APNewsBreak: US suspects cellphone spying devices in DC

April 3, 2018 by Frank Bajak
APNewsBreak: US suspects cellphone spying devices in DC
This undated file photo provided by the U.S. Patent and Trademark Office shows the StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla. The Department of Homeland Security says it has identified suspected rogue cell tower simulators in Washington. The suspected simulators, known popularly as Stingrays, were detected by a DHS contractor in early 2017 during a 90-day pilot. (U.S. Patent and Trademark Office via AP, File)

For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.

The use of what are known as cellphone-site simulators by foreign powers has long been a concern, but American intelligence and agencies—which use such eavesdropping equipment themselves—have been silent on the issue until now.

In a March 26 letter to Oregon Sen. Ron Wyden, the Department of Homeland Security acknowledged that last year it identified suspected unauthorized cell-site simulators in the nation's capital. The agency said it had not determined the type of devices in use or who might have been operating them. Nor did it say how many it detected or where.

The agency's response, obtained by The Associated Press from Wyden's office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation's airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly.

The devices work by tricking mobile devices into locking onto them instead of legitimate cell towers, revealing the exact location of a particular cellphone. More sophisticated versions can eavesdrop on calls by forcing phones to step down to older, unencrypted 2G wireless technology. Some attempt to plant malware.

They can cost anywhere from $1,000 to about $200,000. They are commonly the size of a briefcase; some are as small as a cellphone. They can be placed in a car next to a government building. The most powerful can be deployed in low-flying aircraft.

Thousands of members of the military, the NSA, the CIA, the FBI and the rest of the national-security apparatus live and work in the Washington area. The surveillance-savvy among them encrypt their phone and data communications and employ electronic countermeasures. But unsuspecting citizens could fall prey.

Wyden, a Democrat, wrote DHS in November requesting information about unauthorized use of the cell-site simulators.

APNewsBreak: US suspects cellphone spying devices in DC
In this April 30, 2015, file photo, a Capitol Hill staffer looks down at papers while on a cell phone while walking inside the Russell Senate Office Building on Capitol Hill in Washington. The Department of Homeland Security acknowledges detecting suspected cell tower simulators in Washington, D.C. These devices can track specific cell phones and even intercept or divert calls and text messages. (AP Photo/Jacquelyn Martin, File)

The reply from DHS official Christopher Krebs noted that DHS had observed "anomalous activity" consistent with Stingrays in the Washington area. A DHS official who spoke on condition of anonymity because the letter has not been publicly released added that the devices were detected in a 90-day trial that began in January 2017 with equipment from a Las Vegas-based DHS contractor, ESD America .

Krebs, the top official in the department's National Protection and Programs Directorate, noted in the letter that DHS lacks the equipment and funding to detect Stingrays even though their use by foreign governments "may threaten U.S. national and economic security." The department did report its findings to "federal partners" Krebs did not name. That presumably includes the FBI.

The CEO of ESD America, Les Goldsmith, said his company has a relationship with DHS but would not comment further.

Legislators have been raising alarms about the use of Stingrays in the capital since at least 2014, when Goldsmith and other security-company researchers conducted public sweeps that located suspected unauthorized devices near the White House, the Supreme Court, the Commerce Department and the Pentagon, among other locations.

The executive branch, however, has shied away from even discussing the subject.

Aaron Turner, president of the mobile security consultancy Integricell, was among the experts who conducted the 2014 sweeps, in part to try to drum up business. Little has changed since, he said.

Like other major world capitals, he said, Washington is awash in unauthorized interception devices. Foreign embassies have free rein because they are on sovereign soil.

Every embassy "worth their salt" has a cell tower simulator installed, Turner said. They use them "to track interesting people that come toward their embassies." The Russians' equipment is so powerful it can track targets a mile away, he said.

APNewsBreak: US suspects cellphone spying devices in DC
In this Nov. 28, 2017, file photo, Sen. Ron Wyden speaks during a committee hearing on Capitol Hill in Washington. TFor the first time, the U.S. government is publicly acknowledging the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages. In a March 26 letter to Wyden obtained by the Associated Press, the Department of Homeland Security acknowledged that it identified suspected unauthorized cell-site simulators in Washington last year. (AP Photo/Carolyn Kaster, File)

Shutting down rogue Stingrays is an expensive proposition that would require wireless network upgrades the industry has been loath to pay for, security experts say. It could also lead to conflict with U.S. intelligence and law enforcement.

In addition to federal agencies, police departments use them in at least 25 states and the District of Columbia, according to the American Civil Liberties Union.

Wyden said in a statement Tuesday that "leaving security to the phone companies has proven to be disastrous." He added that the FCC has refused to hold the industry accountable "despite repeated warnings and clear evidence that our phone networks are being exploited by foreign governments and hackers."

After the 2014 news reports about Stingrays in Washington, Rep. Alan Grayson, D-Fla, wrote the FCC in alarm. In a reply, then-FCC chairman Tom Wheeler said the agency had created a task force to combat illicit and unauthorized use of the devices. In that letter, the FCC did not say it had identified such use itself, but cited media reports of the security sweeps.

That appears to have accomplished little. A former adviser to Wheeler, Gigi Sohn, said there was no political will to tackle the issue against opposition from the intelligence community and local police forces that were using the devices "willy-nilly."

"To the extent that there is a major problem here, it's largely due to the FCC not doing its job," said Laura Moy of the Center on Privacy and Technology at Georgetown University. The agency, she said, should be requiring wireless carriers to protect their networks from such security threats and "ensuring that anyone transmitting over licensed spectrum actually has a license to do it."

FCC spokesman Neil Grace, however, said the agency's only role is "certifying" such devices to ensure they don't interfere with other wireless communications, much the way it does with phones and Wi-Fi routers.

Explore further: What are cell site simulators? And how do they work?

More information: DHS letter to Sen. Ron Wyden: apne.ws/eJ7JipM

DHS enclosure in letter to Sen. Ron Wyden: apne.ws/dBMPqWw

Related Stories

What are cell site simulators? And how do they work?

May 11, 2017

The formidable surveillance power of cell site simulators has put them at the forefront of privacy debates in the U.S. and Europe. Now The Associated Press has found evidence that the devices are sending threatening text ...

House report urges clearer guidance on cellphone technology

December 19, 2016

Clearer guidelines are needed for law enforcement's use of secretive and intrusive cellphone tracking technology, and police and federal agents should be upfront with a judge about their deployment, a House committee said ...

Want to track cellphones? Get a warrant, lawmakers say

January 26, 2017

Law enforcement cellphone tracking devices are coming under scrutiny in several states, where lawmakers have introduced proposals ranging from warrant requirements to an outright ban on the technology.

FBI couldn't access nearly 7K devices because of encryption

October 23, 2017

The FBI hasn't been able to retrieve data from more than half of the mobile devices it tried to access in less than a year, FBI Director Christopher Wray said Sunday, turning up the heat on a debate between technology companies ...

Recommended for you

Floodplain forests under threat

March 19, 2019

A team from the Institute of Forest Sciences at the University of Freiburg shows that the extraction of ground water for industry and households is increasingly damaging floodplain forests in Europe given the increasing intensity ...

Scientists discover common blueprint for protein antibiotics

March 19, 2019

A discovery by researchers at the Los Angeles Biomedical Research Institute (LA BioMed) has uncovered a common blueprint for proteins that have antimicrobial properties. This finding opens the door to design and development ...

Nanoscale Lamb wave-driven motors in nonliquid environments

March 19, 2019

Light driven movement is challenging in nonliquid environments as micro-sized objects can experience strong dry adhesion to contact surfaces and resist movement. In a recent study, Jinsheng Lu and co-workers at the College ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.