- Twitter lifts ‘permanent’ suspension of activist Barrett Brown Monday 5:52 PM
- Billie Eilish fans fend off objectifying comments on tank top photo Monday 5:32 PM
- Groom’s mother sabotages wedding by tricking guests into wearing jorts and hoodies Monday 4:39 PM
- No one believes Bill de Blasio’s son sent him these debate prep texts Monday 3:26 PM
- Meek Mill, Jay-Z to release ‘Free Meek’ documentary on Amazon Prime Monday 3:20 PM
- 3 ways to secure your Nest cameras Monday 3:15 PM
- This Pokémon generator site is creating hilarious monsters Monday 2:48 PM
- MrBeast impersonator tricks kid into destroying his XBox Monday 12:50 PM
- This mom has the perfect nickname for her nonbinary kid Monday 12:25 PM
- Netflix tests pop-out player that will allow viewers to multitask Monday 11:44 AM
- Man allowed to sue media publishers over readers’ Facebook comments Monday 11:42 AM
- Republicans slammed for joke about ‘heavily armed militia’ at Oregon statehouse Monday 11:30 AM
- New bill wants tech companies to tell you how much your data is worth Monday 10:53 AM
- AOC has the best response to Steve King’s ‘concentration camp’ criticism Monday 10:19 AM
- Did Jake Paul and Tana Mongeau just get engaged? Monday 9:26 AM
FCC assembles task force to study widely available surveillance technology
Better late than never?
The FCC has assembled a task force to look into a publicly available surveillance technology used by police forces around the world that can intercept your cell signal, phone calls, and locate you, according to The Washington Post. The task force comes in response to questions brought by U.S. Rep. Alan M. Grayson (D-Fla) after a report in Newsweek brought light to the technology, called an IMSI catcher, commonly sold as StingRay.
An IMSI catcher, an acronym which stands for International Mobile Subscriber Identity, can mimic a cell tower and intercept signals that will allow the user to spy on its target. Once a IMSI catcher is locked on to a device, it can siphon information from it like text messages and GPS coordinates. Many IMSI catchers can also break common forms of encryption.
Speaking to Newsweek, former Navy SEAL and cofounder of encryption software company Silent Circle, Mike Janke says, “Defense firms in the Washington, D.C. area have found IMSI catchers attached to the light poles in their parking lots. In February, one or two were found in the parking lot of a defense contractor near Washington. They’ve also been found in Palo Alto. The FBI has been called in, but you can’t track who has made it.”
Former FBI Director Tim Murphy said that counterintelligence agencies around the world are using the IMSI catchers. “This type of technology has been used in the past by foreign intelligence agencies here and abroad to target Americans, both [in the] U.S. government and corporations. There’s no doubt in my mind that they’re using it.”
IMSI catchers can be purchased for as cheap as $1,800 online, or even made at home by the technically inclined. Combined with the fact that cell phone encryption technology is exceptionally weak, to the point where experts who spoke to The Washington Post last year believe any capable intelligence agency around the world could listen in to American phone calls, if it desired.
In his letter to FCC Chairman Tom Wheeler, Grayson noted that “Americans have a reasonable expectation for privacy in their communications” and that “It is extremely troubling to learn that cellular communications are so poorly secured, and that it is so easy to intercept calls and track people’s phones.”
In response, Wheeler wrote the goal of the task force—which is studying misuse, not availability of IMSI catchers—is to”develop concrete solutions to protect the cellular network systemically from similar unlawful intrusions and interceptions.”
It seems The FCC is not interested in looking into why and how IMSI catchers became so widely available and easy to build, and if they should even be legal. Looking into the misuse of the surveillance technology makes it seem like the FCC—which has authority over surveillance technology— is skirting the issue, as it looks to avoid making a strong statement on what should and could be used to gather information by law enforcement agencies.
Stephanie K. Pell, a cybersecurity expert and a cyber-ethics fellow at the Army Cyber Institute at the U.S. Military Academy told The Washington Post she personally doesn’t believe the legality of the devices matter much in the long run. Ultimately if we are going to get to the root of the problem, we will have to deal with this from a network vulnerability perspective.”
H/T The Washington Post | photo via joram68/Flickr (CC BY 2.0)
Micah Singleton is a former technology and culture reporter of the Daily Dot and a former staff writer at Gizmodo. His work has also appeared in Time, Yahoo, the Verge, Mashable, ReadWrite, and NBC. Singleton was named a "rising star" by the Huffington Post in 2013.