https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

@eff #opensource project #Rayhunter…runs on an #Orbic mobile hotspot…<$20…

We hope #activists, #journalists…help us collect data about the usage and capabilities of #cellsitesimulators

…works by intercepting…and analyzing the control traffic (but not user traffic…) between… Rayhunter…and the cell tower…

…notifies the user when something suspicious happens…allowing users to take appropriate action to protect themselves, such as turning off their phone…

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation
The truth about cell site simulators and IMSI catchers! 📡 These technologies can track mobile devices, raising privacy concerns. Learn more about their implications and how they affect personal security. 🔍 Check out the details here: https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers #PrivacyMatters #TechAwareness #IMSIcatchers #CellSiteSimulators #newz
Cell-Site Simulators/ IMSI Catchers

Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower.  Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation...

Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware. Cell-site simulators are also used by criminals to send...

Electronic Frontier Foundation
Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware. Cell-site simulators are also used by criminals to send...

Electronic Frontier Foundation

Docs Show #FBI Pressures Cops to Keep Phone #Surveillance Secrets.

Newly released documents highlight the bureau's continued secrecy around cell-site simulators—spying tech that everyone already assumes exists.
#privacy #imsi #imsicatcher #stingrays #cellsitesimulators #spying

https://www.wired.com/story/fbi-cell-site-simulator-stingray-secrecy/

Docs Show FBI Pressures Cops to Keep Phone Surveillance Secrets

Newly released documents highlight the bureau's continued secrecy around cell-site simulators—spying tech that everyone already assumes exists.

WIRED

The use of cell site simulators is still shrouded in secrecy. It’s not just the government who uses these to catch “bad guys”.

But a lot of really great research by the academic community, privacy advocates, and some of my colleagues has advanced our knowledge of how they work.

If you have an Android device, and you’re able to do so, the single most impactful thing you can do for your cellular privacy and security is to disable the “Allow 2G” setting in the mobile network settings screen (available on most devices shipped in the last couple of years). If you’re in North America it’s extremely likely there’s no legitimate 2g networks still in service from your carrier, and a downgrade to a 2g connection is a very common and easy mechanism for all sorts of privacy invading attacks.

It doesn’t come close to mitigating all risks posed by CSSs, but it’s an impactful start.

#privacy #cellular #2g #cellsitesimulators #android #imsicatcher

https://www.wired.com/story/fbi-cell-site-simulator-stingray-secrecy/

Docs Show FBI Pressures Cops to Keep Phone Surveillance Secrets

Newly released documents highlight the bureau's continued secrecy around cell-site simulators—spying tech that everyone already assumes exists.

WIRED

#Stingray #StingraySurveillance #IMSICatcher #CellSiteSimulators #DirtBoxes

For years, these devices have elicited criticism from civil rights groups and legislators who argue that they violate Fourth Amendment protection against unreasonable search and seizure. The government insists it will only use this type of kit in line with existing rules and restrictions, but it appears that is not the case.
The Department of Homeland Security (DHS) Office of the Inspector General (OIG) looked at CSS deployment by the Secret Service and ICE and found, "Secret Service and ICE HSI [Homeland Security Investigations] did not always adhere to Federal statute and CSS policies when using CSS during investigations involving exigent circumstances."

Secret Service, ICE break the law over and over with fake cell tower spying | The Register

Cell-Site Simulators/IMSI Catchers | EFF

Secret Service, ICE break the law over and over with fake cell tower spying

Investigations 'at risk' from sloppy surveillance uncovered by audit probe

The Register
News crew discovers 40 cellphone-tracking devices operating around DC

News crew discovers 40 cellphone-tracking devices operating around DC

Boing Boing