Ray Hunter, Artist, Waterhouse Gallery, Watercolor artist, Oak Group Member, figuative and landscope artist, Santa Barbara Landscapes, Santa Barbara Fine Art Gallery, Santa Barbara Art Galleries

Meet Rayhunter:
A New Open Source Tool from EFF to Detect Cellular Spying

At EFF we spend a lot of time thinking about Street Level Surveillance technologies
—the technologies used by police and other authorities to spy on you while you are going about your everyday life
—such as automated license plate readers,
facial recognition,
surveillance camera networks,
and cell-site simulators (. #CSS ).

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone,
regardless of technical skill,
to help search out CSS around the world.

CSS
(also known as #Stingrays or #IMSI #catchers)
are devices that masquerade as legitimate cell-phone towers,
tricking phones within a certain radius into connecting to the device rather than a tower.

CSS operate by conducting a general search of all cell phones within the device’s radius.

Law enforcement use CSS to pinpoint the location of phones
often with greater accuracy than other techniques such as cell site location information (CSLI)
and without needing to involve the phone company at all.

CSS can also log International Mobile Subscriber Identifiers (IMSI numbers) unique to each SIM card,
or hardware serial numbers (IMEIs) of all of the mobile devices within a given area.

Some CSS may have advanced features allowing law enforcement to intercept communications in some circumstances.

What makes CSS especially interesting, as compared to other street level surveillance, is that
so little is known about how commercial CSS work.

We don’t fully know what capabilities they have
or what exploits in the phone network they take advantage of to ensnare and spy on our phones, though we have some ideas.

We also know very little about how cell-site simulators are deployed in the US and around the world.

There is no strong evidence either way about whether CSS are commonly being used in the US to spy on First Amendment protected activities
such as protests, communication between journalists and sources, or religious gatherings.

There is some evidence
—much of it circumstantial
—that CSS have been used in the US to spy on protests.

There is also evidence that CSS are used somewhat extensively by US law enforcement,
spyware operators, and scammers.

We know even less about how CSS are being used in other countries,
though it's a safe bet that in other countries CSS are also used by law enforcement.

Much of these gaps in our knowledge are due to a lack of solid, empirical evidence about the function and usage of these devices.

Police departments are resistant to releasing logs of their use,
even when they are kept.

The companies that manufacture CSS are unwilling to divulge details of how they work.

Until now, to detect the presence of CSS, researchers and users have had to either rely on Android apps on rooted phones,
or sophisticated and expensive software-defined radio rigs.

Previous solutions have also focused on attacks on the legacy 2G cellular network, which is almost entirely shut down in the U.S.

Seeking to learn from and improve on previous techniques for CSS detection we have developed a better, cheaper alternative that works natively on the modern 4G network.

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation
Building new relationships makes trade deadline complex for catchers

The weeks leading up to Major League Baseball’s trading deadline are always tense. Every team has to evaluate where they are in the standings, what the organization’s long-term outlook is and how much could be changed by acquiring a few veterans.

The Japan Times

I don’t know why now, but @[email protected] and my show #Catchers on @[email protected] (starring @[email protected] and @[email protected]) is suddenly getting a massive spike in listens. Most people rate it 4-5 stars or decry its “woke” agenda.

Check it out!

https://www.audible.com/pd?asin=B0BJRVB8MB&source_code=ASSORAP0511160006&share_location=pdp

Hey #horror bloggers and reviewers - if you have any interest in reviewing #Catchers, the horror audio fiction series @[email protected] and I made starring @[email protected], and @[email protected] with music by @[email protected], DM me and I’ll hook you up.

https://www.audible.com/pd?asin=B0BJRVB8MB&source_code=ASSORAP0511160006&share_location=pdp

I just finished #Catchers (created by @Neptunesalad and Bob DeRosa) on Audible and thoroughly enjoyed it. It plays like a classic #horror tale, with a slowly unfolding mystery and great characters. If you dig scary #AudioDrama, check it out. And while you're at it, also check out their stellar horror podcast #VideoPalace.
https://www.audible.com/pd/Catchers-Audiobook/B0BJRVB8MB

On a bike ride, I went past the actual parking lot where the incident that inspired #Catchers happened. Check it out and give @[email protected] and my baby a listen!

https://www.audible.com/pd?asin=B0BJRVB8MB&source_code=ASSORAP0511160006&share_location=pdp

Usar #IMSI #Catchers sin orden judicial es ilegal en los EEUU...En #Argentina también!
https://is.gd/E22mhL
Appeals Court Rules Against Warrantless Cell-site Simulator Surveillance

Law enforcement officers in Washington, D.C. violated the Fourth Amendment when they used a cell site simulator to locate a suspect without a warrant, a D.C. appeals court ruled on Thursday. The court thus found that the resulting evidence should have been excluded from trial and overturned the...