stingray

Latest

  • Harvard researchers built a living robot out of rat hearts

    by 
    Andrew Tarantola
    Andrew Tarantola
    07.07.2016

    What do you get when you mix the heart cells of a rat with silicone from breast implants and then sprinkle in a bit of gold and genetic engineering? No, not Trump's next trophy wife -- you actually get this incredible "living" robot. Developed by a team of researchers at Harvard University, the bio-engineered marvel looks, flexes and swims just like a tiny stingray.

  • Six gadgets for a green camping trip

    by 
    Inhabitat
    Inhabitat
    06.18.2016

    By Cat DiStasio This week marks the start of summer, and campers across the nation are getting ready to explore the great outdoors. Fortunately, it's easier than ever to go off-grid while keeping a light footprint. That means finding tents that don't mar the land and cooking methods that don't generate needless waste. It's also easier than ever to keep electronic gadgets charged throughout your trip. And, of course, nobody wants to fumble with flashlight batteries in the dark, so rechargeable and solar-powered lanterns are a big win at any camp site. Whatever goals you set for your next trip, there's a gadget out there to help you achieve it.

  • Shutterstock

    Stringray phone tracker use in the UK admitted for the first time

    by 
    Jamie Rigg
    Jamie Rigg
    05.27.2016

    Stingray devices that can intercept mobile calls, track users and block signals are definitely being used in the UK, it's come to light. The first official confirmation that these "IMSI catchers" are out in the wild comes from the Scottish Prison Service (SPS), by way of a freedom of information request from The Ferret. Stringrays have been installed in two Scottish prisons (only one is still active, apparently) to jam the outgoing calls of inmates -- mobile phones being contraband behind bars and all.

  • Kena Betancur/Getty Images

    NYPD used Stingrays over 1,000 times since 2008

    by 
    Billy Steele
    Billy Steele
    02.11.2016

    Until now, New York City's police department hadn't disclosed any information about whether or not it used so-called Stingrays to monitor cell phone activity. In response to an NYCLU (NYCLU) request, the NYPD admitted that it used the devices over 1,000 times between 2008 and May 2015. What's more, NYPD doesn't have a written policy in place that guides how the tech should be used. As a refresher, Stingrays create a fake 2G cellular network that can be used to track the locations and monitor call or text activity in a certain area. Even when a specific mobile device is targeted, information from other phones in the area is still accessible.

  • California secretly listened to cellphone calls from the air

    by 
    Steve Dent
    Steve Dent
    01.28.2016

    If you had cellphone problems in Orange County within the last few years, you may have been the unwitting victim of a secret cellphone surveillance program, according to the ACLU. Since 2009, the Anaheim Police Department has used the Dirtbox, a military-grade, Stingray-type device that can be mounted on light aircraft. While airborne, it mimics a cellphone tower in order to indiscriminately intercept and record thousands of cell phone calls.

  • Here are the devices law enforcement use to spy on you

    by 
    Roberto Baldwin
    Roberto Baldwin
    12.17.2015

    The Intercept obtained the catalog of devices used by federal and local law enforcement to collect and monitor cell phone data. The tracking hardware -- including the infamous Stingray -- in the catalog is accompanied by its capabilities including, limitations, "planning factors," price and manufacturer. From handheld pieces of electronics that can track a few phones to boxes that can target as many as 10,000 unique cellphones the list is chilling reminder that even if you're not under investigation, you're being tracked if you're in the wrong place at the wrong time.

  • FBI: Yes, we exploit unpatched security holes

    by 
    Jon Fingas
    Jon Fingas
    12.08.2015

    It's no secret that the FBI uses tech tools like Stingray phone trackers to investigate suspects, but it's now clear that the bureau is willing to go even further than that. Operational Technology Division lead Amy Hess (above) tells the Washington Post that the FBI uses zero-day (that is, unknown by vendors) security software exploits for investigations -- the first time any official has admitted this on the record. The outfit doesn't prefer to use these hacks given how short-lived they are, Hess says, but they're still on the table.

  • Getty Images

    IRS promises to get a search warrant before spying on cellphones

    by 
    Jessica Conditt
    Jessica Conditt
    12.01.2015

    The IRS will no longer use "Stingray" cellphone-tracking devices unless the agency receives a search warrant supported by probable cause, in accordance with the Department of Justice's Policy Guidance, IRS Commissioner John Koskinen says in a letter. The agency's use of Stingray surveillance devices went public in October, though at the time it was unclear how (and how often) the IRS used the technology. Stingray devices mimic cell towers to trick nearby phones into connecting to them, allowing the user to track locations, record calls and access text communications.

  • Stingray phone surveillance tools can also record your calls

    by 
    Devindra Hardawar
    Devindra Hardawar
    10.30.2015

    It looks like the Stingray tools law enforcement agencies have been using to track cellphones are even worse than we thought. They also have the ability to record your calls and access your text communications, according to Justice Department documents obtained by the ACLU. As Wired points out, that's something privacy advocates have long suspected, but these documents are the first to prove that. To refresh, Stingray devices are used by law enforcement to mimic cell towers and trick nearby phones into connecting to them, which gives up their locations. The documents note that you can also use the devices to wirelessly flash a phone's firmware and use a cellphone as a bug. Given that these documents are from 2008 though, it was most likely referring to flashing older cellphones, and not complex smartphones. Now the documents don't mean Stingray devices were actually used to record calls, they just give us a clearer sense of their abilities.

  • The IRS has used Stingray phone-tracking tech

    by 
    Nathan Ingraham
    Nathan Ingraham
    10.26.2015

    This year, the Department of Homeland Security and the Department of Justice have thankfully put into place more stringent regulations on how government agencies can use "Stingray" cellphone-tracking devices. However, we're also learning more about how widespread usage of such tools was within the government: Today, The Guardian reports that the Internal Revenue Service made purchases in 2009 and 2012 of Stingray equipment from manufacturer Harris Corporation. The documents it received as part of a Freedom of Information Act request were heavily redacted but still revealed that in 2012, the IRS paid more than $65,000 to upgrade previous Stingray equipment to a newer version called the HailStorm.

  • New DHS policy demands warrants before deploying Stingrays

    by 
    Andrew Tarantola
    Andrew Tarantola
    10.21.2015

    The Department of Homeland Security announced a substantial policy change Wednesday regarding how it employs cellphone-tracking tools like the Stingray system. These cell-site simulators have been in use for more than a decade. They allow law enforcement to find cell phones either by directly searching for a known device or find an unknown device by sniffing for signaling information from the simulator's immediate vicinity and triangulating that data. The new policy explicitly demands that DHS personnel acquire a warrant before deploying the devices unless an exception, such as the imminent loss of human life, destruction of evidence, or to prevent the escape of a fugitive felon. Wednesday's announcement follows a similar decision by the Department of Justice last month. [Image Credit: Getty]

  • DOJ's new Stingray rules: feds need a warrant to track phones

    by 
    Richard Lawler
    Richard Lawler
    09.03.2015

    Over the last few years, we've learned that US law enforcement agencies not only regularly use "Stingray" devices to locate suspects by their cellphones, but go to great lengths to hide this activity. After extensive reporting on the subject, the Department of Justice has established an "Enhanced Policy for Cell-Site Simulators" (PDF) detailing when they can be used by federal agencies, and how. A big part of that is the requirement that agents obtain a warrant first, except in certain cases that can include ongoing hacking attempts and people in danger of death or bodily harm. Also, they can't be used to collect communications like emails or texts at all.

  • Autodesk targets small studios with its Stingray game engine

    by 
    Steve Dent
    Steve Dent
    08.03.2015

    Autodesk finally has a game engine to go along with its design tools. The company just launched Stingray, which it built around the Bitsquid engine it bought last year. Autodesk kept the basic guts of that program -- which has already been used on titles like Gauntlet from Warner Bros -- and revamped it with a new interface. The company told Engadget that the goal was to build an engine for smaller studios that can be customized without the need for a lot of programming. At the same time, it wanted Stingray to have all the bells and whistles of competing products like Unreal Engine 4 -- physical shading, post-processing effects, a high-performance reflection system and more.

  • StingRay phone trackers are being used in the UK

    by 
    Mariella Moon
    Mariella Moon
    06.11.2015

    Sky News has found evidence that StingRays -- those fake cell towers American cops are so fond of -- are in active use in the UK. The news organization ran software made by a German security company to scour for StingRays currently being used London and found 20 instances within just three weeks. Eric King of Privacy International told Sky News that this is the first time "it's been shown that they're being deployed in the UK," though the watchdog organization already knew that authorities have been relying on them for years. In fact, The Guardian reported back in 2011 that the London Metropolitan Police purchased "information and communications hardware" for surveillance as far back as 2008 and 2009. The Times confirmed their existence within the country, as well, just last year.

  • FBI says police can disclose Stingray use, but not what they can do

    by 
    Chris Velazco
    Chris Velazco
    05.15.2015

    Look, none of us should be surprised that police departments across the country use things like Stingrays -- sophisticated surveillance devices that suck up cell phone communications -- in their investigations. Still, more than a few of those PDs have insisted in court on trying to keep that specialized gear out of the limelight. Consider cases like this one in Baltimore last year, where a police officer was nearly held in contempt for withholding information about cell phone tracking practices; they often hinge on the fact that law enforcement officials entered into non-disclosure agreements with the FBI to keep usage under wraps. Turns out, that's not exactly the full story. According to a statement released by the FBI earlier this morning (and obtained in full by Ars Technica), there really aren't any legal stipulations meant to keep law enforcement from admitting stingrays have been used.

  • Washington state police now need warrants to spy on cellphones

    by 
    Jon Fingas
    Jon Fingas
    05.12.2015

    The US government might have only started taking a serious look at the civil liberty implications for stingrays and other cellphone surveillance devices, but Washington state isn't willing to wait. Governor Jay Inslee has just signed a bill into law requiring that police obtain warrants before using stingrays to simulate cell sites and intercept communications. They have to explicitly state their intention to use these gadgets (the FBI sometimes encourages departments to keep stingray use a secret), and they must toss out any information from people who aren't targets in a given investigation.

  • The US opens up on its use of phone surveillance hardware

    by 
    Daniel Cooper
    Daniel Cooper
    05.04.2015

    It seems as if we're not alone in thinking that America's spies may have trodden on a few too many civil liberties of late. That's why senior officials at the Justice Department are calling for a wide-ranging review of electronic surveillance practices and will open up a little bit about why, and when, this technology is used. A report by the Wall Street Journal reveals that there's a big push for greater transparency, but no-one's quite sure on how many beans they should spill in order to restore public trust but not give helpful hints to criminals.

  • FBI dumps 5,000 redacted pages on its cellphone-tracking device

    by 
    Billy Steele
    Billy Steele
    05.01.2015

    It's no secret that local law enforcement offices around the US are using a tool called Stingray to track cellphone locations without the approval of a judge. In response to a Freedom of Information Act request from MuckRock's Alex Richardson, the FBI released thousands of pages of heavily-redacted documents, emails and more concerning the project, including one titled "Cellphone Tracking for Dummies." The super secret Stingray device is provided to local authorities by the FBI, creating fake cell towers that force nearby handsets to connect to it -- even those belonging to folks other than a suspect. And as you might expect, in addition to tracking, it also reveals the identity of the phone's owner. Included in the collection is loads of correspondence between the Bureau, Boeing, the Harris Corporation and local law enforcement. Those two middle companies, by the way, are manufacturers of the tech.

  • Cops are routinely using this secret cell phone tracking tool

    by 
    Mariella Moon
    Mariella Moon
    04.08.2015

    Big federal agencies with ominous-sounding three-letter acronyms aren't the only ones that spy on your activities -- your local police might be doing it, too. Take for instance, the police department of Erie County, New York, which was recently caught using stingray devices in at least 47 instances between May 1, 2010 and October 3, 2014. According to the details published by the New York Civil Liberties Union (NYCLU), the department asked the court for permission to use stingray only once between that time frame. The cops didn't even ask for a warrant; they only asked for a court order and described stingrays as "pen registers," which is only partially accurate.

  • Government wants to know if phone surveilance tech is being abused

    by 
    Chris Velazco
    Chris Velazco
    08.12.2014

    This boxy, unassuming thing you see above is what's called an IMSI catcher. In essence, they pose as miniature cell towers that mobile devices connect to and route things through. All of that information - phone numbers, call recipient, caller location - are fair game to whomever controls that box. Concerning, no? Using one of these things is usually the purview of law enforcement agencies, but the FCC is getting a little concerned that they're being used by some unsavory types - specifically, gangs and foreign governments. To that end (and after some prompting from Florida congressman Alan Grayson), the Commission has put together a task force to get a better sense of just who's using these things and stop "llicit and unauthorized use" of such hardware. If we're being honest, Congressman Grayson is just a little late to the game: the EFF has been railing against these things for years, calling the widespread searches they're capable of conducting "unconstitutional, all you can eat data buffets". Ah well, better late than never - we'll just have to see what the FCC unearths in the weeks and months to come.