Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Government Privacy Your Rights Online

Unredacted User Manuals Of Stingray Device Show How Accessible Surveillance Is (theintercept.com) 95

The Intercept has today published 200-page documents revealing details about Harris Corp's Stingray surveillance device, which has been one of the closely guarded secrets in law enforcement for more than 15 years. The firm, in collaboration with police clients across the U.S. have "fought" to keep information about the mobile phone-monitoring boxes from the public against which they are used. The publication reports that the surveillance equipment carries a price tag in the "low six figures." From the report:The San Bernardino Sheriff's Department alone has snooped via Stingray, sans warrant, over 300 times. Richard Tynan, a technologist with Privacy International, told The Intercept that the "manuals released today offer the most up-to-date view on the operation of" Stingrays and similar cellular surveillance devices, with powerful capabilities that threaten civil liberties, communications infrastructure, and potentially national security. He noted that the documents show the "Stingray II" device can impersonate four cellular communications towers at once, monitoring up to four cellular provider networks simultaneously, and with an add-on can operate on so-called 2G, 3G, and 4G networks simultaneously.
This discussion has been archived. No new comments can be posted.

Unredacted User Manuals Of Stingray Device Show How Accessible Surveillance Is

Comments Filter:
  • The manual is ... (Score:1, Flamebait)

    by PPH ( 736903 )

    ... probably written in Chinglish.

  • by Anonymous Coward on Monday September 12, 2016 @03:10PM (#52873523)

    It is the beginning of the end for society as a whole if no one cares if the police obey the law. The Sheriff of San Bernadino should face charges for unlawful surveillance.

    • by msauve ( 701917 ) on Monday September 12, 2016 @08:14PM (#52875773)
      I've said this before, but here it is again: Stingrays are transmitters. It is illegal to transmit on cellular frequencies without a license (cellular users transmit under authority of their provider). So, lacking a warrant, police use of Stingrays is illegal. Why are the cops not being prosecuted for violation of federal law, and why isn't any evidence obtained through the use of Stingrays thrown out by the courts?

      (I think the answer the the last one is parallel construction, which itself is legally bankrupt)
      • A search warrant would not empower a cop to violate federal comms law.

        • by msauve ( 701917 )
          I wasn't sure on that, but considered it compared to a physical search warrant, which might authorize a search which would otherwise violate a state breaking and entering law. Why is it different for federal law - is it a matter of getting a federal vs. state warrant?
        • "A search warrant would not empower a cop to violate federal comms law."

          The 4th amendment allows the police to perform "searches and seizures" with a "Warrants" which otherwise would be considered "unreasonable"

          • But, the warrant doesn't get them around illegal use of cellular spectrum that is only authorized to certain companies by the FCC. There is no loophole in the law for police misuse.

  • by Anonymous Coward on Monday September 12, 2016 @03:11PM (#52873529)

    ...and ask them whether they regard themselves as activists against the principles of their country's Constitution, or whether they believe they're only following orders, i.e. that the known way in which their product will be put to use is "not my dept.".

    • Re: (Score:2, Insightful)

      by phantomfive ( 622387 )
      They probably consider themselves "people who get paid," like most of the rest of us.
      • Like the CIA torturers. "just doing my job"
      • by Anonymous Coward

        If you can get a job developing Stingray software/hardware, you can get a job for less money doing something less ethically abhorrent.

        Class warfare rhetoric used to be used to encourage people to strike in the face of unacceptable labor practices. Now it's turned into a hopeless lament: "Well, we gotta do what we're told or we'll be out on the street."

        • If you can get a job developing Stingray software/hardware, you can get a job for less money doing something less ethically abhorrent.

          I must ask, is the problem with the devices or how they are used? If used only after a warrant has been obtained would people still be outraged over these devices?

          Also, these Stingray devices are made of a bunch of parts, everyone with a different use. Are the people that make the capacitors in these things somehow responsible? Even the software in these things were likely derived from code used in legitimate cell phone towers. I find it real hard to draw a bright line that separates the ethical and une

          • by ShaunC ( 203807 )

            I must ask, is the problem with the devices or how they are used? If used only after a warrant has been obtained would people still be outraged over these devices?

            To me, the root of the problem is the devices. The way the Stingray works is by tricking all cell phones within range to connect to the Stingray instead of the legitimate cell tower. The very nature of this design means innocent peoples' phones, people who are not the subject of any warrant, are going to have their communications illegally intercepted. You might have a warrant to tap Bob's phone, but when you park your nondescript van in Bob's neighborhood and turn on your Stingray, his neighbors' phones ar

            • by tlhIngan ( 30335 )

              To me, the root of the problem is the devices. The way the Stingray works is by tricking all cell phones within range to connect to the Stingray instead of the legitimate cell tower. The very nature of this design means innocent peoples' phones, people who are not the subject of any warrant, are going to have their communications illegally intercepted. You might have a warrant to tap Bob's phone, but when you park your nondescript van in Bob's neighborhood and turn on your Stingray, his neighbors' phones ar

      • by AHuxley ( 892839 )
        They repeat the cover story that its all for working with "subscriber" data internally and know not to ask anymore questions.
    • That's like asking a professional hitman what his motivation is.

  • Surprised face on (Score:4, Informative)

    by bferrell ( 253291 ) on Monday September 12, 2016 @03:12PM (#52873549) Homepage Journal

    It's a software defined radio. See Range Networks for similar, MUCH cheaper equipment (also not a dumbed down). Also GNU radio.

    • Also OpenBTS

    • These manuals should give very good guidance on how to build an anti-Stingray device. Or pro-privacy device. Call it what you want.

      • by tlhIngan ( 30335 ) <slashdot@worf.ERDOSnet minus math_god> on Monday September 12, 2016 @04:31PM (#52874147)

        These manuals should give very good guidance on how to build an anti-Stingray device. Or pro-privacy device. Call it what you want.

        Or how about our OWN stingray type devices?

        Imagine the chaos if you're tracking an IMSI and it's passing through several stingray devices - yours, and half a dozen others. Since each is pretending to the uplink of the next, the actual location of the phone in question can be quite a distance away. And if you're monitoring the location of the signal, you're just getting the next stingray in line.

        • Alternatively, run an anti-stingray device that scrambles everyone's IMEI and IMSI upstream. The towers will know to reject it, but the stingray device won't.

          It might be possible to detect the stingray and only activate when it's in use.

  • by BringsApples ( 3418089 ) on Monday September 12, 2016 @03:19PM (#52873615)

    Harris declined to comment. In a 2014 letter to the Federal Communications Commission, the company argued that if the owner’s manuals were released under the Freedom of Information Act, this would “harm Harris’s competitive interests” and “criminals and terrorist[s] would have access to information that would allow them to build countermeasures.”

    Well then just print a manual and give it to us, then burn your copy. We'll keep our copy safe, so no terrorists will ever be able to read the manual. At least that's what Apple was asked to do.

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Monday September 12, 2016 @03:25PM (#52873657)
    Comment removed based on user account deletion
  • by Anonymous Coward

    If we are seeing this, then the product is no longer in use and is obsolete. "Law enforcement" has something better now.

    We need international standards of law enforcement with accreditation and continual audit by civilian authority.

    As long as "law enforcement" remains unaccountable to the people, then our democracies mean nothing and are completely irrelevant.

    • by AHuxley ( 892839 )
      No network drop or jump in signal with the new generations, its just almost the same power level and can stay at the new network standard as the upgraded surrounding telco towers.
      Mapping and voice, later connected PC or device ready malware pushdown, voice prints its all ready for any local aspirational police force to rent and upgrade into :)
    • It is. At least, the iDEN part is. That was the Motorola/Nextel proprietary trunked radio protocol.

  • by Anonymous Coward on Monday September 12, 2016 @03:34PM (#52873717)

    For anyone else using this sort of device it would be an illegal wiretap, an FCC violation for unauthorized use of spectrum, interfering with a public utility, copyright violation, DMCA violation, vandalism, reckless endangerment (hey, 911 doesn't work when this is on y'know), interfering with emergency services, intent to commit identity fraud, computer misuse and a unauthorized use of computer equipment violation. Possibly even terrorism...sure, let's throw terrorism in there for good measure. Total sentence: 5x Infinity years, served consecutively. No chance of parole. Leave your human rights at the door.

    For the cops?...they switch this on before breakfast each morning. Assuming they didn't forget to switch it off the night before.

  • Technical Controls (Score:5, Insightful)

    by watermark ( 913726 ) on Monday September 12, 2016 @03:46PM (#52873793)

    If police can do it, so can "the bad guys". Why aren't there better technical barriers in place to prevent this sort of thing? If this snooping is illegal, that's a great first step, but why are these devices even able to work? Are the mobile carriers working with law enforcement to enable these devices, or just indifferent to it?

    When it came to light that law enforcement was abusing their power by indiscriminately snooping on internet traffic, we started to see more websites use encryption (birth of Let's Encrypt). When it came to light that law enforcement was abusing their power regarding accessing information stored on a phone, we started to see widespread use of device encryption (Android and iOS now encrypt by default). Is StringRay abuse the precursor to the next iteration of mobile security?

    • by Anonymous Coward

      The snooping is designed into the standards. Seriously. I don't mean just the lawful interception interfaces. The standards themselves are breakable on purpose.

    • I believe LTE does prevent a lot of the snooping. Part of the problem is that things evolved from really old-ass standards and so security was not always the consideration it should be. I mean remember that the original cell network:

      1) Was all unencrypted analogue, the only thing preventing people from listening in was not having a radio that could tune the frequencies.

      2) Had all kinds of odd shit related to compatibility with the old PSTN.

      It was not even remotely secure. However, it was what we could do wi

    • by AHuxley ( 892839 )
      Re "Are the mobile carriers working with law enforcement to enable these devices, or just indifferent to it?"
      If you want to be a telco you have to ensure your network is wiretap friendly in the gov fine print.
      A network that keeps the users, the press out but allows the NSA, GCHQ, state, city police to collect it all is the telco set standard.
      The equipment between nations could also support encryption but its all kept in plain text so the security services can collect it all.
      City police forces to the NSA
    • If police can do it, so can "the bad guys".

      Aren't they the same thing?

  • I know it's about civil liberties, but I want one of those devices lol
  • Anyone would think something significant happened 15 years ago :(

    Will no one think of the children / terrorist threat...

    • If we cared we would have isolated Saudi Arabia, Yemen, and Pakistan. Or glassed them over.

      It's obvious we don't care.

  • and with an add-on can operate on so-called 2G, 3G, and 4G networks simultaneously

    I do like the fact that it is expandable.

  • It's radio. Anybody in the vicinity can listen in all they like. Back in the bad old days this was Industry Canada's position, that cellphones were not private and there was nothing anybody could do about it.

    Unlike AMPS, the communications are digital. So what. If you are sufficiently determined you can decode the data you have captured.

    ...laura

  • I wouldn't mind working for the company: https://www.harris.com/careers... [harris.com] Looks like cool tech to play with. Too bad they don't have any remote positions :(
  • All the people who think Windows 10 is the source of all their privacy concerns really have no idea how far lost privacy really is...

  • I've shared this on previous posts about stingray - there is an open source Android app [github.io] to detect if you're connecting to a fraudulent base station, and take action by instantly disconnecting if desired. I don't know if it works or how well, since I'm in India, but people can use it to see if there are any stingrays deployed nearby.

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...