Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam.
Recent leaks and public records requests have revealed that law enforcement in many U.S. cities have used the surveillance devices to locate suspects or hunt for illegal activity. But despite extensive public debate about their use and privacy implications, little is known about how comprehensively International Mobile Subscriber Identity- (IMSI) catchers — also known as cell-site simulators or Stingrays — are being used by governments, hackers or criminals in any given city.
University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used. The new system is described in a paper to be published in June 2017 in Proceedings on Privacy Enhancing Technologies.
“Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to informed public discussion,” said co-lead author Peter Ney, a doctoral student at the Allen School of Computer Science & Engineering at the UW. “Having additional, independent and credible sources of information on cell-site simulators is critical to understanding how — and how responsibly — they are being used.”
During a two-month deployment in which SeaGlass sensors were installed in 15 ridesharing vehicles in Seattle and Milwaukee, researchers identified dozens of anomalies that were consistent with patterns one might expect from cell-site simulators.
However, researchers cautioned, without corroborating evidence from public records requests or other documentation about where cell-site simulators are being used — or suspicious activity seen over a longer period of time — they cannot definitively say the signals came from IMSI-catchers.
“In this space there’s a lot of speculation, so we want to be careful about our conclusions. We did find weird and interesting patterns at certain locations that match what we would expect to see from a cell-site simulator, but that’s as much as we can say from an initial pilot study,” co-lead author Ian Smith, a former Allen School research scientist. “But we think that SeaGlass is a promising technology that — with wider deployment — can be used to help empower citizens and communities to monitor this type of surveillance.”
Cell-site simulators work by pretending to be a legitimate cell tower that a phone would normally communicate with, and tricking the phone into sending back identifying information about its location and how it is communicating. The portable surveillance devices now range in size from a walkie-talkie to a suitcase, and in price from several thousand to hundreds of thousands of dollars.
Law enforcement teams in the U.S. have used the technology to locate people of interest, to find equipment used in the commission of crimes and even to collect massive amounts of cell phone data from airplanes. Even less is known about how spies or cyber criminals are deploying them worldwide, especially as models become more affordable or able to be built in a hacker’s garage.
SeaGlass sensors are made with off-the-shelf parts that are packed into a box and installed in a vehicle’s trunk, with antennas placed on or near windows.
To catch these IMSI-catchers in the act, SeaGlass uses sensors built from off-the-shelf parts that can be installed in vehicles — ideally ones that drive long hours and to many parts of a city, such as ridesharing vehicles or other fleets. The sensors pick up signals broadcast from the existing cell tower network, which remain fairly constant. Then SeaGlass aggregates that data over time to create a baseline map of “normal” cell tower behavior.
The team from the UW Security and Privacy Research Lab developed algorithms and other methods to detect irregularities in the cellular network that can expose the presence of a simulator. These include a strong signal in an odd spot or at an odd frequency that has never been there before, “temporary” towers that disappear after a short time and signal configurations that are different from what a carrier would normally transmit.
Allen School doctoral student and co-author Gabriel Cadamuro built statistical models to help find anomalies in the data. The team’s survey approach differs from existing apps that attempt to detect attacks from a cell-site simulator on an individual’s phone.
“We’re looking at the whole cellular landscape and pinpointing discrepancies in data, while the apps for the most part are guessing at how a cell-site simulator would act with a phone,” said Ney.
Co-author and Allen School professor Tadayoshi Kohno added, “We’ve demonstrated that SeaGlass is effective in detecting these irregularities and narrowing the universe of things people might want to investigate further.”
For instance, around an immigration services building south of Seattle run by the U.S. Department of Homeland Security, SeaGlass detected a cell tower that transmitted on six different frequencies over the two-month period. That was notable because 96 percent of all other base cell towers broadcast on a single channel, and the other 4 percent only used two or three channels.
The team also detected an odd signal near the Seattle-Tacoma International airport with suspicious properties that were markedly different from those normally used by network providers.
Those patterns would make sense if a mimicking cell-site simulator were operating in those areas, the researchers said, but further investigation would be necessary to definitively reach that conclusion.
“This issue is bigger than one team of researchers,” said Smith. “We’re eager to push this out into the community and find partners who can crowdsource.
The Latest Bing News on:
Cell phone surveillance
- Hi-tech spy van uses AI to spot drivers on phones and not wearing seatbeltson July 30, 2022 at 11:54 pm
The equipment will also detect road users not wearing seatbelts, who will face fines or warnings about their dangerous conduct ...
- Surveillance Footage Offers Closer Look at Suspect Who Allegedly Sexually Assaulted Teen in Lincoln Acreson July 29, 2022 at 12:25 pm
Investigators are seeking the public’s help in finding a sexual assault suspect Wednesday after a teenage girl was attacked in Lincoln Acres.
- 3 Signs Of Phone Tracking To Look Out Foron July 28, 2022 at 5:28 am
Nowadays, more and more people confront the invasion of their privacy. Hacking methods are constantly developing, so protecting our devices ...
- Lexington bank robbery suspect ID’d from cell phone left behind, turns himself inon July 27, 2022 at 6:04 am
Just over an hour after police identified a man wanted in connection to a Lexington bank robbery, police announced that the suspect had turned himself in. Lexington police identified the suspect ...
- Surveillance is pervasiveon July 26, 2022 at 10:14 pm
The U.S. has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They’re also used to screen ...
- Video of downtown assault highlights organization of cell phone thefton July 26, 2022 at 4:57 pm
The son of a retired police chief was knocked unconscious after thieves took his phone and quickly handed it off to two different people ...
- Israeli-made surveillance malware targeted my phone - Greek politicianon July 26, 2022 at 8:18 am
"The revelation of those hiding behind such sick practices ... is not a personal issue but my democratic duty," Androulakis said.
- Greek socialist leader files complaint over attempted phone buggingon July 26, 2022 at 3:31 am
The leader of Greece's socialist opposition PASOK party filed a complaint with the country's top court prosecutors on Tuesday over an attempted bugging of his mobile phone with surveillance software.
- Officeworks customers enraged over sign about mobile phone location monitoringon July 22, 2022 at 1:52 pm
An Officeworks customer has complained over a sign seen outside a Sydney store, which advised customers of the retailer’s trial of a “mobile phone location monitoring” program.
- The DHS Bought a ‘Shocking Amount’ of Phone-Tracking Dataon July 20, 2022 at 1:00 pm
The ACLU released a trove of documents showing how Homeland Security contracted with surveillance companies to scour location information.
The Latest Google Headlines on:
Cell phone surveillance
The Latest Bing News on:
- For Your Safety: Are your electronic devices telling on you?on August 1, 2022 at 5:05 pm
It is said that in today’s world, cyber threats will most likely surpass terrorism as our country’s top concern.
- NYPD ordered to disclose thousands of docs related to facial recognition surveillance during Black Lives Matter protestson August 1, 2022 at 4:30 pm
The NYPD must disclose thousands of documents and emails revealing facial recognition surveillance of Black Lives Matter protesters in 2020, a judge has ruled. The case, brought by Amnesty ...
- NYPD must release 2,700 documents on surveillance of Black Lives Matter activists, or say why it can't: judgeon August 1, 2022 at 1:19 pm
The judge rejected the New York Police Department's claim that turning over emails related to facial recognition technology would be too heavy a lift.
- High-risk Colombians say GPS devices only add to dangerson August 1, 2022 at 7:06 am
The bulletproof vehicles that Colombia’s government assigns to hundreds of high-risk individuals are supposed to make them safer. But when an investigative reporter discovered they all had GPS ...
- Surveillance is pervasive: Yes, you are being watched, even if no one is looking for youon July 22, 2022 at 7:30 am
Most Americans are aware of video surveillance of public spaces. Likewise, most people know about online tracking – and want Congress to do something about it. But as a researcher who studies digital ...
- Global Video Surveillance Equipment And Services Market 2022 Size Estimation, Trend Analysis, and Competitive Landscape Forecast to 2028on July 18, 2022 at 7:49 pm
The research has devised a simple yet efficient method for analyzing the Video Surveillance Equipment And Services market's strengths, weaknesses, opportunities, and threats. The research also ...
- All Light, Everywhere review – probing study of the weaponisation of surveillance techon July 18, 2022 at 5:23 am
Like the neurology of human perception, the recording devices used by police forces ... Anthony’s film exposes how these surveillance gadgets are designed for the protection of state interests ...
- The unconscionable prosecution of Bernard Collaery was an assault on the values Australia holds dearon July 12, 2022 at 12:55 am
In 2004, at former foreign minister Alexander Downer’s behest, the Australian Secret Intelligence Service (ASIS) planted surveillance devices in the Palacio Governo, the building that housed the ...
- Modern Device Management: Smart Business for Integratorson July 11, 2022 at 7:59 am
Today’s network security devices – including cameras, access control, intercoms and audio devices – are capable of more than ever before, and they are a part of complex system integrations.
- Apple slaps hard against ‘mercenary’ surveillance-as-a-service industryon July 9, 2022 at 6:00 am
The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices. Apple has struck ...