TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

ACLU sues Homeland Security over 'stingray' cell phone surveillance

730 pointsby mindgam3over 5 years ago

16 comments

mLubyover 5 years ago
If we had a crowd-sourced database of cell towers (picture &amp; coordinates) wouldn&#x27;t it then be straightforward to know (and report) when your phone <i>wasn&#x27;t</i> connecting to a legitimate tower?<p>I for one want to make sure the <i>criminals</i> aren&#x27;t intercepting my signal with home-made stingrays; the police have other lawful ways to get what they need.
评论 #21771561 未加载
评论 #21768376 未加载
评论 #21768338 未加载
评论 #21769289 未加载
abeppuover 5 years ago
Some informed person can probably tell us: are there any technical developments on the horizon which could plausibly make stingrays unviable? From a lay perspective, it seems like cell tech hasn&#x27;t been designed to meet some criteria that ought to be achievable.<p>- Are there future cell technology standards being planned which would make it harder for a 3rd party device to impersonate a cell tower? (e.g. the police would actively need the cell network to help them sign something)<p>- Why can&#x27;t we encrypt calls and texts in a way which doesn&#x27;t let all this stuff get read? Like (handwaving) either trust the network and encrypt with a key they provide, or else some form end-to-end encryption (where maybe generating keys is part of what happens when you activate a sim card or something)?<p>Like, sure the lawsuits are important, but why did we end up with a system where these tools are possible?
评论 #21768903 未加载
评论 #21767958 未加载
评论 #21767145 未加载
评论 #21766997 未加载
评论 #21766961 未加载
评论 #21768413 未加载
chishakuover 5 years ago
Contribute to the ACLU here:<p><a href="https:&#x2F;&#x2F;action.aclu.org&#x2F;give&#x2F;now" rel="nofollow">https:&#x2F;&#x2F;action.aclu.org&#x2F;give&#x2F;now</a>
评论 #21767978 未加载
评论 #21769564 未加载
评论 #21774124 未加载
syshumover 5 years ago
Hopefully, this puts to rest the idea that government can use &quot;private contracts&quot; as a end-run around constitutional and legal restrictions on their activity<p>They have been hiding behind the NDA as a reason they should not have to follow federal disclosure laws, but never in the history of the law has a private contract superceeded the law itself.<p>they also hide behind these same NDA&#x27;s when criminal defendants get to court and want to challenge the use of the tech on 4th amendment grounds<p>Hopefully the ACLU can put a end to that, the government should not be able to contract with any organization that prevents them from disclosing their activity to the public. Seems law enfrocement has lost sight of who they awnser to, which should be the people of this nation
评论 #21767100 未加载
评论 #21766637 未加载
calibasover 5 years ago
Stingray use requires a warrant and every case should be dismissed where one was used without a warrant. I&#x27;m sure that&#x27;s the main reason they want to hide the use of stingrays, they know they&#x27;re doing something wrong.<p>Police having the ability to spy on everyone with little to no oversight is nightmarish authoritarianism, it&#x27;s completely against the spirit of American democracy, not to mention in violation of The Constitution.
评论 #21767228 未加载
评论 #21766671 未加载
评论 #21766933 未加载
评论 #21766773 未加载
评论 #21770258 未加载
评论 #21767588 未加载
评论 #21767093 未加载
RandomGuyDTBover 5 years ago
Stingrays have been known to be used by law enforcement for a decade now. It&#x27;s about bloody time more information than just &quot;they are used&quot; is opened to the public.
评论 #21769892 未加载
caconym_over 5 years ago
Presumably Homeland Security and its child agencies are targeting everybody within 100 miles of a border (~65% of the population) with any and every form of surveillance they can think of, because why not? It&#x27;s very legal, and very cool.
评论 #21766517 未加载
评论 #21768532 未加载
评论 #21766372 未加载
zw123456over 5 years ago
Generally if the RSRP or RSSI increases significantly that is a dead give away you are on a stingray. You don&#x27;t really need an app to see that (google how to see it for your phone type). Of course, it is always possible that your carrier just turned up a new site closer to you but that is not something that happens often and you can usually notice it.<p>Some comments about mm-wave 5G, keep in mind that mm-wave != 5G. But on mm-wave stingray becomes more difficult due to the high directionality of short wavelengths. But at lower bands, there is no advantage of 5G over 4G in terms of resilience over stingray types of attacks (which are basically a L1 middleman attack, similar to age old wifi types of spoofs).
评论 #21772474 未加载
jokoonover 5 years ago
Knowing Bellard managed to build a 3G cell tower just by using a cheap antenna, I guess it means anybody can build a stingray, although connecting to the cellphone network might not be a trivial thing to do. No idea how companies secure their networks, and I wonder if there are security standard about it.
评论 #21768484 未加载
rolphover 5 years ago
after reading through the comments i found this on hackaday, its from 2018; seems germaine to the current topics in thread:<p><a href="https:&#x2F;&#x2F;hackaday.com&#x2F;tag&#x2F;stingray&#x2F;" rel="nofollow">https:&#x2F;&#x2F;hackaday.com&#x2F;tag&#x2F;stingray&#x2F;</a><p>the first paragraph is an intro speech of sorts then the real content begins. There is an interesting article linked in that part so i want to bring it to the fore.<p><a href="https:&#x2F;&#x2F;www.eff.org&#x2F;deeplinks&#x2F;2018&#x2F;04&#x2F;dhs-confirms-presence-cell-site-simulators-us-capitol" rel="nofollow">https:&#x2F;&#x2F;www.eff.org&#x2F;deeplinks&#x2F;2018&#x2F;04&#x2F;dhs-confirms-presence-...</a><p>it seems that a number of factions may have been using &quot;stingray&quot; devices and thier contemporary equivalents for some time.
ga-vuover 5 years ago
Source: <a href="https:&#x2F;&#x2F;www.aclu.org&#x2F;news&#x2F;privacy-technology&#x2F;ice-and-cbp-are-secretly-tracking-us-using-stingrays-were-suing&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.aclu.org&#x2F;news&#x2F;privacy-technology&#x2F;ice-and-cbp-are...</a><p>For more insight and details.
greyhairover 5 years ago
I have a femtocell in my home, because my small neighborhood sits in a dead zone. Not a repeater, a full femtocell.<p>To the casual security conscious user, that is probably going to look like a &#x27;stingray&#x27;, since you will be walking down the street with a gradually dropping RSSI, when all at once, boom, you walk into a five bar signal and life is good.<p>It covers about a 300 ft radius with the most blessedly beautiful signal you can imagine. Maxes out at 100Mb&#x2F;S, since that is all the backhaul it gets from the ISP where it is connected. (Not that I am complaining about 100&#x2F;100 in the house.)<p>But it isn&#x27;t a Stingray. It is a fully secure registered femtocell base station.<p>Given that it hasn&#x27;t moved in five years, it may well be on someone&#x27;s map of established cell towers.
评论 #21776232 未加载
ljmover 5 years ago
Watch Mr Robot and see this in action
tylerjwilk00over 5 years ago
This made me wonder,<p>Do spoofed callers appear on a capture device as the spoofed number?<p>If so, you could in theory use law to target anyone by calling their number using a spoofed number that is included on a surveillance order. Just keep calling the numbers you want to monitor and the net keeps getting bigger.<p>Please tell me this is not the case?
评论 #21767211 未加载
kickover 5 years ago
Is it just me, or has the ACLU been on a roll lately? I&#x27;m really enjoying its current direction. It might have just been that the most controversial headlines were getting the most airtime, but it seemed to be going off the tracks for a while.
评论 #21766534 未加载
评论 #21766833 未加载
no_opinionsover 5 years ago
Why not focus policies around using the surveillance tools?<p>The tools should be as powerful as possible. To keep people safe, shouldn&#x27;t infrastructure be powerful enough to tap anything instantly with proper authorization, even backward in time? Why not?<p>Then we&#x27;re focused on making rules better. Isn&#x27;t that the best thing to do in a system of laws and standards?<p>Imagine if you could change any aspect of the system to make it more proportional, fair, ethical, whatever. Why not think about asking the right questions, weighing the pros and cons, and tailoring a way to improve it with minimum side effects?<p>Also, sometimes the regulations are so strict, it&#x27;s dangerous.<p>For instance, here&#x27;s an example where the rules around stingrays being so strict led a guy to get away with murder (in eyes of the judge):<p>&gt; Circuit Judge Yolanda Tanner said in court Monday that while she is suppressing the evidence “with great reluctance,” Copes is “likely guilty.” <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;tech-policy&#x2F;2016&#x2F;04&#x2F;citing-unconstitutional-search-via-stingray-judge-suppresses-murder-evidence&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;tech-policy&#x2F;2016&#x2F;04&#x2F;citing-unconstit...</a><p>I wonder what it would have been like had that case been in Florida. Which has sweet inevitable evidence law.
评论 #21768931 未加载