[HN Gopher] Stingrays and Dirtboxes: how cops can secretly track... ___________________________________________________________________ Stingrays and Dirtboxes: how cops can secretly track your phone Author : uhtred Score : 213 points Date : 2020-08-03 14:34 UTC (8 hours ago) (HTM) web link (theintercept.com) (TXT) w3m dump (theintercept.com) | jdefr89 wrote: | Hey. Someone who briefly worked on the Stingray team here. | | I left the company that develops the stingray (who's name is | mentioned in the article but I shall not say it) because I didn't | feel comfortable with the ethics of how it could potentially be | easily abused without legal permission and/or repercussion. I | fear these technologies will become more commonly used against | Americans by low level law enforcement without good reason and | without responsible usage. | kome wrote: | Thank you for walking away. | | I hope more people will follow your example and question their | work. Not only at Harris Corporation, but in every part of what | is called surveillance capitalism. | jccc wrote: | Is it enough that a few people like this simply turn their | backs and walk away to different work? I would think their | vacancies would be quickly and easily filled. | | Is there really a shortage of people willing and able to do | this kind of work for these companies and government | agencies? I'm asking because I truly don't know. | | And if not, could we think of some other ways people in these | positions could exert some influence for change, even if it's | only after they leave those jobs? | jpollock wrote: | Yes it has an effect. In a tight labour market, any | restriction on the number of people who are willing to do | your work will increase your costs. | | Eventually, you might start to ask "why" and change some | things to bring the costs back in line. | | For example, I know lots of people (including me), who | refused interviews with Uber post harassment revelations. | jccc wrote: | I understand that in principle it _could_ have an effect, | and I understand how. | | I'm questioning whether that market for developers really | is tight enough to matter, whether employers and top | policy makers would even notice that some number of | people withhold their skills in protest. | | I'm wondering if perhaps there are other more powerful | ways for these developers to exert their influence, | whether in these positions or outside of them. | TeaDrunk wrote: | I was under the impression that lack of talent does | matter- if top talent doesn't want to work for you, you | can't replace top talent with less-top talent and expect | to maintain your competitive edge. Especially if said top | talent is now working for a competitor. | jpollock wrote: | That would be an interesting research paper, particularly | if it was able to quantify the effect of various blows to | a companies reputation. | | "The effect of corporate reputation on staffing costs"? | | A quick googling implies "yes"? | | https://www.igniyte.co.uk/blog/how-a-bad-corporate- | reputatio.... | mellow2020 wrote: | You can't change rape by being a good rapist. All that | serves IMO is to normalize being an accomplice and doing | evil things with good intentions. | | > People have a series of rationalizations. People say for | example that science and technology have their own logic, | that they are in fact autonomous. This particular | rationalization is profoundly false. It is not true that | science marches on in defiance of human will, independent | of human will, that just is not the case. But it is | comfortable, as I said: it leads to the position that "if I | don't do it, someone else will." | | > Of course if one takes that as an ethical principle then | obviously it can serve as a license to do anything at all. | "People will be murdered; if I don't do it, someone else | will." "Women will be raped; if I don't do it, someone else | will." That is just a license for violence. | | - http://tech.mit.edu/V105/N16/weisen.16n.html | TallGuyShort wrote: | If a rapist stops being a rapist, does someone | immediately turn around and pay someone else to become a | rapist? No? Then the rape analogy isn't a perfect fit. | The question is still valid, IMO. | dang wrote: | Would you please stop posting generic ideological | comments to HN? It looks like you've been doing it | repeatedly. It's against the site guidelines because it | leads to repetitive threads which are tedious at best and | nasty at worst. This site is supposed to be for curious | conversation and those things are not compatible. | | https://news.ycombinator.com/newsguidelines.html | mellow2020 wrote: | > Would you please stop posting generic ideological | comments to HN? | | If you explain to me how the comment I replied to isn't | just as generic, and what you mean by "ideological" that | is present in my comment and not in the parent, sure. | | You allow a claim, coated in "wondering", an old chestnut | trotted out time and time again -- and don't the clear | refuting of it, by one of the greats in the field? There | are no principles here you are applying fairly, it's | utterly arbitrary. My point stands. Graying it out just | adds the data that some people would rather bury and | smear it, than learn. That's on them. | | And no, it doesn't lead to any conversation of any kind, | because agreement is expressed in upvotes, and I doubt | anyone can muster a coherent rebuttal. I don't see you | trying either, you just say what _would_ have happened, | if you hadn 't made replying impossible. Weizenbaum is | correct, and apparently, some people cannot let that | stand. | | > It's against the site guidelines because it leads to | repetitive threads which are tedious at best and nasty at | worst. | | Which part of them? | | > This site is supposed to be for curious conversation | and those things are not compatible. | | Saying "it" and "those things" doesn't make up for a | clear definition of them. | jccc wrote: | (For whatever it's worth, I was sincerely wondering | because I don't know what the actual labor constraints on | these companies/agencies might be. I suspected they | aren't enough to make much of a difference when | developers walk away in protest, and so I asked.) | | (Also, I think it was clear that I was questioning | strategy not morality.) | dang wrote: | Actually I missed that you were linking to a 1985 article | by Weizenbaum. I agree, that's more interesting. Had I | seen that I probably wouldn't have replied to you here. | | On the other hand: | | (1) "You can't change rape by being a good rapist" is | just flamebait. Please don't. | | (2) Your account has mostly been posting in ideological | arguments and it all looks pretty generic to me. Please | don't do that either. | | If you want an explanation about why we don't want | generic discussion on HN, and above all not generic | ideological discussion, there are plenty at these links: | | https://hn.algolia.com/?dateRange=all&page=0&prefix=true& | que... | | https://hn.algolia.com/?dateRange=all&page=0&prefix=true& | que... | sargun wrote: | Just curious, how well were you compensated? Did you work on | the radio side doing embedded stuff / math, or server software? | goodluckchuck wrote: | Any reason to think usage is limited to law enforcement? | throwaway_drt2 wrote: | Used to work for makers of the dirtbox. I would hope anyone | curious about this issue also spends a lot of time digging into | those devices as well. | blue52 wrote: | The majority of us are well aware how these devices create a | MITM attack against your phone, but is there anything you | found particularly interesting or egregious that we should | know about? Especially how LE are using them to abuse every | group who desperately needs protection from these devices. | an_opabinia wrote: | - In your opinion, is there a difference between an innocent | person being materially and demonstrably harmed ("harmed," i.e. | tort) by a stingray deployment and an innocent person harmed by | any other tool misused in this way by the government? | | - Do you think there's a better alternative to tort that could | as clearly limit the tools government uses to fight crime? | | - If harmless mass surveillance replaces concretely and plainly | harmful mass surveillance (e.g. stop and frisk), did we come | out ahead? | | I'm not a blowhard and obviously do not want to live in a | surveillance state. I'm not even advocating for the status quo. | It's okay if the answer to these questions are basically, "I | don't know." | | Or go on and argue that stingrays in isolation of a malevolent | government somehow materially harm people in some concrete way. | It would be awesome to hear your perspective if that's the | case. | [deleted] | ColanR wrote: | To whomever flagged the sibling comment by throwaway_drt2: they | were not being crude, they were referring to the cell site | simulator called the Dirtbox. [1] Don't be so trigger-happy. | | [1] https://en.wikipedia.org/wiki/Dirtbox_%28cell_phone%29 | dang wrote: | No one flagged that comment. It was affected by a software | filter. Users vouched for it, which unkilled it. | ColanR wrote: | That makes more sense, since a similar comment that replied | to it was also marked [dead]. Thanks for the clarification. | dylan604 wrote: | What kind of NDAs did they force on you? It's one thing to walk | away silently, but you know they just filled your role with | someone else with less morals. | | The other option is scorched earth similar to the recent news | articles where there were blog posts publicly shaming the | company. Wondering what kind of in between options are | available. Anonymous posts are a start at least to get the | inquisitive types to look in that direction and/or add some | weight to previous anonymous posts. | | Edit: just read further down the list, and see others have | essentially asked the same thing | MacSystem wrote: | I'm also glad you did that, we need more more people like you. | room505 wrote: | Can a Stingray be used to eavesdrop on someone using an app like | Signal for a voice call or message? | sandstrom wrote: | Anyone know of any progress in 6G, that would improve privacy in | this area? For example randomized (or truly encrypted) IMEI | numbers? | | Also, I found this SIM card which seems to be doing IMEI | randomization: | | https://omertadigital.com/blogs/news/encrypted-sim-cards-wha... | hosteur wrote: | There are no incentives to improve end user privacy with those | who specify telco standards. | baybal2 wrote: | > Anyone know of any progress in 6G, that would improve privacy | in this area? | | One of members of numerous 6G working groups is Huawei. If you | remember, they recently proposed to replace the whole IP | protocol with one where every packet must be cryptosigned by | ISP. | | This SIM feels like a complete BS. IMSI is managed by the | phone, not SIM. | floatingatoll wrote: | Wi-Fi Calling while in Airplane mode would not be subject to | Stingray interception, and would protect IMEI data from airborne | bulk capture. | | Authorities can still set up open SSIDs to capture limited | information about phones, but the "fly an airplane over" capture | model doesn't work well with Wi-Fi. | falcolas wrote: | You may be underestimating people's lack of care about what | open access point people connect to. The traffic itself may be | encrypted, but DNS queries, phone hardware addresses, and | background traffic might not be. | floatingatoll wrote: | I'm not trying to offer a comprehensive solution for avoiding | government monitoring. I'm just offering a solution for | avoiding cellular Stingrays while retaining cellular service. | | For a more comprehensive solution, you would need to _at | minimum_ not carry any electronic devices (signal detection), | wear a mask and IR-blocking glasses (face detection), and | wear shoe inserts (gait detection) -- and even then, they can | still seize you and overcome those obstacles at will. | falcolas wrote: | The context of this article is "Cops tracking your phone", | of which the parent comment _does not prevent_ in any | meaningful fashion. The rest of the remedies presented here | are also mostly unrelated to phone tracking. | throwaway0a5e wrote: | Anyone who cared (for either personal or professional reasons) | has been leaving their phone at home for probably close to a | decade now. | rhplus wrote: | Reports of stingray flight patterns go back to at least 2015: | | https://komonews.com/archive/fbi-behind-mysterious-spy-aircr... | | https://bgr.com/2015/06/03/fbi-dirtbox-stingray-spy-plane-pr... | throwaway_drt2 wrote: | I used to work for DRT, they make the "dirtbox" mentioned in the | article. I would really encourage journalists to dig more into | this company and their products. | WarOnPrivacy wrote: | > I would really encourage journalists to dig more into this | company and their products. | | I guess journalists' disinterest in invasive surveillance is | because reporting on it is harder, than reprinting the same 7 | headlines as every other news org. | | It's been a bit better since Edward Snowden dragged news orgs | away from authoritarian-friendly journalism and into the | surveillance age. However, journalists still seem to do about | the bare minimum, while their reporting gives LEO/Gov endless | benefit of the doubt. | ideals wrote: | You could contact https://twitter.com/KenKlippenstein via | Signal with any information you didn't see in the article which | should be. He seems to be a journalist interested in related | fields. | | No one is going to know unless the people who worked there | reach out. | t0mmyb0y wrote: | Almost no agencies upgraded to 4G, way too expensive, about | $500k. If on android you can enter a code on device to force ONLY | 4G to be used by the device. | BelleOfTheBall wrote: | I remember this being described in Bruce Schneier's book. When I | first read it, I was terrified. Now, seeing them in action, I'm | closer to dejected. Most methods of avoiding them aren't easy or | practical enough to be used by the layman, hell, most laymen | don't even know what stingrays are. These are incredibly tough to | protect against on a mass scale. | Mirioron wrote: | What happens when they are used in countries with fewer | protections to individuals than the US? | mtgx wrote: | The bar is already pretty low in the US. The FBI has trained | cops to hide the use of stingrays from judges, so who really | knows how many times these were illegally used to incriminate | someone while telling judges they got anonymous tips or | whatever. | xkcd-sucks wrote: | Slightly off topic: Why don't cell networks get shut down more | often during large protests etc.? | | It seems that police use cell phones for internal communications | pretty extensively -- Even when there are encrypted radio systems | or channels. | | My guess is that UX of encrypted radio is generally terrible, and | that it's a nightmare to distribute keys to all multiple agencies | that might be operating in an area. So departments configure | encrypted radio for internal use, but when there's large scale | activity they need to fall back to cellphones for guaranteed un- | eavesdroppable comms | Nasrudith wrote: | Well for one it would be very disruptive and hard to justify. | It would interfere with 911 and calling family and would scare | and inconvenience the populace turning them against them and a | certain safe 'status quo' apathy is what they depend upon. | Social dynamics aside more people on the streets makes their | job harder regardless of their demeanor - which they will if | they need to go in person to check on others. | | The disruption to service would also be very expensive to | businesses which would be encourage flight. | | "And we lost this multi-million dollar contract sale because | the cell service to reach us anywhere went down for three days, | a worse case for the company than even if rioters burnt down | the whole office. Why are we located in this shithole again?" | triceratops wrote: | > Why don't cell networks get shut down more often during large | protests etc.? | | What problem are you trying to solve, exactly? | ChuckMcM wrote: | FWIW you can do much the same thing with your own SDR setup. One | of the more surprising things for me was that the feature that a | phone work "internationally" means that a nominally "4G" phones | will still answer a GSM tower (talking on a GSM frequency) when | the tower says hello. Some phones will let you turn that off. | | But that said, most smartphones will tell you their WiFi MAC | address if you tell them you are an access point. It is more | difficult to track a MAC address back to its owner, but it is | easy to see if it shows up again near you. My Cisco access point | did a variant on this when MAC address filtering was on, it would | send you reports of "unknown" MAC addresses which you could log | and then later associate with people visiting the office. | | Bottom line though seems to be to treat protests like DefCon | events if you don't want to leak PII. Get a burner phone for such | trips. | Negitivefrags wrote: | Random story: I once saw an one of the vans for the local ISP | driving around wtih a box labeled "Stingray" and got all excited. | | Picture here: https://imgur.com/a/P1nPSD2 | | Turns out that "Stingray" is also the name of a system for air- | blown optic fiber installation. | | Personally I would have avoided the reuse of that particular name | for anything in telecommunications because it has somewhat dark | connotations already! | jeffbee wrote: | TL;DR it's a radio in your pocket that constantly announces its | identity. I'm quite interested in the fact that people don't | realize this. Is it a generational split between people who can | remember when we did not all have radios in our pockets and those | who can't, or ??? The fact that an always-on radio you carry | everywhere can be used to track you seems like the #1 most | obvious thing about the technology. | rrose wrote: | I feel like you're ignoring a key point here, which is that | these stingray devices can MitM your phone by forcing it to | send essentially unencrypted messages. That's both more | technically complicated and more serious than passive tracking. | bob1029 wrote: | I don't think OP is ignoring any points. It is a statement of | fact that we've been carrying around what ultimately amount | to high power RFID surveillance devices in our pockets for | about 20-30 years now (en masse). There are also many on this | board at this very moment who can remember life before any of | this technology or concern was a thing. | | In 1990, if you walked to the store without telling anyone | where you were going, you were basically a ghost as far as | anyone else was concerned. In 2020, even if you leave all of | your digital electronics at home, you will probably be | detected by someone else's electronics. | rrose wrote: | OP is sort of shrugging off the information in this article | by saying that it should be common sense that by carrying a | phone you are trackable. I don't really disagree with that. | But a major point of the article is that not only are you | trackable, but you can be actively surveilled or even have | your text messages spoofed, which is not common knowledge | and isn't really encapsulated by the "radio in your pocket" | analogy | WarOnPrivacy wrote: | > these stingray devices can MitM your phone by forcing it to | send essentially unencrypted messages. | | Earlier Harris equip did that by forcing 2g mode but 2g is | being turned off: https://1ot.mobi/resources/blog/a-complete- | overview-of-2g-3g... | | I'm less familiar with the capabilities of current IMEI | catchers tho. | op03 wrote: | Do the math. | | The odds of someone targeting you (just for kicks) aren't that | high. | | But don't tell Glenn Greenwald that cause then he has to go | find something else to scare you with, to capture your | attention in our current useless "state of fear" preserving | info tsunami ecosystem. | | But anyway lets do the math... | | The US has 200 cops per million. Lets say 1% of that million | are born douchebags and there is another 1% who have turned | douchebagy for whatever reason. | | So you have 200 cops to deal with 20000 bad guys per million. | So in general they have enough going on keeping them occupied. | | Now even if you assume they don't spend any time doing their | job and all of them spend all their time fixating on you and no | one else, the chances of them picking on you out of the million | other options are still pretty low. | | What makes it even lower is if you apply the 2% douchebag rule | to the cops themselves, you get probably 2 bad apples in that | 200. | | But to indulge you lets apply it also to anyone who has access | to the same privacy violating tech - bank managers, google | engineers, telco engineers, the military, rich ppl etc. Keep | adding whatever category you feel like and applying the 2% | rule. You wont raise the odds too badly. | vanusa wrote: | It doesn't have to target _you_ directly in order to have a | significant negative impact on your life. | tspike wrote: | Your comment comes off pretty condescending and dismissive, | which clouds a valid point. It's not likely you will be | individually targeted by law enforcement. | | The scarier proposition to me is bulk collection and latent | analysis. | [deleted] | jjulius wrote: | You can't expect end users with little-to-no technical know-how | to have the same common knowledge that you do. | TheSpiceIsLife wrote: | I watched a doco last night where researchers put a sounding | beacon _inside_ a shark. | | Inside it! They said something like "these sharks are used to | cuts and scrapes and heal quickly." | | It's no wonder people don't immediately associate their phone | with a locating beacon. | pvaldes wrote: | Maybe I'm not translating correctly "sounding beacon", but | I would assume that what you see was just an (I don't know | the exact term) "electronic tag". This is standard | procedure in ecology, veterinary and animal husbandry. We | did it sometimes. Is a rice grain size object, and does not | left any noticeable scar in fishes. | TheSpiceIsLife wrote: | All good, I don't have any issue with attaching or | implanting tracking devices for research purposes in what | looks like a wholly harmless way. | | From what they were saying, it emitted a ping every ten | minutes, wasn't entirely clear if it was acoustic or | radio. Shark didn't seem to mind. | mixmastamyk wrote: | Most folks generally understand how radio works. | jeffbee wrote: | Well, why not? How can we improve general technological | literacy? I don't want people to memorize the protocols, but | I do want them to have the foundation of knowledge that would | allow them to conclude that if the phone company can connect | calls to your mobile handset, then they can also figure out | roughly where it is. I'd also like for people to have the | basic knowledge required to understand that GPS does not | track you. It's the other way around. I'd like everyone to | understand that mass and energy are conserved, the Earth | orbits the Sun, etc. | grawprog wrote: | >would allow them to conclude that if the phone company can | connect calls to your mobile handset, then they can also | figure out roughly where it is | | To be fair, people have trouble concluding they can be | tracked or found when they sign in to a service and are | asked repeatedly if said service can have access to their | location, then use said service to check in or announce | their location publicly. | spanhandler wrote: | Every professional, expert, specialist, or technician feels | this way about the stuff they know. "Why don't people know | [basic thing about their work]? What a bunch of uneducated | morons." The answer is because if they knew all the basic | stuff about all those fields to be what those experts judge | to be informed consumers, and took the time to apply that | knowledge, they wouldn't have any time left to 1) actually | buy products and services, or 2) learn what they need to | know about their own field. Also because being an | uninformed consumer works out more-or-less OK much of the | time, largely because regulation prevents the worst sorts | of abuses. | | In the specific case of tracking/spying I'd imagine lots of | people (not most, but many) _have_ considered the | possibility, then dismissed it without looking into it any | further because it seems like something that would | _obviously already be illegal_ , and assuming things that | seem like they ought to already be illegal _are_ already | illegal often gets one to the correct conclusion--just not | this time. Those sorts probably assume that if a law | enforcement agency gets a warrant or something _then_ they | might start tracking locations using cell phones, but not | that _the cell phone company is already doing that 100% of | the time to everyone_ , since, again, it _really_ seems | like something that 'd be illegal. I think a lot of the | "information economy" falls in this blind spot--that credit | card companies would be selling your purchase history or | google/your-ISP would be recording every single website you | visit _also_ seem, intuitively, like things that 'd be very | illegal, for example. | jeffbee wrote: | I guess we will disagree on what is or should be | obviously illegal. What your phone does is the functional | equivalent of you walking down the street shouting your | phone number. It does not strike me as obviously wrong | for people to hear it. | rrose wrote: | the article also goes into the fact that these stingray | devices can send text messages from your phone number and | listen to your phone calls in real time. I dont think | your analogy really captures that, and it's hard to | imagine an argument for that being legal (at least | without a warrant) | spanhandler wrote: | I just mean that it's the kind of thing many people who | have some concept of how cell phones work _might assume_ | is illegal because tracking a bunch of people and storing | all that info, or broad, non-tightly-targeted-and- | regulated use of things like stingrays, and the various | other things service providers and law enforcement do to | spy on people really do seem pretty similar to stalking | and warrantless search and various other activities that | are illegal (so, obviously that would be too, how could | it not be, one might reason), and so they might be | surprised that a capability they know or suspect exists | _in the technology_ is used the way it is and to the | extent that it is by both private parties and law | enforcement. Their not thinking about their cell phone as | a device that spies on them or is otherwise very | untrustworthy might not be because they don 't know what | the tech _might do_ but because they 've assumed | exercising those capabilities would be illegal. | | I suppose similar reasoning is how we arrive at our | judgements on _most_ questions of legality, personally, | when deciding how to behave and what to worry about | others doing day-to-day. Like, I definitely can 't show | you the statute that says driving the wrong way on the | highway is illegal, rather than just a very bad idea, and | I'm not sure I've even ever been told _specifically_ that | that is illegal let alone done the research to makes sure | it 's illegal--but nonetheless, I'm pretty sure it is. | So, I would guess some people surprised that their cell | phones spy on them in certain ways are more surprised | that they _are_ being used that way and not that they | _could_ be used that way. | | [EDIT] to stretch the analogy further, if I were | surprised to learn that some delivery company had found a | way to reduce delivery times by driving the wrong way on | the highway, the fact that vehicles _are technically | capable of_ driving the wrong way on the highway wouldn | 't be the part that I found surprising. | WarOnPrivacy wrote: | In a general sense, our problem isn't surveillance but | disproportional surveillance. It's generally appropriate | for LEO to have access to the same data that all of us | do. The problem is when 'privacy' or security laws | restrict you and I from data but not the people who | regularly exercise their exclusive powers to ruin lives. | aylee wrote: | Abstracting away all of the details underlying the tech is | a double edged sword. On one side, you get massively higher | adoption due to a lower barrier to entry. On the other, you | now have a massive population of folks who don't understand | the the "fundamentals". | | I'm not sure we "need" to improve the general | understanding. I mean how many ppl know how to change their | own car tires or oil? If anything you just keep creating | niches for ppl to make livings in. | WarOnPrivacy wrote: | "Why does anyone need to know" is a restrictive premise. | | In my experience, what follows it are less rights, less | ability, greater compliance & increased malleability (eg: | susceptibility to "election meddling"). | TheAdamAndChe wrote: | The median IQ is 100, meaning half of all people have IQs | below 100. Many of them did not grow up in an environment | that pushes lifelong learning. Lots of people do what | they've been trained to do and nothing more, which is good! | Our society needs people like that. But expecting people | like that to think for themselves is a sure way to become | needlessly frustrated. | | edit: switched average to median. | steffan wrote: | The measure that describes what you state would be the | __median __, which is defined as the point at which there | are as many values above as below. | | Averages will skew with large outliers on either side. | E.g. if Bezos and I are alone in a room together, the | average person in that room has $95B dollars. (Granted, | in an n=2 situation, the median isn't meaningful either) | TheAdamAndChe wrote: | You're right, this has been fixed. Thanks! | inetknght wrote: | > _How can we improve general technological literacy?_ | | Fund schools. | | Provide mandatory technical and privacy education. | | > _I 'd also like for people to have the basic knowledge | required to_ | | Fund schools. | WarOnPrivacy wrote: | > Fund schools. | | Hire tech capable teachers that care. Funding only works | if it's toward this specific end. | inetknght wrote: | > _Hire tech capable teachers that care._ | | I know teachers who make < $30k/year _and_ have to pay | out-of-pocket for supplies. Good luck attracting tech | talent with that salary. | | So, again: fund schools. | WarOnPrivacy wrote: | You've misrepresented my premise by quoting it without | the context. | | Funding incapable teachers can't advance your goal. As | long as the plan is "Fund schools." and nothing at all | follows the period "." then students will have properly | funded incapable teachers. | | Source: Father to 5, who've attended 25 years of well | funded and less funded schools. That's well over 100 | teachers I've met with & learned about. Zero teachers | understood technology on a level that would enable them | to teach the nuances of technology safety. Many (if not | most) would have been handicapped by the | misunderstandings they held about tech. | notabee wrote: | Funding alone won't fix the decades of neglect, social | norms built around that dysfunction, and the incompetent | leadership many schools systems suffer with. But it's a | necessary first step. If you don't fix the other pieces | though, even higher pay won't keep the people around who | should be there. I have known some teachers who tried | their damnedest and were very competent, but burned out | quickly. | amanaplanacanal wrote: | This seems like a common tv and movie plot point though. If | you don't want to be found you have to destroy or lose your | phone. | GaryNumanVevo wrote: | Pro-tip: If you want fairly good OPSEC when going to a protest, | get a burner Android phone, put it on airplane mode with WIFI | only. Then purchase a couple of Comcast / Xfiniti logins off the | web, and use those to connect to "xfiniti-wifi" hotspots. Most | cities have them, the speeds are fairly decent too. | | We're truly living in the panopticon | gruez wrote: | If you have gapps installed (every stock ROM unless you're in | china), you should probably assume google is tracking your | location through wifi networks. As such, you should probably | install lineageos for additional security. | rootsudo wrote: | This is more reason then ever to flash a generic android | image. | | Google does track your wifi and have amassed a huuuuuge | library of SSID name, freq, mac addresses and this is what | they use alongside IP geo location for google maps and other | services. | | It's good and also bad. And if you restrict these things, you | "look" like a bot so you have increased friction to accessing | information! | | The looking like a bot, makes sense I get that and ddos | prevention but it goes in a circle, doesn't it? | | iPhone is not the answer either, but an iphone w/ no google | apps doesn't mean you're free from the ecosystem. | refurb wrote: | Maybe I'm being overly paranoid, but if you're arrested, what's | stopping the cops from matching the phones MAC to public wifi | connections? | GaryNumanVevo wrote: | Realistically nothing, however if they're using a Stingray to | target large swaths of people, you're more likely to avoid | getting your phone pinged on WIFI. Not to mention going after | specific MAC info from Xfinity takes a long time. | zamadatix wrote: | Since Android 9 there is an option to use randomized MACs for | the actual connection (not just probing). | mixmastamyk wrote: | Most folks won't be aware of an option unless it is | default. | chocolatkey wrote: | On my Samsung Galaxy S10e (Android 10) it is the default | zamadatix wrote: | That's for probing only, randomization on connection is | accessible via developer options only. | CharlesW wrote: | This might be helpful: https://support.apple.com/en- | us/HT211227 | | > _To reduce this privacy risk, iOS 14, iPadOS 14, and | watchOS 7 include a feature that periodically changes the MAC | address your device uses with each Wi-Fi network. This | randomized MAC address is your device 's private Wi-Fi | address for that network--until the next time it joins with a | different address._ | | iOS 14 is in beta, but has been pretty solid for me. | https://beta.apple.com/sp/betaprogram/ | helios_invictus wrote: | You should not have to be good at opsec or economically | advantaged to be able to demonstrate. | sbierwagen wrote: | Then don't bring a cell phone to a protest? | dylan604 wrote: | Then again, what would happen to a protestor that actually | protested in a non-violent manner? Let's specify in the US | as I can only guess it would be much more dangerous to | protest in a country without a protected constitutional | right to do so. So a US citizen brings their cell phone to | a protest, non-violently marches with their signs, sings | some songs, yells some, gets dispersed in a violent manner | and/or gets arrested. If their cell phone gets pinged in a | Stingray sweep, what happens? What's the negative | repercussions? | ghaff wrote: | It would certainly seem as if far and away the easiest and | best opsec is to not have your phone on you or at least not | turned on. Have people really become so dependent on their | phones that the thought of being somewhere without one | doesn't even come up as an option? I'd certainly at least | turn my phone or a burner phone off before depending on not | being compromised. | nick_kline wrote: | People are pretty dependent on their cell phones. It's | our maps, ways out of places. You can even do bus tickets | on them. It's our way to call for help, see if someone is | okay. So it's weird not to have my phone on me. | closeparen wrote: | Are there documented examples of people in the US facing | repercussions because they were known to have been at a | protest? | tedunangst wrote: | Arrested for "your cell phone said you were at the | protest" not so much. Arrested for "you were photographed | throwing a molotov wearing a limited edition etsy shirt | for which you left a review using the same handle as your | instagram account" yeah. HN kinda considers that to be | the same thing though. | GaryNumanVevo wrote: | Completely agree, between DHS compiling information on | journalists and unmarked vans picking up protesters, it's | like the Arab Spring | AftHurrahWinch wrote: | In Portland hundreds of demonstrators used the mesh-networking | app Bridgefy, and some affinity groups used goTennas which even | served streaming movies, music, and documentaries that spoke to | the revolutionary tenor. | sschueller wrote: | How does bridgefy make money? It's not open source. The | website leads to a level 3 default page. | | How do you know the feds don't own it? | blue52 wrote: | During uncertain times like this we need to be asking the | hard questions. Always use protection like a VPN and | iptable when connecting to unknown/untrusted networks. | nick_kline wrote: | Won't your wifi mac address be a unique identifier? Did google | start doing wifi mac address randomization? | samschooler wrote: | Through the pandemic, Xfinity is offering anyone free guest | access, so for at least the next few months, you don't need to | even buy logins. | https://corporate.comcast.com/press/releases/comcast-extends... | codemac wrote: | Note, this only works on the xfinity "public wifi stations" | rather than the xfinity ssid's from home routers. | | If you want to access the home router networks, you still | need to pay for an account. | samschooler wrote: | Yup thanks for the clarification | omarchowdhury wrote: | Are these logins legally purchasable or is there some | black/grey market for them? | seniorsassycat wrote: | > stingrays can force phones to downgrade to 2G, a less secure | protocol, and tell the phone to use either no encryption or use a | weak encryption that can be cracked. | | Can android, iOS, or an open phone os prevent 2g communication? | sudosysgen wrote: | On Android, on most phones you can do _#_ #4636# _#_ , then get | access to the service menu and configure the modem to act how | you want it to. | [deleted] | jdefr89 wrote: | Hey, I used to briefly work on the device in question. It's | capabilities go far beyond just downgrading cellular service. I | obviously can't say much more about it but I am a huge | proponent of creating strong laws regarding who can use such a | device and when. Putting such devices in the hands of low level | law enforcement officers to use against their communities for | trivial reasons can only turn out poorly. | boring_twenties wrote: | On Android, enter \ _#\_ #4636#\ _#\_ in the dialer. Then | select "LTE only." (This will prevent 3G as well as 2G) | | edit: You gotta be kidding me with this formatting. Replace | backslashes with asterisks. | function_seven wrote: | My apologies if this comes out garbled. Trying something... | | *#*#4636#*#* | boring_twenties wrote: | How? | edflsafoiewq wrote: | *=U+2217 | ideals wrote: | Before I entered a random string into my phone I did a | quick search which pulls up a bunch of other dialer | commands for Android. It's pretty interesting | | https://android.stackexchange.com/questions/1468/do-you- | know... | [deleted] | godelski wrote: | That's because it is for MarkDown. So you can do things like | _this_. But you can do * this * and it is fine. The | difference is spacing. | edflsafoiewq wrote: | In normal Markdown you can escape with \ but it doesn't | work on HN for some reason. | xxpor wrote: | On my phone (Galaxy Note 10), there's a toggle to allow 2G or | not in the mobile network settings. No debug code needed or | anything like that. | WarOnPrivacy wrote: | >Can android, iOS, or an open phone os prevent 2g | communication? | | Some android installs can turn off 2g here: Settings -> Mobile | Networks -> Network Mode | | However - 2G & 3g networks appear to be going away. | https://1ot.mobi/resources/blog/a-complete-overview-of-2g-3g... | | AT&T killed 2g in 2017 https://www.pcmag.com/news/att- | kills-2g-cutting-off-original... | | T-Mobile is in the process of turning off 2g | https://www.alarmgrid.com/blog/t-mobile-and-rogers-2g-networ... | [deleted] | fulafel wrote: | They could but they don't, and it's been known all along that | these downgrade attacks are devastating to security and very | practical. Complicity? | shakna wrote: | It happens within the OS for the baseband processor, not within | the OS of the actual phone. Unsurprisingly, the details of how | the baseband processor work are a highly guarded secret, and | trying to reverse engineer anything around it will end up with | a heft lawsuit thrown at you. | jessaustin wrote: | Presumably the creators of these devices have done at least | some of that reverse engineering? | jacquesm wrote: | > trying to reverse engineer anything around it will end up | with a heft lawsuit thrown at you. | | Is there an example of that? I can't imagine how reverse | engineering anything would get a hefty lawsuit thrown at you. | Maybe if you were to publish the results with your name under | it, but just the act of reverse engineering? | kawsper wrote: | These low-level systems can be good attack vectors, on our | computer systems if you can attack the BIOS (Intel ME or AMD | PSP) it doesn't matter much what defenses the operating | system has. | | Luckily, most of our computers aren't easily remotely | connectable, but phone modems are another story. | pas wrote: | This is probably something that the baseband radio processor | decides. Depending on the firmware/software on the chip the | host OS might be able to instruct it to don't ever downgrade to | 2G. | myroon5 wrote: | It's even possible for phones to be tracked while turned off: | | http://www.washingtonpost.com/world/national-security/nsa-gr... | | https://slate.com/technology/2013/07/nsa-can-reportedly-trac... | alain94040 wrote: | How is this possible? | ExThermoGuy wrote: | Your phone is never really off. | sbierwagen wrote: | Heads up: your account has been autobanned, maybe because | you're commenting too many times as a new user, or for some | other reason. | x86_64Ubuntu wrote: | How can you tell? | sbierwagen wrote: | Turn on "showdead" in account settings. This will show | comments from banned users. | | I am only guessing they were autobanned. Comment history | from the time of the banning doesn't show anything | particular egregious that would trigger a manual ban. | notyourday wrote: | Unless you can physically disconnect the battery, your phone | may not actually be fully off. | | For example, on my Android phone should I drain the battery | into oblivion ( let the phone die ) and let it sit for about | a week in that state, takes about 90 seconds to become fully | functional to the lock screen from the moment it is plugged | into a charger. | | On the other hand if I do hard power off of a phone followed | by powering it on, it takes ~35-40 seconds for a phone to get | to the lock screen. Out of curiosity I tested several more | handsets with similar results. I can only explain that | difference by phone not being completely powered off when the | battery is inserted unless it does not have any juice at all. | hammock wrote: | It's called warm boot vs. cold boot (or soft boot vs hard | boot) | mixmastamyk wrote: | I had assumed phone hardware generally won't power on until | the battery has charged to 5% or so, ostensibly to prevent | power drops. Not sure which idea is more accurate without a | mobile electronics engineer chiming in. | extrapickles wrote: | You can use a non-linear junction detector, and triangulate | on the signal it forces the target radio to give off. They | are not very selective, so it's easier to track when there | are very few radios in the area under illumination. | | The easier way is to compromise the phone and have it pretend | to be off. | arsome wrote: | Do they even need to bother with a Stingray, can't they basically | just pull up whatever provider's law enforcement portal and click | a few buttons? | TheSpiceIsLife wrote: | Yeah, different tool though. | | An active mode IMSI capture device (eg, a Stingray) can: | | _Extracting stored data such as International Mobile | Subscriber Identity ( "IMSI") numbers and Electronic Serial | Number ("ESN") | | Writing cellular protocol metadata to internal storage | | Forcing an increase in signal transmission power | | Forcing an abundance of radio signals to be transmitted | | Forcing a downgrade to an older and less secure communications | protocol if the older protocol is allowed by the target device, | by making the Stingray pretend to be unable to communicate on | an up-to-date protocol | | Interception of communications data or metadata | | Using received signal strength indicators to direction find the | cellular device[9] Conducting a denial of service attack | | Oop, near forgot the reference | https://en.wikipedia.org/wiki/Technical_and_further_educatio... | | Radio jamming for either general denial of service purposes or | to aid in active mode protocol rollback attacks_ | jacquesm wrote: | No, usually they need some kind of warrant for that. | jdefr89 wrote: | They will need a warrant usually even with stingray. I worked | at said company on said technologies and left because I was | comfortable with controls in place that prevent law enforcement | from abusing it. | jagged-chisel wrote: | > I was comfortable | | I think perhaps you meant the opposite? You have about 30min | to edit your comment... | samtheprogram wrote: | Not sure why you're getting downvoted, the other words in | GP's comment, along with his other comment here [1], | clearly indicate that you're right. Unfortunately it looks | like 30 minutes have gone by. | | 1: https://news.ycombinator.com/item?id=24039707 | jagged-chisel wrote: | Not to mention the logical discontinuity in "I left | because I was comfortable" - I'd expect one to stay if | they were comfortable. I would expect them to leave if | they were not comfortable. But regardless of my | expectations, I certainly could have been wrong. | | According to several other comments of theirs, discomfort | drove them out. So I didn't believe I was incorrect. It's | been awhile since I commented, so I hadn't even noticed | any downvotes. | xkcd-sucks wrote: | Anecdotally from listening to police scanners, whenever there's | an areawide BOLO notice or anything exciting involving a known | party, they always say where the last "cellphone ping" was. | E.g. "Look out for a Black male driving a white Nissan, last | cell ping was on the north side of Lowell 15 minutes ago." Not | sure if a warrant is required, but it happens pretty quickly | blantonl wrote: | That data is typically from the cell phone network provider | themselves, not stingray and dirtboxes. It's part of the | Enhanced 911 system in the United States. | vanusa wrote: | So - what countermeasures do people recommend? | | Is there anything one can carry around that acts like "phone" but | is somehow less trackable? | partdavid wrote: | Someone else's phone? | [deleted] | kmfrk wrote: | Title is "How Cops Can Secretly Track Your Phone" on my end. | Assuming that was the original one, some comments here seem to | suggest they only read the custom title without checking out the | actual article. | jancsika wrote: | Protests should shift to "choose-your-own-adventure" style where | a blockchain decides which branch to take. Just have a small | selection of, say, 4 styles to choose from, where the most | extreme includes potential branches with Ghandi-level long-term | economic disruption. | | That way the stingray offers no advantage over the protesters; | law enforcement and protesters get the next chapter at exactly | the same time, and no single protestor or group of protestors may | be targeted to disrupt the decision-making process. | | That pushes law enforcement either back to pre-protest prevention | measures (which won't work for a spontaneous protest like BLM), | or to disrupt internet connectivity altogether (which, for the | Ghandi-level protest has its own economic implications). ___________________________________________________________________ (page generated 2020-08-03 23:00 UTC)