www.infosecinstitute.com Open in urlscan Pro
2606:4700:4400::6812:259a  Public Scan

URL: https://www.infosecinstitute.com/resources/general-security/cellphone-surveillance-the-secret-arsenal/
Submission Tags: falconsandbox
Submission: On September 22 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form action="" method="post" id="newsletterForm" class="form">
  <label for="emailAddress" class="sr-only">Enter your email</label>
  <input type="email" id="form_input_email" class="form__input" placeholder="Email address..." aria-label="Email address..." required="">
  <button type="submit" class="btn btn-accent btn-block" aria-label="Submit Modal Form"> Subscribe </button>
  <p class="text-small text-light mt-20 mb-0">For information about how Cengage uses personal information, see our <a href="https://www.cengagegroup.com/privacy/" target="_blank">privacy policy</a>.</p>
  <input name="__RequestVerificationToken" type="hidden" value="CfDJ8L039E6eQgNDiOt87HnDaVtVFp_uGEtmX0HHM0G0_zZbFJDRzqIYeaTl-vRKnUi33mIuKBl8rKb1yrhcPtEzvzANn2LVM7px3goe2y0xT4UXELLppxTnLC-2aheZtfqEdkutpsuvAlGrPhV_nxh0s2I">
</form>

Text Content

Skip to content
 * 708.689.0131
 * Contact us
 * Partners
 * Login

 * 
 * Training
   Go to the "Certificates"
   All cybersecurity training
   
   --------------------------------------------------------------------------------
   
   Live Boot Camps
   
   Infosec Boot Camps offer live, instructor-led cybersecurity and IT
   certification training in-person or online.
   
   View All Schedules Learn More
   
   --------------------------------------------------------------------------------
   
   Self-Paced Training
   
   Infosec Self-Paced Training accommodates your schedule with
   instructor-guided, on-demand training.
   
   Contact Us Learn More
   
   --------------------------------------------------------------------------------
   
   Immersive Boot Camps
   
   Infosec Immersive Boot Camps kickstart cybersecurity careers with tailored
   training in as little as 26 weeks.
   
   View Program Learn More
   
   --------------------------------------------------------------------------------
   
   Learning Paths
   
   Infosec Skills provides on-demand cybersecurity training mapped to skill or
   role paths for any level.
   
   View Pricing Learn More
   
   --------------------------------------------------------------------------------
   
   Training by role
   
   --------------------------------------------------------------------------------
   
    * Cloud Security Engineer
    * Cybersecurity Beginner
    * Digital Forensics Analyst
    * OT Security Practitioner
    * Information Risk Analyst
    * Penetration Tester
   
    * Privacy Manager
    * Secure Coder
    * Security Architect
    * Security Engineer
    * Security Manager
    * SOC Analyst
   
   Team training
   
   --------------------------------------------------------------------------------
   
   Advance your team's cybersecurity skills with our customizable,
   industry-recognized programs and take advantage of our team training
   discounts.
   
   Learn More
   Award-winning training you can trust
   
   --------------------------------------------------------------------------------
   
    * 
    * 
    * 
    * 

 * Certifications
   Go to the "Security Awareness"
   Cybersecurity certifications View All Certifications
   
   --------------------------------------------------------------------------------
   
   Most popular certifications
    * CompTIA Security+
    * ISC2 CISSP®
    * ISACA CISM
    * PMI Project Management Professional (PMP)
    * Cisco CCNA Associate & CyberOps Associate
   
   --------------------------------------------------------------------------------
   
   CompTIA
    * CompTIA A+
    * CompTIA Network+
    * CompTIA Security+
    * CompTIA CySA+
    * CompTIA PenTest+
    * CompTIA CASP+
    * CompTIA Linux+
   
   --------------------------------------------------------------------------------
   
   ISC2
    * ISC2 CISSP®
    * ISC2 CCSP®
    * ISC2 CGRC®
    * ISC2 CSSLP®
    * ISC2 ISSEP®
   
   --------------------------------------------------------------------------------
   
   ISACA
    * ISACA CISM
    * ISACA CISA
    * ISACA CRISC
    * ISACA CGEIT
   
   --------------------------------------------------------------------------------
   
   Other certifications
    * Ethical Hacking Dual Certification (CEH & PenTest+)
    * Infosec RHCSA
    * Cyber Threat Hunting
    * Microsoft Azure Dual Certification
    * Certified CMMC Professional (CCP)
    * AWS Certified DevOps Engineer
   
   View All Certifications
   
   We offer multiple ways to save when it comes to training and certifying your
   team.
   
   Learn More
 * Security Awareness
   Go to the "Solutions"
   
   --------------------------------------------------------------------------------
   
   Empower employees with knowledge and skills to stay cyber secure at work and
   home with 2,000+ security awareness resources.
   
   View Pricing Learn More
   Security awareness training
    * Prebuilt training plans
    * PhishNotify
    * Threat quarantine
    * Phishing simulator
    * Reporting and assessments
    * Integrations and automation
    * Global administration
    * Program management
   
   Demo Now Browse Featured Training
 * Solutions
   Go to the "Resources"
   Enterprise solutions
   
   --------------------------------------------------------------------------------
   
    * Businesses and industries
      
      Security education to the right people from IT and security staff to the
      C-suite and every employee.
      
       * Security and IT teams
       * Government and contractors
       * Manufacturing
       * Higher education
       * MSPs and resellers
      
      --------------------------------------------------------------------------------
   
    * Technical training and certifications
      
      Skills and certifications your team should get next with training mapped
      to NIST and NICE Frameworks.
      
       * Subscription learning
       * EdAssist Solutions Client discounts
       * Affirm financing
       * Training vouchers
       * SmartPay
      
      --------------------------------------------------------------------------------
   
    * Compliance
      
      Flexible, scalable training solutions that add value to your client
      services portfolio and reduce business risk.
      
       * DoD 8570/8140
       * Security awareness

 * Resources
   Go to the "About Us"
   Popular resources
   
   
   --------------------------------------------------------------------------------
   
    * Blog Blog
    * Ebooks Ebooks
    * Webinars Webinars
      * Certifications
      * Security awareness
      * Phishing
      * Professional development
      
      --------------------------------------------------------------------------------
   
    * Cyber Work Podcast Cyber Work Podcast
      * Career series
      * Quick tips
      * Live events
      
      --------------------------------------------------------------------------------
   
   Certification hubs
   Certification Hubs
    * CompTIA Security+
    * Certified Information Systems Security Professional (CISSP)
    * Certified Information Security Manager (CISM)
    * Project Management Professional (PMP)
    * Cisco Certified Network Associate (CCNA)
    * Certified Cloud Security Professional (CCSP)
    * Certified Ethical Hacker (CEH)
    * CompTIA Network+
    * CompTIA CASP+
    * CompTIA CySA+
   
   --------------------------------------------------------------------------------
   
   Free tools and downloads
   Free tools and downloads
   
   --------------------------------------------------------------------------------
   
    * Phishing Risk Test
    * Security Awareness Training Plans
    * Skill Development and Certification Course Catalog
    * Cybersecurity Interview Tips
    * Case studies
   
   --------------------------------------------------------------------------------
   
   Featured webinar
 * About Us
   Go to the "Search"
   We are the leader in cybersecurity training
   
   --------------------------------------------------------------------------------
   
   We help IT and security professionals advance their careers with skills
   development and certifications while empowering all employees with security
   awareness and phishing training to stay cyber safe at work and home.
   
   Learn More
    * Leadership
    * Careers
    * Partners
    * Events
    * Alliances
    * Community
    * Scholarship
    * Awards
   
   Contact Us
 * 
 * Book a Meeting
 * Award-winning training you can trust
   
   --------------------------------------------------------------------------------
   
    * 
    * 
    * 
    * 


 * Resource Center
 * General security
 * Cellphone Surveillance: The Secret Arsenal

General security


CELLPHONE SURVEILLANCE: THE SECRET ARSENAL

January 8, 2016 by
Pierluigi Paganini




STINGRAY AND THE CELLPHONE SURVEILLANCE



In a previous post, I detailed the technologies used to track mobile devices,
with a specific reference to the StingRay IMSI-catcher (International Mobile
Subscriber Identity).

An IMSI-catcher is a surveillance solution used by law enforcement, military and
intelligence agencies for telephony eavesdropping, it is the technology used for
intercepting mobile phone traffic and tracking movements of mobile phone users.

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has
12 free training plans to help you hit your goals. Get your free copy now.
Get Your Plan

An IMSI catcher runs a Man in the Middle (MITM) attack acting as a bogus mobile
cell tower that sits between the target mobile phone and the service provider's
real towers.

The only way to prevent being tracked by an IMSI catcher is using specific
products that secure communication on mobile devices. Modern Sting
Ray implements a large number of functionalities, they allow attackers to
intercept calls and Internet traffic, send fake texts, locate the devices and
also inject malware, typically spyware and mobile RAT, that allows to gain full
control over the victim's device an exfiltrate the data.

The use of the IMSI-catcher is condemned by privacy advocates, the StingRay and
other IMSI surveillance systems are invasive and the principal problem related
to their usage is that they operate a dragnet surveillance spying not only the
targeted mobile, but concurrently also all nearby cellular devices.





Figure 1 - StingRay







HOW DOES STINGRAY WORK?



Stingray equipment could operate in both active and passive modes, in the first
case the device simulates the behavior of a wireless carrier cell tower, in the
second case it actively interferes with cellular devices performing operations
like data exfiltration.

The Stingray system is typically installed in a vehicle in a way that agents can
move it into any neighborhood, it tricks all nearby cellular devices into
connecting to it and allowing data access by law enforcement. Recently law
enforcement and intelligence agencies installed Geo-Locating systems also on
aircraft and drones.

Let us see in detail the two operative modes implemented by the StingRay
technology.




THE PASSIVE MODE



A StingRay that is operating in passive mode is able to receive and analyze
signals being transmitted by mobile devices and wireless carrier cell stations.

The term "passive" indicates that the equipment doesn't communicate directly
with cellular devices and does not simulate a wireless carrier cell site.

By adopting a passive mode technique, the attacker can extract information
related to the cell phone, including identification numbers, signal strength,
and signal coverage areas. The Stingray operates as a mobile phone and collect
signals sent by cell stations near the equipment.




THE ACTIVE MODE



A StingRay equipment operating in "active mode" will force each cellular device
in a predetermined area to disconnect from its legitimate service provider cell
site and establish a new connection with the attacker's StingRay system.
StingRay broadcasts a pilot signal that is stronger than the signals sent by
legitimate cell sites operating in the same area, forcing connections from the
cellular device in the area covered by the equipment. The principal operations
made by the StingRay are:

 * Data Extraction from cellular devices - The StingRay collects information
   that identifies a cellular device (i.e. IMSI, ESN) directly from it using
   radio waves.
 * Run Man in The Middle attacks to eavesdrop Communications Content
 * Writing Metadata to the cellular device
 * Denial of Service, preventing the cellular device user to place a call or
   access data services.
 * Forcing an Increase in Signal Transmission Power
 * Forcing an Abundance of Signal Transmissions
 * Tracking and Locating





Figure 2 - StingRay case study







TRACKING CELLULAR DEVICES, A PROLIFIC MARKET



A growing number of actors are interested in the StingRay technology, not only
law enforcement, but also foreign intelligence agencies use these devices to spy
on their targets.

In this paragraph we will analyze in detail the solutions available on the
market, at least the most popular ones.

Recently the news agency The Intercept has leaked online a secret catalog of
cellphone spying devices used by the US intelligence, and not only. The document
is a precious source of information that has been given to the online
publication by someone inside the intelligence community.

The person who passed the document to The Intercept declared to be concerned
about the growing militarization of domestic law enforcement.

"The Intercept obtained the catalogue from a source within the intelligence
community concerned about the militarization of domestic law enforcement. (The
original is here.)" states the post published on the Intercept.

"A few of the devices can house a "target list" of as many as 10,000 unique
phone identifiers. Most can be used to geolocate people, but the documents
indicate that some have more advanced capabilities, like eavesdropping on calls
and spying on SMS messages. Two systems, apparently designed for use on captured
phones, are touted as having the ability to extract media files, address books,
and notes, and one can retrieve deleted text messages."


The catalog includes 53 cellphone spying devices, including Stingray I/II
surveillance boxes and Boeing "dirt boxes."

There are some devices small enough to fit in a backpack such as the Blackfin
that allows agents to eavesdrop nearby communications.

The document also includes many other cellphone spying devices that are less
popular of the Stingray that could be used by law enforcement and intelligence
agencies in various scenarios, including the deployment on drones and aircraft.

One of the spying devices is sold by the NSA, while another was designed for use
by the CIA.

These systems are a long debated because they allow authorities to conduct
dragnet surveillance, the cellphone spying devices have been used by local law
enforcement agencies across the United States for a long time.

"The archetypical cell-site simulator, the Stingray, was trademarked by Harris
Corp. in 2003 and initially used by the military, intelligence agencies, and
federal law enforcement." continues the post. "Another company, Digital Receiver
Technology, now owned by Boeing, developed dirt boxes — more powerful cell-site
simulators — which gained favor among the NSA, CIA, and U.S. military as good
tools for hunting down suspected terrorists. The devices can reportedly track
more than 200 phones over a wider range than the Stingray."

The Intercept also reported the case of Marc Raimondi who was employed by the
Harris company and that now is a Department of Justice spokesman who claims the
agency's use of Stingray cellphone spying devices is legal.

Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation
has repeatedly expressed its disappointment in the use of these devices in a
domestic context.

"We've seen a trend in the years since 9/11 to bring sophisticated surveillance
technologies that were originally designed for military use—like Stingrays or
drones or biometrics—back home to the United States," said Jennifer Lynch "But
using these technologies for domestic law enforcement purposes raises a host of
issues that are different from a military context."




THE BLACKFIN-I/II



The Blackfin is a device produced by the Harris Corporation, the same that
designed the StingRay. It has limited dimension that allow agents to worn it on
the body, its main features are the eavesdropping capability (both voice and
text) and possibility to use it to shut down nearby devices in a selective mode.

It costs $75,000, and implements a mobile controller via Bluetooth.





Figure 3 -Blackfin Device







DRT 1101B, AKA DIRT BOXES




This surveillance device allows agents to monitor up to 10,000 mobile devices,
making it ideal for monitoring during public events and political protests. It
is able to target both analog and digital wireless devices, intercepting voice
data.





Figure 4 - Dirty Box




These devices could be also mounted in an aircraft or a drone flying over the
targeted people.

It is sold by Digital Receiver Technologies, a subsidiary of Boeing Integrated
Defense Systems and costs $78,850.00.

The equipment belongs to a complete family of devices known as dirt boxes which
includes DRT 1183, DRT 1201C, DRT 1301C, DRT1101B

The DRT 1301C and the DRT 4411B provide features similar to other tools of the
family but they are characterized by a limited overall dimensions. They cost
respectively $100,000 and $40,000.





Figure 5 - DRT 4411B DIRT Box







TYPHON



Typhon is a surveillance product designed by the experts of the TAO unit at the
National Security Agency, it is able to capture data only from GSM mobile
devices. It works only in the US, but won't work on Sprint, Verizon, and U.S.
Cellular phones in the United States. The device has an operative range of 30
kilometers in rural areas and 5 kilometers in urban ones. It cost $175,800.





Figure 6 - NSA Typhon







TRIGGERFISH



The Triggerfish is an eavesdropping equipment that allows law enforcement to
intercept cellular conversations in real time. Its use extends the basic
capabilities of StingRay, which are more oriented to device location monitoring
and gathering metadata. The Triggerfish allows authorities to monitor up to
60,000 different phones at one time over the targeted area.





Figure 7 - Triggerfish




According a post published by the journalist Ryan Gallagher on Ars, its cost
ranges between $90,000 and $102,000.




CYBERHAWK



Cyberhawk is able to exfiltrate data off over 79 mobile devices, including SMS
messages, phonebook, dialed numbers, and any other file stored in the phone. It
is a privileged instrument for espionage and investigation, it can be used to
track network of individuals analyzing the information on their mobile devices.





Figure 8 - Cyber Hawk







KINGFISH



The Kingfish is a surveillance transceiver produced by the Harris Corporation
that is used by law enforcement and intelligence agencies to track cellular
devices and exfiltrate information from mobile devices over a targeted area. It
could be concealed in a briefcase and allow to gather unique identity codes and
show connections between phones and numbers being dialed. Its cost is slightly
higher than $42433.


The device is able to locate a phone only when the phone is turned on and the
owner isn't involved in a conversation, it works with both GSM and CDMA phones.






Figure 9 - Kingfish







STARGRAZER III



Stargrazer is a military device used to degrade or disrupt a targeted
adversary's command and control (C2) system on the satellite Thuraya Handsets
(HS). The equipment is able to extract IMSI, IMEI and other metadata from the
handset locating it, and jam the device when operates in "attack mode."






Figure 10 - Stargrazer III







RADIANCE



The Radiance is a fixed Wing Geo-Location system is able to capture, query and
locate CDMA-2000 and IS-95 mobile devices.






Figure 11 -Radiance







WINDJAMMER



Windjammer is a hand-held satellite simulator that can be used to geo-locate a
handset or launch a denial of service attack on a given target. It tricks
satellite terminals into thinking they are communicating with the legitimate
network. It is manufactured by the SR Technologies Inc which offer it for sale
at $192,000.00.





Figure 12 - Windjammer







AMBERJACK



The Amberjack is an important accessory for the surveillance systems like
Stingray, Gossamer, and Kingfish. It is a direction-finding system antenna that
is used for cellular device tracking. It costs nearly $35,015





HARPOON



The Harpoon is an "amplifier" (PDF) that can work in conjunction with both
Stingray and Kingfish devices to track targets from a greater distance. Its cost
ranges between $16,000 and $19,000.






Figure 13 - Harpoon







HAILSTORM



Hailstorm is a surveillance device that could be purchased as a standalone unit
or as an upgrade to the Stingray or Kingfish. The system allows the tracking of
cellular devices even if they are based on modern technology.

"Procurement documents (PDF) show that Harris Corp. Has, in at least one case,
recommended that authorities use the Hailstorm in conjunction with software made
by the Nebraska-based surveillance company Pen-Link. The Pen-Link software
appears to enable authorities deploying the Hailstorm to directly communicate
with cell phone carriers over an Internet connection, possibly to help
coordinate the surveillance of targeted individuals." states Ars in a blog post.

The cost of Hailstorm is $169,602 if it is sold as a standalone unit, and it
could be cheaper if acquired as an upgrade of other surveillance devices.




RAVEN



Raven is one of the most powerful tools for surveillance of WCDMA, it is able to
interrogate and geolocate target devices. It can operate from the air or from
the ground. Among its limitations, it requires a separate network survey device
and can cause Denial of Service (DOS) during operation of the UMTS network. It
costs $800K.





Figure 14 - Raven







GOSSAMER



The Gossamer is a portable unit that is used to access data on cellular devices
operating in a target area. Gossamer provides similar functionality of Stingray
with the advantage of being a hand-held model. The Gossamer lets also law
enforcement to run a DoS attack on a target blocking it from making or receiving
calls, as explained in the marketing materials (PDF) published by a Brazilian
reseller of the Harris equipment.

The Gossamer is sold for $19,696.





Figure 15 - The Gossamer







GARUDA (G-BOX) AND THE CARMAN II



The G-Box a GSM airborne geo-location system that emulates a GSM network Base
Station to trick victims' devices to connect it. The device is able to spy only
on those handsets whom IMSI (International Mobile Subscriber Identity) or IMEI
(International Mobile Station Equipment Identity) is included in a target watch
list.

When the targeted handset is registered to the box, a geo-location solution is
calculated. Its cost is $185,000.00.





Figure 16 - Key-W G-Box




The same Key W company also produces the Carman II, aka C-Box II, which is a GSM
BTS that operates in like the Garuda. It works in the 850/900/1800/1900 MHz GSM
bands and cost $130,000.





Figure 17 - Carman II







ARTEMIS AND ARTEMIS II



Artemis is a family of GSM Geo-location systems produced by the Martone Radio
Technology (MRT) company that operate like the Carman and G-box devices. The
principal limitation related to these equipment is that they cannot be mounted
on an airplane and can be used exclusively as a ground system in coordination
with Nemesis/Maximus.

The version Artemis "T" to be used for Thuraya in development. The cost for both
Artemis and Artemis II devices is $83,333.00.





Figure 18 - Artemis







MAXIMUS



Maximus is a Ground GSM stimulation & geo-location device that simulates a BTS
to STIM handset into RF TCH allowing for DF. The system incorporates the Artemis
equipment to implement geo-location functionality.

It can operate from a ground distance ~1-4 Km, also in this case in order to
capture the target the handset must be on and not engaged in a call. It is sold
by the Martone Radio Technology, Inc. for $365,000.00





Figure 19 - Maximus







DEEPPARK



The DeepPark is a fixed Wing Geo Location manufactured by the Rincon IAW NRO and
offered for sale at $250,000.

The surveillance equipment could target 450 sub-band A/C, 800, and 1900MHz
CDMA-2000 & IS-95 mobile devices. It could be used to conduct both passive and
active stimulation and geolocation of the. Differently from other similar
devices, it cannot be used to launch a DOS attack on the system.





Figure 20 - DeepPark







NEBULA



The Nebula is another surveillance device developed by the experts at the NSA.
Nebula is a geo-location system designed to monitor GSM (Multi-Band), CDMA,
UMTS, and HSDPA. Currently can target HPCP, GSM, Inmarsat, Thuraya, CDMA-2000,
HSDPA devices.

Nebula is able to lock and hold traffic from a distance of 12 miles and is able
to GeoLocate a device within 200m. The catalogue disclosed by the Intercept
revealed Nebula has high DC power requirements.





Figure 21 - Nebula







SPYING FROM THE SKY



In November 2014, the Wall Street Journal revealed a secret U.S. surveillance
program leveraging on bogus cell phone towers installed in airplanes to scan
Americans' cell phones and syphon their data.





Figure 22 - WSJ about Dirtboxes on a Plane




The tower signals are used to trick phones to automatically switch over to its
signal, the technique is the same used to spy on cellphone and dubbed StingRay

"The boxes used by the program allow planes to pose as the nearest cell phone
tower, which prompts cell phones under surveillance to disclose their location
and identity information, even if a legitimate tower is closer than the plane
overhead. The dirtboxes also have the ability to interrupt calls, though
officials have reportedly tried to mitigate the harmful consequences of that
function." reported the Business Insider.

The technique was adopted by US law enforcement, the Justice Department used
this method to collect huge amount of data to use in its investigations.

Security and privacy experts are contrary to this "insanely broad airplane data
dragnet" because it affects people all over the country.

The program started in 2007 and U.S. Marshals used different aircrafts equipped
with the spying technology, also referred as dirtboxes, to spy data from
individuals on the entire US soil.

"The U.S. Marshals Service program, which became fully functional around 2007,
operates Cessna aircraft from at least five metropolitan-area airports, with a
flying range covering most of the U.S. population, according to people familiar
with the program.


Planes are equipped with devices—some known as "dirtboxes" to law-enforcement
officials because of the initials of the Boeing Co. unit that produces
them—which mimic cell towers of large telecommunications firms and trick
cellphones into reporting their unique registration information."

The technique allows law enforcement to spy on tens of thousands of cellphones
in a single flight, collecting their identifying information, metadata and many
other information.

The catalogue disclosed by the Intercept provided more information on the
equipment that could be mounted on Aircraft and drones to spy on mobile.

Below the list of the surveillance equipment:



Name Vendor Price Description



Icarus - NVDF AST (Raytheon) $1,5 Mil Geolocation System



Twister Firescout APG Northrop Grumman  N/A Base Station Router



Traveler (EW-FOS) BAE Systems $750K Active/passive GSM geo-location System



Guava G-POD/STE LOS Northrop Grumman IS ICW General Atomics N/A GSM airborne
(UAV) geo-location system



Garwind – Blos POD N/A N/A GSM airborne (UAV) geo-location system



Gilgamesh Sierra Nevada Corporation ICW NSA OTRS/DAED and General Atomics N/A
Geo-location system



Airhandler Sierra Nevada Corporation ICW NSA OTRS/DAED and General Atomics N/A
Geo-location system




CONCLUSION



The information disclosed by the Intercept and contained in the catalogue
provided by an anonymous source in the US intelligence are very precious to
understand the methods of investigation of the US intelligence and law
enforcement. The Stingray technology raises serious privacy concerns because it
is used in dragnet surveillance activities.

Anyway, the massive surveillance is prohibited in the US by the Fourth
Amendment, and organizations for the defense of Civil Liberties request
government to provide warrants to use surveillance technologies like the
StingRay.

Organizations such as the American Civil Liberties Union and Electronic Privacy
Information Center (EPIC) highlighted in many cases the risks related to the use
of such method of investigation.

Despite the heated debate on the surveillance technology, such kind of devices
still represents a privileged solution for the secret surveillance operations
conducted by governments worldwide.




REFERENCES



https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/

http://securityaffairs.co/wordpress/42861/intelligence/cellphone-spying-devices-catalog.html

https://theintercept.com/surveillance-catalogue/

http://securityaffairs.co/wordpress/30175/intelligence/cell-phone-data-spied-airplane.html

/stingray-technology-government-tracks-cellular-devices/

http://securityaffairs.co/wordpress/28397/hacking/surveillance-solutions.html

http://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533?tesla=y&mg=reno64-wsj

https://www.aclu.org/blog/national-security-technology-and-liberty/trickle-down-surveillance

https://www.aclu.org/maps/stingray-tracking-devices-whos-got-them

http://www.phonearena.com/news/Cellphone-spying-gear-law-enforcement-has-it-and-it-wants-you-to-forget-about-it_id58920

https://www.scribd.com/doc/238334715/Stingray-Phone-Tracker

http://www.washingtontimes.com/news/2014/jul/18/lye-short-circuiting-stingray-surveillance/?page=all#pagebreak

http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/

https://www.aclu.org/files/assets/rigmaiden_-_doj_stingray_emails_declaration.pdf

http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/2/

http://cdn.arstechnica.net/wp-content/uploads/2013/09/amberjack.pdf

http://records.oaklandnet.com/feedback/request/2595



http://cdn.arstechnica.net/wp-content/uploads/2013/09/oakland-penlink-hailstorm.pdf

Posted: January 8, 2016
Pierluigi Paganini
View Profile

Pierluigi is member of the ENISA (European Union Agency for Network and
Information Security) Threat Landscape Stakeholder Group, member of Cyber G7
Workgroup of the Italian Ministry of Foreign Affairs and International
Cooperation, Professor and Director of the Master in Cyber Security at the Link
Campus University. He is also a Security Evangelist, Security Analyst and
Freelance Writer.

Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security
expert with over 20 years experience in the field, he is Certified Ethical
Hacker at EC Council in London. The passion for writing and a strong belief that
security is founded on sharing and awareness led Pierluigi to find the security
blog "Security Affairs" recently named a Top National Security Resource for US.

Pierluigi is a member of the "The Hacker News" team and he is a writer for some
major publications in the field such as Cyber War Zone, ICTTF, Infosec Island,
Infosec Institute, The Hacker News Magazine and for many other Security
magazines.





In this Series

 * Cellphone Surveillance: The Secret Arsenal
 * Diving deep into data analytics and its importance in cybersecurity
 * Free Valentine's Day cybersecurity cards: Keep your love secure!
 * How to design effective cybersecurity policies
 * What is attack surface management and how it makes the enterprise more secure
 * Is a cybersecurity boot camp worth it?
 * The aftermath: An analysis of recent security breaches
 * Understanding cybersecurity breaches: Types, common causes and potential
   risks
 * Breaking the Silo: Integrating Email Security with XDR
 * What is Security Service Edge (SSE)?
 * Cybersecurity in Biden’s era
 * Password security: Using Active Directory password policy
 * Inside a DDoS attack against a bank: What happened and how it was stopped
 * Inside Capital One’s game-changing breach: What happened and key lessons
 * A DevSecOps process for ransomware prevention
 * What is Digital Risk Protection (DRP)?
 * How to choose and harden your VPN: Best practices from NSA & CISA
 * Will immersive technology evolve or solve cybercrime?
 * Twitch and YouTube abuse: How to stop online harassment
 * Can your personality indicate how you’ll react to a cyberthreat?
 * The 5 biggest cryptocurrency heists of all time
 * Pay GDPR? No thanks, we’d rather pay cybercriminals
 * Customer data protection: A comprehensive cybersecurity guide for companies
 * Online certification opportunities: 4 vendors who offer online certification
   exams [updated 2021]
 * FLoC delayed: what does this mean for security and privacy?
 * Stolen company credentials used within hours, study says
 * Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
 * 10 ways to build a cybersecurity team that sticks
 * Verizon DBIR 2021 summary: 7 things you should know
 * 2021 cybersecurity executive order: Everything you need to know
 * Kali Linux: Top 5 tools for stress testing
 * Android security: 7 tips and tricks to secure you and your workforce [updated
   2021]
 * Mobile emulator farms: What are they and how they work
 * 3 tracking technologies and their impact on privacy
 * In-game currency & money laundering schemes: Fortnite, World of Warcraft &
   more
 * Quantitative risk analysis [updated 2021]
 * Understanding DNS sinkholes - A weapon against malware [updated 2021]
 * Python for network penetration testing: An overview
 * Python for exploit development: Common vulnerabilities and exploits
 * Python for exploit development: All about buffer overflows
 * Python language basics: understanding exception handling
 * Python for pentesting: Programming, exploits and attacks
 * Increasing security by hardening the CI/CD build infrastructure
 * Pros and cons of public vs internal container image repositories
 * CI/CD container security considerations
 * Vulnerability scanning inside and outside the container
 * How Docker primitives secure container environments
 * Top 4 Zapier security risks
 * Common container misconfigurations and how to prevent them
 * Building container images using Dockerfile best practices
 * Securing containers using Docker isolation

Related Bootcamps
 * CompTIA CASP+ Training Boot Camp
 * ISC2 CISSP® Training Boot Camp
 * ISC2 CCSP® Training Boot Camp
 * ISACA CISA Training Boot Camp
 * ISACA CISM Training Boot Camp
 * ISC2 CSSLP® Training Boot Camp
 * CompTIA Cybersecurity Analyst (CySA+) Certification Course
 * CompTIA Network+ Training Boot Camp
 * CompTIA Security+ Training Boot Camp
 * Certified Ethical Hacking Course: CEH Certification Boot Camp

 

GET CERTIFIED AND ADVANCE YOUR CAREER

 * Exam Pass Guarantee
 * Live instruction
 * CompTIA, ISACA, ISC2, Cisco, Microsoft and more!

View Certifications

General security

Diving deep into data analytics and its importance in cybersecurity



September 10, 2024

Stephan Miller

General security

Free Valentine's Day cybersecurity cards: Keep your love secure!



February 10, 2024

Jeff Peters

General security

How to design effective cybersecurity policies



February 07, 2024

John Bandler

General security

What is attack surface management and how it makes the enterprise more secure



November 21, 2023

Drew Robb
 * 
 * 
 * 
 * 
 * 
 * 

Products

 * Infosec IQ
   
   Security awareness, culture & phishing simulator

 * Infosec Skills
   
   Hands-on skill development & boot camps

Resources

 * Cyber Work
 * Blog
 * Events & webcasts

Company

 * Contact us
 * About Infosec
 * Careers
 * Newsroom
 * Partners

Newsletter

Get the latest news, updates and offers straight to your inbox.

Thanks! You're signed up.



Newsletter

Get the latest news, updates and offers straight to your inbox.

Enter your email Subscribe

For information about how Cengage uses personal information, see our privacy
policy.

Thanks! You're signed up.

Infosec, part of Cengage Group — ©2024 Infosec Institute, Inc.

 * Privacy
 * Terms of Use

We use cookies to personalize content, customize ads and analyze traffic on our
site.

Manage Options Accept



PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES


 * ONLINE BEHAVIOR ADVERTISING

YOUR PRIVACY

When you visit websites, they may store or retrieve information on your browser
in the form of cookies. This information might be about your preferences or your
device and is mostly used to make the site work as you expect it to. The
information does not usually directly identify you, but it can give you a more
personalized web experience. Because we respect your privacy, you can choose not
to allow some types of cookies. However, blocking some types of cookies may
impact your experience of the site and the services we are able to offer.
Infosec, a Cengage Group company.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off. They are usually only set in response to actions made by you such as
setting your privacy preferences, logging in or filling in forms. You can set
your browser to block or alert you about these cookies, but some parts of the
site will not work as a result. These cookies do not store any personally
identifiable information.

FUNCTIONAL COOKIES

Functional Cookies Inactive


These cookies enable the website to provide enhanced functionality and
personalization. They may be set by us or by third-party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

PERFORMANCE COOKIES

Performance Cookies Inactive


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. All information these cookies collect is
aggregated and therefore anonymous. If you do not allow these cookies we will
not know when you have visited our site, and will not be able to monitor its
performance.

ONLINE BEHAVIOR ADVERTISING

Online Behavior Advertising Inactive


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant ads on other sites. They do not store directly personal information,
but are based on uniquely identifying your browser and internet device. If you
do not allow these cookies, you will experience less targeted advertising.

Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All