- Twitter just launched its ‘Hide Replies’ feature 5 Years Ago
- How to turn off image metadata before it snitches on you 5 Years Ago
- The ‘Breaking Bad’ movie is coming to theaters—for one weekend only Today 1:04 PM
- Teens recorded, shared videos of mall fight that ended in fatal stabbing Today 12:44 PM
- How to stream Giants vs. Buccaneers in Week 3 Today 12:31 PM
- Report: Ben Carson made transphobic comments at HUD meeting Today 12:30 PM
- Where to buy the Switch Lite and everything else you need to know Today 12:28 PM
- Facebook is experimenting with apps targeting teens Today 12:21 PM
- #LiveFromTheArea51Raid: Memes and highlights from the desert Today 12:06 PM
- Ready for Dark Mode? Here’s how to get it, and everything else in iOS 13 Today 11:41 AM
- Students across the world are walking out to protest inaction on climate change Today 11:08 AM
- YouTubers are exploiting Area 51 mania for content Today 10:29 AM
- Veterans confront Dan Crenshaw over his support for Trump Today 10:29 AM
- Google Maps may soon come with an Incognito Mode Today 10:13 AM
- Right-wing Beto O’Rourke ‘pissy pants’ meme actually features indie rock star Today 10:11 AM
FCC assembles task force to study widely available surveillance technology
Better late than never?
The FCC has assembled a task force to look into a publicly available surveillance technology used by police forces around the world that can intercept your cell signal, phone calls, and locate you, according to The Washington Post. The task force comes in response to questions brought by U.S. Rep. Alan M. Grayson (D-Fla) after a report in Newsweek brought light to the technology, called an IMSI catcher, commonly sold as StingRay.
An IMSI catcher, an acronym which stands for International Mobile Subscriber Identity, can mimic a cell tower and intercept signals that will allow the user to spy on its target. Once a IMSI catcher is locked on to a device, it can siphon information from it like text messages and GPS coordinates. Many IMSI catchers can also break common forms of encryption.
Speaking to Newsweek, former Navy SEAL and cofounder of encryption software company Silent Circle, Mike Janke says, “Defense firms in the Washington, D.C. area have found IMSI catchers attached to the light poles in their parking lots. In February, one or two were found in the parking lot of a defense contractor near Washington. They’ve also been found in Palo Alto. The FBI has been called in, but you can’t track who has made it.”
Former FBI Director Tim Murphy said that counterintelligence agencies around the world are using the IMSI catchers. “This type of technology has been used in the past by foreign intelligence agencies here and abroad to target Americans, both [in the] U.S. government and corporations. There’s no doubt in my mind that they’re using it.”
IMSI catchers can be purchased for as cheap as $1,800 online, or even made at home by the technically inclined. Combined with the fact that cell phone encryption technology is exceptionally weak, to the point where experts who spoke to The Washington Post last year believe any capable intelligence agency around the world could listen in to American phone calls, if it desired.
In his letter to FCC Chairman Tom Wheeler, Grayson noted that “Americans have a reasonable expectation for privacy in their communications” and that “It is extremely troubling to learn that cellular communications are so poorly secured, and that it is so easy to intercept calls and track people’s phones.”
In response, Wheeler wrote the goal of the task force—which is studying misuse, not availability of IMSI catchers—is to”develop concrete solutions to protect the cellular network systemically from similar unlawful intrusions and interceptions.”
It seems The FCC is not interested in looking into why and how IMSI catchers became so widely available and easy to build, and if they should even be legal. Looking into the misuse of the surveillance technology makes it seem like the FCC—which has authority over surveillance technology— is skirting the issue, as it looks to avoid making a strong statement on what should and could be used to gather information by law enforcement agencies.
Stephanie K. Pell, a cybersecurity expert and a cyber-ethics fellow at the Army Cyber Institute at the U.S. Military Academy told The Washington Post she personally doesn’t believe the legality of the devices matter much in the long run. Ultimately if we are going to get to the root of the problem, we will have to deal with this from a network vulnerability perspective.”
H/T The Washington Post | photo via joram68/Flickr (CC BY 2.0)
Micah Singleton is a former technology and culture reporter of the Daily Dot and a former staff writer at Gizmodo. His work has also appeared in Time, Yahoo, the Verge, Mashable, ReadWrite, and NBC. Singleton was named a "rising star" by the Huffington Post in 2013.