FBI uses StingRay Technology to get Cellphone Information....

Discussion in 'Freedom and Liberty' started by BTPost, Nov 2, 2012.

  1. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator


    Tracking cell phones by tricking them into operating on a bogus network
    is a law enforcement tactic shrouded in secrecy. Now the FBI is under
    pressure to release information about it-but the bureau doesn't want to
    let go of 25,000 pages of documents on sophisticated cell surveillance

    In an Arizona court case last year it was made public that the FBI had
    used a cell-site simulator in order to track down a suspect. The
    portable equipment, sometimes described as either an I-M-S-I catcher or
    a Stingray, covertly sends out a signal that fools all phones within a
    specific area into connecting to a fake network. The spy tool can
    force targeted phones to release unique identity codes that can then be
    used to track a person's movements in real time.

    But not everyone likes the idea of this type of law enforcement tool
    being used. Among them is the Electronic Privacy Information Center
    which is attempting to obtain internal FBI documents relating to the
    technology. In fact the Center is taking legal action to force the
    prompt disclosure of records concerning Stingray devices or other cell
    site simulator technologies. It alleges that the FBI has failed to
    comply with statutory deadlines by not handing them over quickly enough
    following a freedom of information request made last February.

    For its part, the FBI says that it has found 25,000 pages of documents
    that relate to the request, about 6,000 of which are classified.
    Because of this the agency says that it may need up to three years to
    process the files before they can be released.

    In light of the FCC's recent enforcement activities against cellular
    telephone jamming devices, it will be interesting to see if the
    regulatory agency can or will become involved in this controversial
  2. Quigley_Sharps

    Quigley_Sharps The Badministrator Administrator Founding Member

    I asked if this is how it works from a friend in the industry, above is his answer.
    tulianr likes this.
  3. ColtCarbine

    ColtCarbine Monkey+++ Founding Member

    They are more than likely invading citizen's privacy with more than this technology, this is just what they got caught in the cookie jar with.
    BTPost likes this.
  4. Seacowboys

    Seacowboys Senior Member Founding Member

    As many incidents of privacy abuse that have been documented, suppose the turd hit the fan, just how much consideration to Constitutional protected Liberties do you think they consider before using every tech-tool at their disposal?
  5. VisuTrac

    VisuTrac Ваша мать носит военные ботинки Site Supporter+++

    Ask me again why I should buy a cellphone when i have a wifi enabled pda with pre-microsoft skype installed again? Plus I can change the mac address on my pda at will!
  6. ghrit

    ghrit Bad company Administrator Founding Member

    Nuts to the high tech toys. Go ham. They can find you and collect your comms. However, there are things that can be done for innocuous appearing messages that aren't.
    tulianr and VisuTrac like this.
  7. bpaintx

    bpaintx Monkey+++

    They still require a court order.
  8. VisuTrac

    VisuTrac Ваша мать носит военные ботинки Site Supporter+++

    LMAO! It's the government. Since when did they play by the rules. They are only a suggestion until they get caught, then they beg forgiveness/ignorance or find a scapegoat to take the fall.

    Seriously, they only let you sue them if they want, otherwise, National Security and poof.
    tulianr and oldawg like this.
survivalmonkey SSL seal        survivalmonkey.com warrant canary