- Pixel Buds 2 or Apple AirPods 2: Which are right for you? 5 Years Ago
- It’s 2019: Make your holiday cards online, for free this year 5 Years Ago
- Fighting over the ‘Marriage Story’ fight scene becomes a meme 5 Years Ago
- ‘Trump is innocent!’: InfoWars correspondent interrupts impeachment hearing Today 12:12 PM
- Video shows runner smacking reporter’s butt on live TV Today 11:46 AM
- 27 senators call on Trump to fire Stephen Miller Today 11:13 AM
- Conservatives are fighting over whether porn is OK Today 10:39 AM
- The best in tech gifts for women this year Today 10:39 AM
- Why do the Golden Globes keep sidelining women filmmakers? Today 10:37 AM
- Netflix dominates with 34 Golden Globe nominations across TV and film Today 10:27 AM
- Ethan Klein has declared war on K-pop—and K-pop fans Today 10:22 AM
- People are not happy with Steve Harvey’s cartel comment to Miss Colombia Today 10:21 AM
- The decade conspiracy theories overtook the truth Today 9:14 AM
- Marianne Williamson duped into believing Trump pardoned Charles Manson Today 8:55 AM
- TikTok users are freaking out about ‘predicting’ Juice WRLD’s death Today 7:59 AM
FCC assembles task force to study widely available surveillance technology
Better late than never?
The FCC has assembled a task force to look into a publicly available surveillance technology used by police forces around the world that can intercept your cell signal, phone calls, and locate you, according to The Washington Post. The task force comes in response to questions brought by U.S. Rep. Alan M. Grayson (D-Fla) after a report in Newsweek brought light to the technology, called an IMSI catcher, commonly sold as StingRay.
An IMSI catcher, an acronym which stands for International Mobile Subscriber Identity, can mimic a cell tower and intercept signals that will allow the user to spy on its target. Once a IMSI catcher is locked on to a device, it can siphon information from it like text messages and GPS coordinates. Many IMSI catchers can also break common forms of encryption.
Speaking to Newsweek, former Navy SEAL and cofounder of encryption software company Silent Circle, Mike Janke says, “Defense firms in the Washington, D.C. area have found IMSI catchers attached to the light poles in their parking lots. In February, one or two were found in the parking lot of a defense contractor near Washington. They’ve also been found in Palo Alto. The FBI has been called in, but you can’t track who has made it.”
Former FBI Director Tim Murphy said that counterintelligence agencies around the world are using the IMSI catchers. “This type of technology has been used in the past by foreign intelligence agencies here and abroad to target Americans, both [in the] U.S. government and corporations. There’s no doubt in my mind that they’re using it.”
IMSI catchers can be purchased for as cheap as $1,800 online, or even made at home by the technically inclined. Combined with the fact that cell phone encryption technology is exceptionally weak, to the point where experts who spoke to The Washington Post last year believe any capable intelligence agency around the world could listen in to American phone calls, if it desired.
In his letter to FCC Chairman Tom Wheeler, Grayson noted that “Americans have a reasonable expectation for privacy in their communications” and that “It is extremely troubling to learn that cellular communications are so poorly secured, and that it is so easy to intercept calls and track people’s phones.”
In response, Wheeler wrote the goal of the task force—which is studying misuse, not availability of IMSI catchers—is to”develop concrete solutions to protect the cellular network systemically from similar unlawful intrusions and interceptions.”
It seems The FCC is not interested in looking into why and how IMSI catchers became so widely available and easy to build, and if they should even be legal. Looking into the misuse of the surveillance technology makes it seem like the FCC—which has authority over surveillance technology— is skirting the issue, as it looks to avoid making a strong statement on what should and could be used to gather information by law enforcement agencies.
Stephanie K. Pell, a cybersecurity expert and a cyber-ethics fellow at the Army Cyber Institute at the U.S. Military Academy told The Washington Post she personally doesn’t believe the legality of the devices matter much in the long run. Ultimately if we are going to get to the root of the problem, we will have to deal with this from a network vulnerability perspective.”
H/T The Washington Post | photo via joram68/Flickr (CC BY 2.0)
Micah Singleton is a former technology and culture reporter of the Daily Dot and a former staff writer at Gizmodo. His work has also appeared in Time, Yahoo, the Verge, Mashable, ReadWrite, and NBC. Singleton was named a "rising star" by the Huffington Post in 2013.