. and senators want answers

By Melissa Locker1 minute Read

Fast Company |

In a story straight out of Spy vs Spy, unusual cellular activity has been detected around Capitol Hill, and now four U.S. Senators want some answers.

A bipartisan group of senators sent a letter to Homeland Security asking for details about the cellular activity. The surveillance activity is akin to so-called stingrays that are used by law enforcement agencies to trick suspects’ cellphones into revealing their locations, according to Reuters

https://www.fastcompany.com/40560807/theres-unusual-surveillance-activity-around-d-c-and-senators-want-answers

Edited by 2many secrets

Share this post


Link to post
Share on other sites

Homeland Security did not immediately comment, but said in a March 26 letter to Wyden that DHS "has observed anomalous activity in the National Capital Region that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers. (DHS) has not validated or attributed such activity to specific entities or devices".

http://wsau.com/news/articles/2018/apr/18/four-us-senators-seek-details-on-unusual-cellular-surveillance-in-dc-area/

 

Share this post


Link to post
Share on other sites
Posted (edited)
9 minutes ago, apache54 said:

There is more electronic equipment in DC than in silicon valley warehouses!!! LOL

I bet hardware can be brought in vis Diplomatic Exclusion Laws? 

Edited by 2many secrets

Share this post


Link to post
Share on other sites

DC's Stingray Mess Won't Get Cleaned Up

Lily Hay Newman

WIRED |

Last week, the Department of Homeland Security confirmed for the first time that it is aware of unauthorized cell-site simulators, the surveillance tools often called stingrays or IMSI Catchers, in various parts of Washington DC.

While it's not surprising that foreign intelligence groups or criminal actors would be cell-snooping in the nation's capital, the DHS statement is the first US government acknowledgement that sensitive political communications, not to mention those of anyone in DC, are at risk of interception by devices that are currently unaccounted for. In spite of this step, though, observers find it unlikely that any group will move to defuse the threat in the foreseeable future.

The DHS statement came in the form of a response to senator Ron Wyden, who had inquired about rogue cell-site simulators in a November letter. DHS acting undersecretary Christopher Krebs wrote, "Use of IMSI catchers by malicious actors to track and monitor cellular users is unlawful and threatens the security of communications, resulting in safety, economic, and privacy risks. ... Overall, [DHS's National Protection and Programs Directorate] believes the malicious use of IMSI catchers is a real and growing risk." The agency added that NPPD "has observed anomalous activity in the Nation Capital Region that appears to be consistent with IMSI catchers. NPPD has not validated or attributed such activity to specific entities or devices."

https://www.wired.com/story/dcs-stingray-dhs-surveillance/

 

My bold emphasis 2ms

Share this post


Link to post
Share on other sites

probly wont find much about russian tech hiden they are kinda black and white on this kinda thing

ether there boasting showing off and exagerating or absolutaly nothing

 

id also first suspect israle before russia anything important would be highaly incrypted ... tho that txt to your mistress not so much

 

  • Like 1

Share this post


Link to post
Share on other sites
15 minutes ago, apache54 said:

There is more electronic equipment in DC than in silicon valley warehouses!!! LOL

The Black Market Dealers Selling Tactical Surveillance Equipment Online

Motherboard |

IMSI catchers are used by law enforcement, but some companies appear willing to sell to private individuals too.

Across a tinny Skype connection, a Hong Kong tech company is trying to sell us state surveillance equipment.

"I switched it on already," says Edward Tian, holding up a backpack containing a box and wires. "This is the antenna. This is the battery […] Everything is this simple."

It's a $15,000 IMSI catcher operated via an Android app. Tian shows us the user interface in a grainy video. He hits a button on the app and information on a bunch of cellphones in the area trickles down the screen. He has their IMSI (International Mobile Subscriber Identity, a unique identifier for their SIM card), IMEI (International Mobile Equipment Identity—the same for their device), and even full phone numbers.

https://motherboard.vice.com/en_us/article/wnx57m/the-black-market-dealers-selling-state-surveillance-equipment-online

Share this post


Link to post
Share on other sites
Posted (edited)

This article is pretty interesting. Good info for those interested in the technology and it's behavior.

 

Who catches the IMSI catchers? Researchers demonstrate Stingray detection kit

Devin Coldewey@techcrunch / Jun 2, 2017commentComment

TechCrunch |

IMSI catchers, devices used to spoof cell towers and intercept communications, are one of the most resented open secrets of law enforcement. Strict non-disclosure agreements prevent them from being acknowledged as existing, let alone being used — but researchers think they’ve found a way to spot the shady signal-snatchers.

The devices, colloquially called Stingrays after a common model, work by sending out signals much like cell towers do; cell phones connect, identify themselves and send information like texts and calls through the fake tower, creating a sort of mobile wiretap. Critics have argued that innocent people’s data is caught up in this dragnet, but law enforcement has been less than forthcoming owing to gag orders from the companies that provide the devices.

What’s needed is an independent method of identifying IMSI catchers in the wild. That’s what University of Washington researchers Peter Ney and Ian Smith have attempted to create with SeaGlass.

“Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to informed public discussion,” explained Ney in a UW news release. “Having additional, independent and credible sources of information on cell-site simulators is critical to understanding how — and how responsibly — they are being used.”

https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/

 

https://seaglass.cs.washington.edu/

Edited by 2many secrets

Share this post


Link to post
Share on other sites
5 hours ago, apache54 said:

There is more electronic equipment in DC than in silicon valley warehouses!!! LOL

Especially with NSA in nearby Maryland.

Share this post


Link to post
Share on other sites
9 hours ago, Zing said:

Especially with NSA in nearby Maryland.

DC,

is completely wired, ANYTHING you say is heard and seen there, IF you were to make say some wrong things about certain things to close to the white house and you were taken seriously, you would be surprised how fast they would be there to talk to you. :D

  • Like 1

Share this post


Link to post
Share on other sites

Your content will need to be approved by a moderator

Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.