Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam.
Recent leaks and public records requests have revealed that law enforcement in many U.S. cities have used the surveillance devices to locate suspects or hunt for illegal activity. But despite extensive public debate about their use and privacy implications, little is known about how comprehensively International Mobile Subscriber Identity- (IMSI) catchers — also known as cell-site simulators or Stingrays — are being used by governments, hackers or criminals in any given city.
University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used. The new system is described in a paper to be published in June 2017 in Proceedings on Privacy Enhancing Technologies.
“Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to informed public discussion,” said co-lead author Peter Ney, a doctoral student at the Allen School of Computer Science & Engineering at the UW. “Having additional, independent and credible sources of information on cell-site simulators is critical to understanding how — and how responsibly — they are being used.”
During a two-month deployment in which SeaGlass sensors were installed in 15 ridesharing vehicles in Seattle and Milwaukee, researchers identified dozens of anomalies that were consistent with patterns one might expect from cell-site simulators.
However, researchers cautioned, without corroborating evidence from public records requests or other documentation about where cell-site simulators are being used — or suspicious activity seen over a longer period of time — they cannot definitively say the signals came from IMSI-catchers.
“In this space there’s a lot of speculation, so we want to be careful about our conclusions. We did find weird and interesting patterns at certain locations that match what we would expect to see from a cell-site simulator, but that’s as much as we can say from an initial pilot study,” co-lead author Ian Smith, a former Allen School research scientist. “But we think that SeaGlass is a promising technology that — with wider deployment — can be used to help empower citizens and communities to monitor this type of surveillance.”
Cell-site simulators work by pretending to be a legitimate cell tower that a phone would normally communicate with, and tricking the phone into sending back identifying information about its location and how it is communicating. The portable surveillance devices now range in size from a walkie-talkie to a suitcase, and in price from several thousand to hundreds of thousands of dollars.
Law enforcement teams in the U.S. have used the technology to locate people of interest, to find equipment used in the commission of crimes and even to collect massive amounts of cell phone data from airplanes. Even less is known about how spies or cyber criminals are deploying them worldwide, especially as models become more affordable or able to be built in a hacker’s garage.
SeaGlass sensors are made with off-the-shelf parts that are packed into a box and installed in a vehicle’s trunk, with antennas placed on or near windows.
To catch these IMSI-catchers in the act, SeaGlass uses sensors built from off-the-shelf parts that can be installed in vehicles — ideally ones that drive long hours and to many parts of a city, such as ridesharing vehicles or other fleets. The sensors pick up signals broadcast from the existing cell tower network, which remain fairly constant. Then SeaGlass aggregates that data over time to create a baseline map of “normal” cell tower behavior.
The team from the UW Security and Privacy Research Lab developed algorithms and other methods to detect irregularities in the cellular network that can expose the presence of a simulator. These include a strong signal in an odd spot or at an odd frequency that has never been there before, “temporary” towers that disappear after a short time and signal configurations that are different from what a carrier would normally transmit.
Allen School doctoral student and co-author Gabriel Cadamuro built statistical models to help find anomalies in the data. The team’s survey approach differs from existing apps that attempt to detect attacks from a cell-site simulator on an individual’s phone.
“We’re looking at the whole cellular landscape and pinpointing discrepancies in data, while the apps for the most part are guessing at how a cell-site simulator would act with a phone,” said Ney.
Co-author and Allen School professor Tadayoshi Kohno added, “We’ve demonstrated that SeaGlass is effective in detecting these irregularities and narrowing the universe of things people might want to investigate further.”
For instance, around an immigration services building south of Seattle run by the U.S. Department of Homeland Security, SeaGlass detected a cell tower that transmitted on six different frequencies over the two-month period. That was notable because 96 percent of all other base cell towers broadcast on a single channel, and the other 4 percent only used two or three channels.
The team also detected an odd signal near the Seattle-Tacoma International airport with suspicious properties that were markedly different from those normally used by network providers.
Those patterns would make sense if a mimicking cell-site simulator were operating in those areas, the researchers said, but further investigation would be necessary to definitively reach that conclusion.
“This issue is bigger than one team of researchers,” said Smith. “We’re eager to push this out into the community and find partners who can crowdsource.
Learn more: Catching the IMSI-catchers: SeaGlass brings transparency to cell phone surveillance
The Latest Bing News on:
Cell phone surveillance
- Samsung Galaxy A55 review: should you buy this budget phone with a big screen?on April 26, 2024 at 7:57 pm
This Samsung Galaxy A55 review isn't about one of the best iPhone alternatives you can buy, it's about an affordable handset that does the basics well. After all, it costs less than £500, a fraction ...
- How to watch SPY x FAMILY CODE: White right nowon April 26, 2024 at 11:00 am
When SPY x FAMILY CODE: White finishes its theatrical run, it will be available to watch at home. The movie will probably be available to rent or buy on Amazon, iTunes and other digital retailers soon ...
- Samsung may bring blood sugar monitoring with Galaxy Watch 7on April 26, 2024 at 10:04 am
Samsung ‘s upcoming smartwatches may bring a revolutionary health feature. According to the Korean media, the Galaxy Watch 7 series will boast noninvasive blood sugar monitoring capabilities. The new ...
- Cellphone, surveillance video sought as MSP investigates deputy’s fatal shooting of suspecton April 25, 2024 at 10:00 am
Police urge anyone with cellphone or home surveillance video of the incident to contact Detective Sgt. Willoughby at 810-965-4408.
- Court records indicate drug motive in mobile home park shootingon April 25, 2024 at 9:13 am
Recently unsealed court records offered a glimpse into the events surrounding a June 1 shooting and how investigators can try to piece together what happened with cell phone records when those ...
- Local law enforcement surveillance policy in question amid expansion of federal intelligence programon April 24, 2024 at 6:36 pm
The renewal of a contentious federal surveillance program made national headlines this week, but some experts argue surveillance on the local level deserves similar attention.
- Sen. Wyden voices concerns over federal surveillance billon April 24, 2024 at 9:03 am
Oregon U.S. Senator Ron Wyden has voiced citizen safety concerns over the federal legislator’s passing of a new surveillance bill Friday. The Foreign Intelligence Surveillance Act re-authorizes ...
- Police say thousands of child sexual abuse images found on Provincetown man's cell phoneon April 22, 2024 at 11:25 am
Laurence Pagnoni, 63, of Provincetown, was arrested after police say he possessed and distributed child sexual abuse images.
- College student fights for gun from armed robber’s hands: ‘A blackout moment for me’on April 20, 2024 at 7:35 am
Madelyn, a 21-year-old senior who did not share her last name, was walking home from class Wednesday at around 2:45 p.m. when an armed robber in a ski mask approached her just off campus on East 56th ...
- U.S. House tries anew to force sale or ban for TikTok, a ‘spy balloon in your phone’on April 19, 2024 at 8:34 am
U.S. House leadership has packaged more than a dozen bipartisan bills into a so-called “sidecar” agreement meant to attract isolationist lawmakers’ support for long-stalled foreign aid to Ukraine, ...
The Latest Google Headlines on:
Cell phone surveillance
[google_news title=”” keyword=”cell phone surveillance” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
[/vc_column_text]
The Latest Bing News on:
Surveillance devices
- Christine Quinn Claims Husband Placed Hidden Cameras the ‘Size of Quarters’ in Their Home to Keep Her ‘Under Surveillance’on April 26, 2024 at 3:59 pm
In a new filing obtained by PEOPLE, the reality star accuses her estranged husband Christian Dumontet of monitoring her without her “knowledge or consent” ...
- Feds: Liberty Township woman sentenced to nearly 4 years for placing arson device at nail salonon April 25, 2024 at 1:09 pm
A Liberty Township nail salon owner has been sentenced after pleading guilty to planting an arson device at a nail salon in Monroe.
- Satellites Vs. Spy Balloons: Which Is More Effective For Sky Reconnaissance?on April 25, 2024 at 8:45 am
The number of satellites in orbit as of May 1, 2023, has grown to a total of 7,560 with the U.S. accounting for 5,184. Balloons have been around much longer than satellites and saw their first ...
- Local law enforcement surveillance policy in question amid expansion of federal intelligence programon April 24, 2024 at 6:36 pm
The renewal of a contentious federal surveillance program made national headlines this week, but some experts argue surveillance on the local level deserves similar attention.
- Cisco says hackers subverted its security devices to spy on governmentson April 24, 2024 at 3:36 pm
Technology firm Cisco Systems said that hackers have subverted some of its digital security devices to break in to government networks globally.
- Millions in Passaic sheriff surveillance equipment locked away over national defense caseon April 24, 2024 at 1:22 am
Passaic County bought the devices from Lyndhurst-based Packetalk. Its owner, Tamer Zakhary, had alleged contracts with a banned Chinese firm.
- The Next US President Will Have Troubling New Surveillance Powerson April 22, 2024 at 10:00 am
President Joe Biden signed legislation not only reauthorizing a major FISA spy program but expanding it in ways that could have major implications for privacy rights in the US.
- Revised Section 702 Surveillance Authority Poses More Danger Than Everon April 18, 2024 at 8:40 pm
"The legislation coming from the House gives the government unchecked authority to order millions of Americans to spy on behalf of the government," warns Sen. Ron Wyden (D–Ore.). "Under current ...
- Senate Can Stop Expansion of Government Surveillanceon April 17, 2024 at 11:22 am
When the U.S. House passed the Reforming Intelligence and Securing America Act (RISAA), which reauthorizes the FISA Section 702 surveillance authority, ...
- Big Tech Says Spy Bill Turns Its Workers Into Informantson April 17, 2024 at 11:11 am
One of Silicon Valley’s most influential lobbying arms joins privacy reformers in a fight against the Biden administration–backed expansion of a major US surveillance program.
The Latest Google Headlines on:
Surveillance devices
[google_news title=”” keyword=”surveillance devices” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]