When sincerely concerned about stingray devices it might be a better idea to either invest in a professional detection appliance or to install applications such as AIMSICD. ( foss/free)
If you only deny 2g connectivity; it provides no certainty against being stung and you won't know if you are a target.<p><a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector" rel="nofollow">https://github.com/CellularPrivacy/Android-IMSI-Catcher-Dete...</a>
> So they stand between you and the tower and sift through the transmission first. This means they can now intercept data on that transmission. I don’t know what they can do with it, and there is no real clear information on what data they can get. They do say metadata and access the cellphones internal storage, so that is enough to want to block the Stingray.<p>Cellphones internal storage? Seriously?
On modern phones Stingray devices are just one of the many tools that can be used to gain access to private communications and data. Any app requiring access permissions to everything is a potential vulnerability that can be exploited by 3rd parties (not to mention closed blobs etc); in this context smartphones are all things considered much more vulnerable than old 2G ones.
Not being a target of interest for the police myself, I will rather trust my old obsolete 2G only dumb phone because the chances of it being spied upon by Google, Microsoft, Apple, Facebook etc. and associated parties are zero, zero, zero and zero.
It’s worth pointing out that even the author admits that the newer Stingray II has 3G/4G support. I think this is probably related to known insecurities in the AKA protocol, as researchers have recently found [1]. It looks like call interception isn’t so straight forward anymore, but IMSI capture and approximate location capture are alive and well.<p>So unless you can verify that only Stingray I is deployed in the vicinity, I think it’s a stretch to say that the Stingray product “doesn’t care” about anything other than 2G.<p>[1] <a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf" rel="nofollow">https://www.blackhat.com/docs/us-17/wednesday/us-17-Borgaonk...</a>
Works on some mediatek based phones<p><a href="https://play.google.com/store/apps/details?id=kz.galan.antispy" rel="nofollow">https://play.google.com/store/apps/details?id=kz.galan.antis...</a>
What might me important for some reader: shutting off 2G services means that you won't have telephone voice services, if your operator doesn't support voLTE.
Don't all phones have this in "Settings"?<p>e.g. Settings-Connections-MobileNetworks-NetworkMode<p>Also, will my phone even bother with 2G if LTE, 4G, or 3G is available?
If you are having trouble accessing the <i>#</i>#4636#<i>#</i> menu (I had on my international S9+) this app got me into the menu: <a href="https://play.google.com/store/apps/details?id=com.samseen.networkswitch&rdid=com.samseen.networkswitch" rel="nofollow">https://play.google.com/store/apps/details?id=com.samseen.ne...</a>