Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam.
Recent leaks and public records requests have revealed that law enforcement in many U.S. cities have used the surveillance devices to locate suspects or hunt for illegal activity. But despite extensive public debate about their use and privacy implications, little is known about how comprehensively International Mobile Subscriber Identity- (IMSI) catchers — also known as cell-site simulators or Stingrays — are being used by governments, hackers or criminals in any given city.
University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used. The new system is described in a paper to be published in June 2017 in Proceedings on Privacy Enhancing Technologies.
“Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to informed public discussion,” said co-lead author Peter Ney, a doctoral student at the Allen School of Computer Science & Engineering at the UW. “Having additional, independent and credible sources of information on cell-site simulators is critical to understanding how — and how responsibly — they are being used.”
During a two-month deployment in which SeaGlass sensors were installed in 15 ridesharing vehicles in Seattle and Milwaukee, researchers identified dozens of anomalies that were consistent with patterns one might expect from cell-site simulators.
However, researchers cautioned, without corroborating evidence from public records requests or other documentation about where cell-site simulators are being used — or suspicious activity seen over a longer period of time — they cannot definitively say the signals came from IMSI-catchers.
“In this space there’s a lot of speculation, so we want to be careful about our conclusions. We did find weird and interesting patterns at certain locations that match what we would expect to see from a cell-site simulator, but that’s as much as we can say from an initial pilot study,” co-lead author Ian Smith, a former Allen School research scientist. “But we think that SeaGlass is a promising technology that — with wider deployment — can be used to help empower citizens and communities to monitor this type of surveillance.”
Cell-site simulators work by pretending to be a legitimate cell tower that a phone would normally communicate with, and tricking the phone into sending back identifying information about its location and how it is communicating. The portable surveillance devices now range in size from a walkie-talkie to a suitcase, and in price from several thousand to hundreds of thousands of dollars.
Law enforcement teams in the U.S. have used the technology to locate people of interest, to find equipment used in the commission of crimes and even to collect massive amounts of cell phone data from airplanes. Even less is known about how spies or cyber criminals are deploying them worldwide, especially as models become more affordable or able to be built in a hacker’s garage.
SeaGlass sensors are made with off-the-shelf parts that are packed into a box and installed in a vehicle’s trunk, with antennas placed on or near windows.
To catch these IMSI-catchers in the act, SeaGlass uses sensors built from off-the-shelf parts that can be installed in vehicles — ideally ones that drive long hours and to many parts of a city, such as ridesharing vehicles or other fleets. The sensors pick up signals broadcast from the existing cell tower network, which remain fairly constant. Then SeaGlass aggregates that data over time to create a baseline map of “normal” cell tower behavior.
The team from the UW Security and Privacy Research Lab developed algorithms and other methods to detect irregularities in the cellular network that can expose the presence of a simulator. These include a strong signal in an odd spot or at an odd frequency that has never been there before, “temporary” towers that disappear after a short time and signal configurations that are different from what a carrier would normally transmit.
Allen School doctoral student and co-author Gabriel Cadamuro built statistical models to help find anomalies in the data. The team’s survey approach differs from existing apps that attempt to detect attacks from a cell-site simulator on an individual’s phone.
“We’re looking at the whole cellular landscape and pinpointing discrepancies in data, while the apps for the most part are guessing at how a cell-site simulator would act with a phone,” said Ney.
Co-author and Allen School professor Tadayoshi Kohno added, “We’ve demonstrated that SeaGlass is effective in detecting these irregularities and narrowing the universe of things people might want to investigate further.”
For instance, around an immigration services building south of Seattle run by the U.S. Department of Homeland Security, SeaGlass detected a cell tower that transmitted on six different frequencies over the two-month period. That was notable because 96 percent of all other base cell towers broadcast on a single channel, and the other 4 percent only used two or three channels.
The team also detected an odd signal near the Seattle-Tacoma International airport with suspicious properties that were markedly different from those normally used by network providers.
Those patterns would make sense if a mimicking cell-site simulator were operating in those areas, the researchers said, but further investigation would be necessary to definitively reach that conclusion.
“This issue is bigger than one team of researchers,” said Smith. “We’re eager to push this out into the community and find partners who can crowdsource.
The Latest Bing News on:
Cell phone surveillance
- Surveillance images appear to show 3-year-old days before disappearanceon March 1, 2024 at 10:02 pm
New surveillance images obtained by WISN 12 News appear to show a missing 3-year-old just days before he vanished.The boyfriend of Elijah's mother, Jesse Vang, reported the child missing Feb. 20 in ...
- Appeal in murder of Naval Academy mother Michelle Cummings challenges body-cam, surveillance evidenceon March 1, 2024 at 11:33 am
Arguments appealing Angelo Harrod’s conviction in the shooting death of Michelle Cummings were heard in the Appellate Court of Maryland Friday.
- Police arrested journalists as part of surveillance operation to identify confidential sourceson February 28, 2024 at 9:00 pm
Durham Police and the Police Service of Northern Ireland (PSNI) made “repeated and entirely unjustified” attempts to put two journalists under surveillance without seeking judicial authorization, a ...
- Spyware found on phones in Jordanon February 28, 2024 at 7:30 am
According to a recent report, dozens of journalists, human rights workers and political activists in Jordan have been targeted with Pegasus spyware over the past few years. It's one of the most ...
- Codes to Verify Hacked or Tapped Cell Phoneon February 26, 2024 at 9:18 pm
This protocol functions through certain codes, known as USSD codes, available on a mobile phone. These codes feature a text of up to 182 alphanumeric characters and are used to establish a ...
- Is AT&T down? Reports of nationwide outages may also be impacting Verizon and T-Mobileon February 22, 2024 at 12:22 pm
Customers with cellular service through AT&T may be impacted by massive nationwide outages, which could also be impacting Verizon and T-Mobile users, according to Downdetector, a real-time outage ...
- AT&T, other mobile providers suffer widespread outageson February 22, 2024 at 10:47 am
Cellphone customers reported nearly 90,000 issues with their devices, affecting mostly AT&T users, Thursday morning and officials continued to investigate.
- Select cellular services reportedly down nationwideon February 22, 2024 at 9:29 am
LAREDO, Tex. (KGNS) - Customers of cellular services nationwide, including AT&T , T-Mobile and Verizon, have reported through social media that their phone service is down. It’s unclear how many ...
- AT&T, more cellular users report outages nationwideon February 22, 2024 at 5:39 am
According to downdetector.com, AT&T, T-Mobile, Verizon and other cellular network users reported outages starting around 4 a.m. The outage tracking website’s “heat maps” show outages reported in New ...
- IHC seeks answers on phone surveillanceon February 19, 2024 at 4:00 pm
“The director-general of the IB must inform us who can conduct surveillance on the citizens ... be taken to secure the calls and data of mobile phone users,” Justice Sattar added.
The Latest Google Headlines on:
Cell phone surveillance
[google_news title=”” keyword=”cell phone surveillance” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
The Latest Bing News on:
- China unveils chilling new surveillance device set to revolutionise electronic warfareon March 2, 2024 at 3:56 am
Chinese researchers recently announced the creation of a cutting-edge military surveillance tool that has the potential to greatly improve China's electronic warfare capabilities. This device operates ...
- Potential spy balloon found by fishermen off the coast of Alaska is being delivered to the FBI for examinationon March 1, 2024 at 8:30 pm
A group of Alaskan commercial fishermen discovered a possible surveillance balloon that will be delivered to the FBI for further investigation, per CNN.
- Alaskan fishermen to handover yet another possible spy balloon to fedson March 1, 2024 at 3:24 pm
Alaskan fishermen found what US officials will investigate as a potential spy balloon. The commercial fishing vessel will bring the questionable object to shore sometime this weekend, ...
- Popular doorbell cameras found to easily allow hackers to spyon February 29, 2024 at 8:35 pm
Eken and Tuck’s doorbell camera are cheaper options compared to the more popular brands on the market such as Ring, which is owned by Amazon. Both doorbell cameras run for about $15 to $30, most Ring ...
- Some Board of Aldermen members say they're 'determined' to pass bill regulating surveillance technology used by policeon February 29, 2024 at 3:53 pm
It comes a week after St. Louis Mayor Tishaura Jones filed an executive order relating to transparency and accountability for the technology.
- Amazon recommends video doorbells that can let anyone spy on you, report findson February 29, 2024 at 2:00 pm
Researchers said they've found multiple video doorbells with serious security concerns for sale on Amazon, Walmart, and more.
- Progress made in Yuba County skimming device investigationon February 29, 2024 at 1:54 am
Sacramento County Sheriff’s Office seize nearly 100 guns from Elk Grove residence Surveillance footage from the Linda Walmart showed two men installing a skimming device at one of the self-checkout ...
- New surveillance video shows Orlando man stealing Chevy Tahoe before MIA police chaseon February 28, 2024 at 2:16 pm
Police say they arrested a 57-year-old Orlando man after he led police in two counties on a chase that ended at Miami International Airport on Wednesday morning.
- Chinese spy vessels mapped Taiwanese seabed: Is a flash war next?on February 28, 2024 at 5:57 am
Researchers at the Center for Strategic and International Studies (CSIS) have discovered a high-tech Chinese surveillance vessel circumnavigating Taiwan which went unreported in late 2023.Zhu Hai Yun, ...
- Federal judge denies motion to dismiss Green Bay City Hall surveillance lawsuiton February 28, 2024 at 12:07 am
As Action 2 News has reported, the lawsuit claims violations of privacy rights due to the installation of audio surveillance devices in Green Bay City Hall by Mayor Genrich.
The Latest Google Headlines on:
[google_news title=”” keyword=”surveillance devices” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]