TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Americans’ Cellphones Targeted in Secret U.S. Spy Program

252 点作者 dshibarshin超过 10 年前

26 条评论

csoghoian超过 10 年前
The US Marshals are not the only federal law enforcement agency doing something like this. According to documents I obtained through a FOIA in 2012, ICE has purchased an airbourne mounting kit and paid for airbourne training for their Stingray II cell phone tracking gear. See: <a href="https://www.documentcloud.org/documents/479397-#document/p44" rel="nofollow">https:&#x2F;&#x2F;www.documentcloud.org&#x2F;documents&#x2F;479397-#document&#x2F;p44</a><p>Anyone interested in learning more about IMSI catchers and their use by US law enforcement agencies might be interested in this law review article I wrote. <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678" rel="nofollow">http:&#x2F;&#x2F;papers.ssrn.com&#x2F;sol3&#x2F;papers.cfm?abstract_id=2437678</a>
评论 #8605028 未加载
ipsin超过 10 年前
In all seriousness, when police circumvent the existing legal methods for gaining access to information, and when they spy on people without warrants, why should the &quot;normal channels&quot; be left open?<p>Isn&#x27;t it about time to repeal things like CALEA, or to accept that the cost of having a system like this is that it should be the <i>only</i> system?<p>&quot;But we&#x27;re afraid bad guys would act like they live in a surveillance state if they actually knew they lived in a surveillance state!&quot; I... I just don&#x27;t know how to understand that mindset.<p>I know there are evil criminals in the world, and I&#x27;ll bet that having power and dominion over everyone is a fun trip, but it&#x27;s also corrosive to what the US has always pretended to be.
dmix超过 10 年前
There are also IMSI Catchers intercepting GSM all over the USA, for example this twitter feed reported one at SFO airport recently:<p><a href="https://twitter.com/cellhacking/status/524562944928264192" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;cellhacking&#x2F;status&#x2F;524562944928264192</a><p>And all over Washington DC:<p><a href="https://twitter.com/esdamerica/status/512293117052334080" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;esdamerica&#x2F;status&#x2F;512293117052334080</a>
评论 #8608109 未加载
sehugg超过 10 年前
Link is to WSJ paywall; also covered by:<p><a href="http://thehill.com/policy/technology/224129-report-feds-using-airplane-trackers-to-monitor-cellphones" rel="nofollow">http:&#x2F;&#x2F;thehill.com&#x2F;policy&#x2F;technology&#x2F;224129-report-feds-usin...</a><p><a href="http://www.foxnews.com/politics/2014/11/13/secret-us-spy-program-targeted-americans-cell-phones/" rel="nofollow">http:&#x2F;&#x2F;www.foxnews.com&#x2F;politics&#x2F;2014&#x2F;11&#x2F;13&#x2F;secret-us-spy-pro...</a>
mkal_tsr超过 10 年前
Whenever I warn friends about this, I get called a conspiracy theorist :-&#x2F;<p>We have a long way to go in educating the general public about technology, its benefits, and its pitfalls.
r0h1n超过 10 年前
Thinking aloud in terms of a &quot;solution&quot; - is it possible to build crowdsourced blocklists that can be subscribed to by users, and will refuse to let their phones connect to &quot;fake&quot; celltowers?<p>P.S. I&#x27;m not a wireless guy, so I don&#x27;t know if there&#x27;s any kind of a digital giveaway that can distinguish a fake cell tower versus the real one it is spoofing. If there isn&#x27;t, then perhaps the fault lies with existing wireless comm. standards.
评论 #8606488 未加载
评论 #8606987 未加载
declan超过 10 年前
Here are some excerpts from the WSJ paywalled article:<p><i>Cellphones are programmed to connect automatically to the strongest cell tower signal. The device being used by the U.S. Marshals Service identifies itself as having the closest, strongest signal, even though it doesn’t, and forces all the phones that can detect its signal to send in their unique registration information. Even having encryption on one’s phone, such as Apple Co. ’s iPhone 6 now includes, doesn’t prevent this process...<p>The program cuts out phone companies as an intermediary in searching for suspects. Rather than asking a company for cell-tower information to help locate a suspect, which law enforcement has criticized as slow and inaccurate, the government can now get that information itself. People familiar with the program say they do get court orders to search for phones, but it isn’t clear if those orders describe the methods used because the orders are sealed.<p>Also unknown are the steps taken to ensure data collected on innocent people isn’t kept for future examination by investigators. A federal appeals court ruled earlier this year that over-collection of data by investigators, and stockpiling of such data, was a violation of the Constitution.</i><p>This isn&#x27;t exactly new. Harris&#x27; Stingray price list has AIRBRN-KIT-CONUS for sale for $9,000, dating back to 2008: <a href="https://info.publicintelligence.net/Harris-SurveillancePriceList.pdf" rel="nofollow">https:&#x2F;&#x2F;info.publicintelligence.net&#x2F;Harris-SurveillancePrice...</a><p>Here&#x27;s a 2013 post on the so-called DRTBOX: <a href="http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html" rel="nofollow">http:&#x2F;&#x2F;electrospaces.blogspot.com&#x2F;2013&#x2F;11&#x2F;drtbox-and-drt-sur...</a><p>And another blog post from 2013 saying &quot;Immigration and Customs Enforcement (ICE) purchased $3 million worth of Stingrays over several years, and are purchasing airborne mounting kits for both drones and manned aircraft&quot;: <a href="http://gritsforbreakfast.blogspot.com/2013/03/bypassing-telecoms-stingrays-allow.html" rel="nofollow">http:&#x2F;&#x2F;gritsforbreakfast.blogspot.com&#x2F;2013&#x2F;03&#x2F;bypassing-tele...</a><p>An earlier FOIA response from 2012: <a href="http://s3.documentcloud.org/documents/479397/stingrayfoia.txt" rel="nofollow">http:&#x2F;&#x2F;s3.documentcloud.org&#x2F;documents&#x2F;479397&#x2F;stingrayfoia.tx...</a> &quot;The training will cover all of Harris Stringray ll operations from an airborne platform.-Specifically, four students are to attend this special training on three different software packages GSM, and CDM mobile handsets) for the Program... The schedule is more unpredictable due to a large portion of the training taking place in an aircraft.&quot;<p>To summarize: if you live in the U.S.[1], your cell phone info (IMSI etc.) has been slurped up by flying FedGov &quot;dirtboxes&quot; without your knowledge, stored in perpetuity, without any law passed by Congress explicitly authorizing this, in violation of the Constitution&#x27;s Fourth Amendment, and at best authorized by a secret court order from a secret court. Sigh.<p>[1] I presume most of the HN US readers live in or near metro areas, and the WSJ article says the program covers &quot;most of the U.S. population.&quot; Obviously if you&#x27;re in Idaho or Alaska, you&#x27;re less likely to be caught in this particular data vacuum cleaner.
评论 #8605080 未加载
评论 #8606541 未加载
评论 #8604942 未加载
评论 #8605631 未加载
alexggordon超过 10 年前
At a certain point, everyone will realize this has to stop. I&#x27;ve started to wonder though, if the way to beat the government at this is not to try and stop them, but to encrypt things in such a way that they can no longer use technology like this.<p>Personally, one thing I like about open source software, is I can host pretty much whatever I want, whenever I want. If this development path continues, I&#x27;d imagine that eventually, if there might be some entrepreneuring cell company[0] that would simply encrypt it all anonymously.<p>Obviously, this would mean a few changes to the way we do things. For example, maybe instead of triangulating your cellular position in an emergency, iOS and Android could create a &#x27;distress&#x27; api that would allow for emergency services to access your location, and then alert you with the status. To be honest, it would end up working in a similar way as Emergency and Amber alerts on your device[1].<p>Realistically, it probably won&#x27;t happen like this, but if privacy won&#x27;t be given to us, we need to take it.<p>[0] <a href="http://www.artemis.com/" rel="nofollow">http:&#x2F;&#x2F;www.artemis.com&#x2F;</a> [1] <a href="http://support.apple.com/en-us/HT5795" rel="nofollow">http:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;HT5795</a>
评论 #8608256 未加载
fit2rule超过 10 年前
Yeah, well .. here is the thing:<p><i>We</i>, the free people, can build drones and we can also put wifi repeaters on them and we can - instead of sniffing things - actively participate in the construction and maintenance of wide open communication systems, for all to use. Everyone.<p>That is the other end of the scale of all this secrecy and control - there is another end of the NSA conundrum, and its all about open source. So, you know: getting your own local network started, and stop just &#x27;consuming it&#x27; from the powers that be, is sort of a priority folks. If you don&#x27;t want to have a secret oppressor, push to have fewer secrets kept in the world. Its a fact that the corruption of all governments begin with their secrets.<p>So .. as someone who has a fleet of small drones above his head right now, albeit sleeping while the lipo&#x27;s charge, here is a technology I think should be pointed out that is a little less prone to snooping, and with the right kind of neighborhood, gives us all a great amount of freedom to communicate, nevertheless:<p><a href="http://ronja.twibright.com/" rel="nofollow">http:&#x2F;&#x2F;ronja.twibright.com&#x2F;</a><p>Snoop on that, Feds!
ChuckMcM超过 10 年前
My new kickstarter, a cell tower locator and a high power green laser pointer. When ever the device detects a cell tower above 500&#x27; AGL it activates the green laser pointer and directs it at the detected tower signal. :-)
fragsworth超过 10 年前
&gt; A Justice Department official would neither confirm nor deny the existence of such a program. The official said discussion of such matters would allow criminal suspects or foreign powers to determine U.S. surveillance capabilities.<p>This is the go-to defense for surveillance secrecy. However, not discussing such matters allows criminal officials to abuse these powers without repercussion.
评论 #8607023 未加载
coin超过 10 年前
Isn&#x27;t it illegal to transmit on frequencies for which one is not licensed to use?
joering2超过 10 年前
A $9,000 per machine. Is it possible for a civilian to purchase it?<p>Knowing this is unconstitutional and if there are no government laws (shouldn&#x27;t be right?) forbidding you from purchasing it, can I sue them if they refuse to sell me one?<p>Correct me if I&#x27;m wrong but putting this machine around Wall Street (given you know how to sell and buy stocks) would probably get you $9k back in less than a day, hm?<p>I still wonder though, if cellphones technology is secure and traffic encrypted, then how come can they listen to it? Wouldn&#x27;t it be that Verizon or Apple had to give them some sort of keys to open the traffic and read it? (serious question)
评论 #8605541 未加载
评论 #8606884 未加载
guelo超过 10 年前
Let&#x27;s say they&#x27;re flying a Cesna 1,500 feet over a metro area, that could easily be millions of cellphone connections. A regular cell tower can&#x27;t handle that many. I&#x27;m wondering how this could work.
评论 #8605655 未加载
bickfordb超过 10 年前
Seems like you would get an excellent picture of everyone&#x27;s location habits with a small number of flights per city per month.<p>If this is legal, why can&#x27;t they just subpoena carriers for the tower census data?
评论 #8608238 未加载
评论 #8605861 未加载
hindsightbias超过 10 年前
Last year a Cessna (a Skylane or Stationair) orbited the around central SF for several hours over 3 or 4 days. The edge of the track was right over my block. It would drone by every few minutes. It did not have a removed door or anything that would indicate camera platform. The constant orbit wouldn&#x27;t make sense as an photographic mapping platform.<p>It was not on flighttrack, no ADS-B info, and too high to see the N number.
higherpurpose超过 10 年前
Isn&#x27;t it time Google and Apple build some protections inside Android and iOS against this?<p>Maybe do something like what these guys did, but I&#x27;m sure they can come up with even more comprehensive protections:<p><a href="http://www.wired.com/2014/09/cryptophone-firewall-identifies-rogue-cell-towers/" rel="nofollow">http:&#x2F;&#x2F;www.wired.com&#x2F;2014&#x2F;09&#x2F;cryptophone-firewall-identifies...</a>
评论 #8605437 未加载
评论 #8605419 未加载
评论 #8607145 未加载
m0dest超过 10 年前
I understand that you can sniff IMSI without being a recognized carrier. But to actually get a cell phone to join your tower – don&#x27;t you need the carrier&#x27;s keys to be able to authenticate during the tower handshake? (iOS 5+ warns about unencrypted tower connections, so presumably these have to be authenticated UMTS?)<p>If so, should we expect that the carriers surrendered their keys to law enforcement to allow them to run fake cell towers that authentically emulate their networks?
评论 #8606204 未加载
kalleboo超过 10 年前
These are all still using GSM, which doesn&#x27;t authenticate the network right? I really wish I could disable GSM on the iPhone like I could on my Android - none of the networks I regularly use have usable GSM networks. It&#x27;s a waste of battery and a wide open security hole. Plain old classic GSM needs to die. Bring on the UMTS&#x2F;LTE future.
评论 #8607062 未加载
ck2超过 10 年前
This makes me wonder if the government has or is working on drones that hone in on a specific cellphone signal with a specific id after being trained.<p>Not just for tracking but an &quot;icbm&quot; kind of drone. First for military use, then for domestic use like how the police always get military weapon, iris scanners, etc.
评论 #8606396 未加载
somethingnew超过 10 年前
<a href="https://www.kickstarter.com/projects/1760935672/android-cipher-indicator-identify-cell-network-tam" rel="nofollow">https:&#x2F;&#x2F;www.kickstarter.com&#x2F;projects&#x2F;1760935672&#x2F;android-ciph...</a>
drderidder超过 10 年前
Its tragic to see the self-inflicted damage that out-of-control surveillance has caused to the international reputation of the US and its tech industry. Sad.
chatmasta超过 10 年前
At this point, why would a terrorist even use a cellphone?
评论 #8608013 未加载
comrade1超过 10 年前
I think cell antennas have unique identifiers. If true, can you detect when you connect to a tower that isn&#x27;t your usual tower in your usual geographic location (assuming you&#x27;re being targeted at home, for example).<p>And if there is indeed a unique id, can the fake cell take the id of a real cell and still work with the cellphone company, or would it need the cooperation of the cellphone company? (for example, the cell company would look at hops?)<p>I guess it&#x27;s too much to hope that the cellphone companies would try to protect our privacy.<p>Maybe someday we&#x27;ll have police running things similar to license scanners but for cellphone conversations. They&#x27;ll drive around the city recording conversations to detect keywords for illegal activity (herb, drug, murder of crows, etc)<p>EDIT: actually, I don&#x27;t think they need to hijack cellphone connections. They can just listen in - at least they used to be able to. We determined the identities of the bombers of our embassies in Africa in the late-90s through cellphone conversations through RC-135s flying along the Africa coast from Diego Garcia, and an intelligence gathering satellite that drags an antenna behind it.
评论 #8606164 未加载
评论 #8606058 未加载
评论 #8606070 未加载
dang超过 10 年前
We changed the url to one that seems to work, via <a href="https://news.ycombinator.com/item?id=8604931" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8604931</a>.
drcoopster超过 10 年前
Wait, and this is news why?