How to Detect Phone Spying Tech (with Cooper Quintin)

Joseph speaks to #CooperQuintin , a #security researcher & senior public interest technologist with the Electronic Frontier Foundation (EFF). Quintin is one of the people behind #Rayhunter , an easy to install tool that can detect nearby #IMSIcatchers. This tech, sometimes known as #Stingrays , poses as a fake #cellphone tower to track a phone’s location, intercept calls & texts, & can sometimes even deliver #malware

https://www.404media.co/how-to-detect-phone-spying-tech-with-cooper-quintin/

How to Detect Phone Spying Tech (with Cooper Quintin)

Joseph speaks to Cooper Quintin all about how to find fake cell phone towers that can track your movements or intercept text messages.

404 Media

@downey

Warning! A lot of acronyms ahead! Welcome to Telco land...

TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.

So you better leave them at home, or bring a burner1 phone with a burner1 SIM.

IMSI vs IMEI

The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).

But what #IMSIcatchers can also capture is your device's #IMEI 2.

The supposed purpose of an IMEI is stated clearly in the official documentation:

"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4

Mobile device manufacturers are obligated to produce device unique IMEI's:

"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4

IMSIcatcher vendors state their equipment can also capture IMEIs.5 6

So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".

Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.

PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.

1 https://ssd.eff.org/glossary/burner-phone

2 International Mobile Station Equipment Identity

3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.

4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/

5 https://x-surveillance.com/imsi-stingray-device/

6 https://www.stratign.com/imsi-catcher-system/

Burner phone

A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.

DICT: 3G phased out by Sept. 30, 2G shutdown ongoing
https://www.pna.gov.ph/articles/1259145
#Philippines #news #CellularService #Globe #Smart #DITO

#IMSIcatchers use 3G and 2G?

And...

I guess this means dumb phones and feature #phones will soon become useless.

Oh well...

@micahflee lemme guess: @eff just took a multi-network eSIM and multi-network WWAN modules to scan for "#deauth" / "#EvilTwin" attacks?

Cuz I remember @heiseonline or @golem actually suggest this as a method to detect #IMSIcatchers without requiring an expensive #SDR:

  • By precisely looking when which WWAN stick (for #3G back then) got disconnected and warning if they all got disconnected & reconnected at the same time...

AFAIK #GSMK uses that same technique for their #Baseband-#Firewall to automatically detect #Interception attempts and deploy countermeasures!

"At EFF we spend a lot of time thinking about Street Level Surveillance technologies—the technologies used by police and other authorities to spy on you while you are going about your everyday life—such as automated license plate readers, facial recognition, surveillance camera networks, and cell-site simulators (CSS). Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out CSS around the world.

CSS (also known as Stingrays or IMSI catchers) are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower."

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

#USA #Surveillance #Cellphones #DigitalRights #Stingrays #IMSICatchers #Privacy #Rayhunter

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation

Meet #Rayhunter: A New #OpenSource Tool from @eff to Detect Cellular #Spying

#CSS (also known as #Stingrays or #IMSIcatchers) are devices that masquerade as legitimate cell-phone towers, tricking #phones within a certain radius into connecting to the device rather than a tower.
#privacy #security #surveillance #imsi #cellphones #celltower

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation
The truth about cell site simulators and IMSI catchers! 📡 These technologies can track mobile devices, raising privacy concerns. Learn more about their implications and how they affect personal security. 🔍 Check out the details here: https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers #PrivacyMatters #TechAwareness #IMSIcatchers #CellSiteSimulators #newz
Cell-Site Simulators/ IMSI Catchers

Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower.  Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation...

THIS is why certain things like #Govware #IMSIcatchers and other shite need to be flat-out #illegal for use by #LEAs, cuz a #judge signing a #warrant is just a #process and not something that is actually #enforceable against the #LEA in question!

  • Cuz they (obviously!) can and will circumvent #judges or any #oversight if they can get away with it, and sadly they do.

Personally, I think #GSM and all it's successor versions as well as existing competitors are unfixably broken and should not be trusted AT ALL and everyone who demands #PII like #PhoneNumbers or uses #SMS for #2FA is at least complicit in advertising the #lie that #MobilePhones and their communication Systems are safe and secure.

Phone Surveillance Exposed

YouTube
@privacyint One way to circumvent #IMSIcatchers if used by police would be to use something like #SplinterNet to communicate. It's surprising it doesn't get more publicity for use in such circumstances. It's #opensource too.
https://github.com/megamattron/SplinterNet
megamattron/SplinterNet

A serverless, unblockable messaging system for Android. - megamattron/SplinterNet