ICE is using fake cell towers to spy on people's phones

420 coloneltcb 176 9/9/2025, 4:27:41 PM forbes.com ↗

Comments (176)

aduffy · 5h ago
Just wanted to advertise that the EFF recently released an open source tool for detecting cell-site simulators. The hardware is like $20 and it's pretty easy to setup yourself. Worth having around to stay aware of what's out there, especially if you live in one of the places recently targeted by the administration.

https://github.com/EFForg/rayhunter/

EvanAnderson · 4h ago
Discussion about Rayhunter from 6 mos. ago: https://news.ycombinator.com/item?id=43283917
riedel · 1h ago
IMSI catchers have been popular by police all over the world. Here are some other tools [0] [1].

Edit: Interesting also the collection of network security via gsmmap [2]

[0] https://gitweb.stoutner.com/?p=PrivacyCell.git;a=summary

[1] https://github.com/srlabs/snoopsnitch [2] https://gsmmap.org/

dang · 1h ago
Related:

Rayhunter – Rust tool to detect cell site simulators on an orbic mobile hotspot - https://news.ycombinator.com/item?id=43283917 - March 2025 (23 comments)

junebash · 2h ago
Would be a shame if someone used this to track down the ICE towers and vandalize them.
dylan604 · 1h ago
For $20, it's cheap enough to add to a drone for a targeting purpose
Imustaskforhelp · 1h ago
This "shame" is/would be a badge of honor, my friend.
dredmorbius · 3m ago
[delayed]
dylan604 · 1h ago
This shame feels like something that would get one extraordinarily renditioned to some black site where nobody would ever know about the shame
sho_hn · 34m ago
PSA: If you have to worry about your government taking people away to some black site, things have gotten pretty bad.
th0ma5 · 48m ago
True, but at least we know who was right.
perihelions · 5h ago
I wouldn't put it past the US to coerce Microsoft into injecting malicious payloads into these types of projects. EFF is putting complete trust in Microsoft's infrastructure: there's no out-of-band verification not served up by Microsoft itself (is there? It's just GitHub.com's TLS, and in-band SHA-1 hashes stored in the repo itself, which Microsoft controls; it can serve whatever bytes it wants, or different bytes on different requests...)

Microsoft has billions of dollars in US intelligence-cloud contracts and should leap at a chance to get an edge in on those. They've done things like this before; they provided incredible (and illegal!) cooperation with the NSA back at the time of the Snowden Leaks[0].

[0] https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-... ("Microsoft handed the NSA access to encrypted messages" (2013))

throw0101d · 5h ago
> I wouldn't put it past the US to coerce Microsoft into injecting malicious payloads into these types of projects. EFF is putting complete trust in Microsoft's infrastructure: there's no out-of-band verification not served up by Microsoft itself

Isn't a git commit trail basically a Merkle tree of checksums? If any developer tried to do a pull or fetch they'd suddenly get a bunch of strange commit messages, wouldn't they?

Also: code signing is / can become a thing.

untitaker_ · 2h ago
I think GP is talking about a scenario where Microsoft would serve either malicious source tree or binaries to just one user, not all of them. that would be fairly hard to detect. but in such scenarios we'd also have to start asking questions about the state of the entire CA ecosystem.
perihelions · 2h ago
I don't know why you'd trust a checksum structure your adversary has complete control over.

That Merkle tree prevents the naive case where the adversary tries to serve a version of a repo, to a client who already has an older version, differing in a part the client already has. (The part the client has local checksums for). They shouldn't do that. The git client tells the server what commits it doesn't have, so this is simple to check.

Code signing could be a safeguard if people did it, but here they don't so it's moot. I found no mention of a signing key in this repo's docs.

The checksum tree could be a useful audit if there were a transparency log somewhere that git tools automatically checked against, but there isn't so it's moot. We put full trust in Microsoft's versions.

Lots of things could be helpful, but here and now in front of us is a source tree fully in Microsoft's control, with no visible safeguards against Microsoft doing something evil to it. Just like countless others. It's the default state of trust today.

rstuart4133 · 1h ago
> I don't know why you'd trust a checksum structure your adversary has complete control over.

I think the point is they don't have complete control over it. Sure, they have complete control over the version that is on GitHub. But git is distributed, and the developers will have their own local copies. If Microsoft screwed with the checksums, and git checks them. The next developer pull or push would blow up.

perihelions · 15m ago
> "The next developer pull or push would blow up."

If they're pushing or pulling to/from GitHub, then GitHub has a total MITM and is able to dynamically translate checksum trees in between devs' inconsistent views of the repo.

marginalia_nu · 1h ago
Because the developers have just that on their local machine...?

Git is a distributed vcs after all. Every checkout is its own complete git "hub".

perihelions · 1h ago
Because GitHub can serve different bytes to different people. You log in as one of the project's devs, you get your own consistent, correct view of your project; some other people get malware instead. How do you reconcile the full picture? No one distrusts GitHub. There's no public log which git tools generically check against to see if GitHub is attempting something evil, the way they do with certificate transparency. GitHub is the public log.

Git may be designed as a distributed VCS; and it'd be a different situation if it were used that way in practice. For many projects, GitHub has a full MITM. They could even—forget about the checksums—bifurcate the views in between devs—accept commits from one dev, send over those commits with translated Merkle trees to another dev who has a corrupted history, and they'd never figure it out.

some_furry · 3h ago
> Also: code signing is / can become a thing.

To that end, I started a project last month so that code signing can be done in multiple geographical locations at once: https://github.com/soatok/freeon

RS-232 · 3h ago
Technically a Merkle DAG
therein · 3h ago
GP was probably referring to the binary releases on the GitHub repo.
aduffy · 4h ago
You’re welcome to read the code yourself once you check it out, it’s not very big. Supply chain attacks are a thing but I don’t think this is one.
untitaker_ · 1h ago
I don't think there are many options to host sourcecode and binaries in a way that is safe against an adversary like the US, and especially in such a way that technically illiterate users are protected. Because you'd have to assume that CAs are not off-limits either then.
jimt1234 · 2h ago
I watched the presentation on Rayhunter at Defcon. Amazing stuff. Major kudos to the team.
anonymousiam · 5h ago
So does the EFF detector discriminate between Stingrays that are operating legally and those that are operating illegally?

I wonder what their lawyers think of this.

https://bja.ojp.gov/program/it/privacy-civil-liberties/autho...

aduffy · 4h ago
There is nothing wrong with running a receive-only hotspot. Not sure what you’re implying here.
like_any_other · 3h ago
If you have any precedent or ruling indicating that it is illegal for Americans to check for the presence of surveillance, please present it. Otherwise, I'm not aware of any duty of private citizens to remain willfully blind to their government's actions.
nxobject · 3h ago
Should it?
trympet · 1h ago
lol spot the fed
boston_clone · 5h ago
exactly what I'm looking for - much appreciated!!!
josefresco · 6h ago
Additional context: https://san.com/cc/exclusive-evidence-of-cell-phone-surveill...

>At 8:58 a.m., just before the protest began, SAN began monitoring eight LTE bands present in the area and found no anomalous behavior. At 9:06 a.m., however, a burst of 57 IMSI-exposing commands was detected.

>Other bursts, present on four of the LTE frequency bands, appeared roughly every 10 minutes over the next hour, causing Marlin to issue numerous real-time alerts. A post-scan analysis confirmed the detection of 574 IMSI-exposing messages.

>It also flagged two “attach reject” messages, a type of cellular rejection sent when a cell phone tries to connect to a network. Attach rejects can occur for valid reasons, such as when a phone with an expired SIM card tries to connect to a network but such messages are rare on properly configured networks. IMSI catchers may use attach reject messages to block or downgrade connections and obtain an IMSI before it is encrypted. SAN observed the two suspicious messages at 9:55 a.m. and 10:04 a.m. at the height of the protest but did not encounter others before or after the demonstration ended.

>SAN conducted a follow-up scan during the same time period, the following day, when no protesters were present. Unlike the day prior, Marlin did not issue real-time alerts.

notherhack · 22m ago
SAN doesn't say where the unusual tower traffic originated. Does the Marlin system attempt to geolocate and identify the suspicious transmitters?

Could the regular mobile tower operators collect subscriber identities at will via their regular gear, with no stingray vans or warrants required, and save the information for later? That seems to be how it's done with the other subscriber location and communication contents that they collect.

noselasd · 1h ago
Those Attach Rejects should have a cause value, possibly telling a bit more on the reject reason.

I see those quite frequently, the bulk of them are phones trying to roam in a network they're not allowed to though, and some cause the cell is a bit overloaded, some cause the phone sends a wrong tracking area - not sure that's a phone bug or a common scenario where the phone retains an old tracking area, then it tries to connect to the same tracking area - then the phone discovers it's is now in a different tracking area, and after being rejected, it connects with the correct one.

perihelions · 5h ago
I.e. the inference is that ICE is unconstitutionally tracking and assembling lists of protestors exercising their First Amendment rights.

> "A post-scan analysis confirmed the detection of 574 IMSI-exposing messages."

That's roughly 574 unique protestors, give or take.

Full-on autocratic tyranny—this is also what Putin's oligarchs did to Ukranians at the Maidan Protests, in Kyiv in 2014. Used IMSI-catchers to assemble lists of everyone present, and intimidate them.

https://slate.com/technology/2014/01/ukraine-texting-euromai... ("How Did Ukraine’s Government Text Threats to Kiev’s EuroMaidan Protesters?" (2014)).

tiahura · 5h ago
How do you know there wasn’t a warrant?
lordhumphrey · 4h ago
Whether an action has gotten a legal thumbs-up or not is of little relevance here.

I'd like to leave the question of why that's true as an exercise for the reader, but your comment makes it sound as if you have trouble with this concept, so let's be explicit - a state operating autocratically can, and often will, rubberstamp whatever it decides it wants to do.

Had a quick look for the numbers from FISA to give you an example of this. https://www.motherjones.com/criminal-justice/2013/06/fisa-co... says that they denied 11 requests for surveillance warrants out of 33,900 requests over 33 years of operation.

That's a pass rate of 99.07%!

So allow me to say - a warrant wouldn't have changed anything, they give them out like nothing.

In the article though, it does say: "ICE did not respond to requests for comment from SAN. It is not clear whether ICE or any other law enforcement agency obtained a warrant to use an IMSI catcher — commonly referred to as a “Stingray” — to conduct surveillance."

Levitz · 3h ago
>Whether an action has gotten a legal thumbs-up or not is of little relevance here.

On the contrary, I don't think there's anything more relevant.

That such action can be legal speaks volumes about the state of what is legal and tolerated within the US. This, like pretty much everything about the current administration, is not explicitly about Trump, but something that has been cooking for at the very least the past two decades.

anecdatas · 1h ago
It's relevant in the sense of "is this an indicator of increasing autocracy" but not relevant in the sense of "does the presence of the warrant indicate this is ok".

I think the parent poster is saying that the present of a warrant does not make the action not autocratic. And you are disagreeing with a different idea (that the presence of a warrant doesn't matter at all), by saying it does matter, but in the opposite way -- if a warrant is present that indicates the state is losing checks and balances.

taeric · 1h ago
I mean... I get paranoia, but this is arguing that an audit trail is not useful?

That is, a high pass rate could also indicate that it is a well functioning system with few spurious requests and none that are lacking required information.

Does requiring a warrant guarantee best behavior? No. But it does provide a solid path for accountability and a path to codify better rules, when abused.

tiahura · 2h ago
It seems like it would be hard to make pronouncements about the error rate without knowing the actual rate of unsupportable requests? Moreover, you’re referencing FISA warrants which are so unlike typical warrants that constructing arguments based on FISA practice is risky.

Point me to an article if I’m wrong, but I haven’t heard even a single credible rumor that these Stingrays aren’t being used for exactly what authorities say they are - trying to find particular individuals is a general area. Have you heard of whistleblower accounts or accidentally leaked details about large scale storage ordata mining of location data from Stingrays?

If your argument is simply that law enforcement agencies don’t have the right to conduct a dragnet when pursuing a fugitive murderer, as is the case here, you’re going to need something more persuasive than a rant against authoritarianism.

perihelions · 5h ago
It'd be flatly unconstitutional to approve a dragnet warrant targeting a protest.
dmix · 5h ago
They wouldn't necessarily be targeting the whole protest, the IMSI catcher would work broadly and from that the warrant would require them to narrow down to one and ignore rest. Unless I misunderstood the technical details the parent comment posted.

This broad dragnet nature of Stingray collection has always been why it's been a major privacy issue. Like doing a wiretap by tapping the whole neighbourhood and filtering phone calls for a certain address.

cosmicgadget · 4h ago
After reading Kavanaugh's latest concurrence I am not so sure.
Yeul · 2h ago
Whoever thought it was a good idea to let a president appoint the supreme court was a naive fool.
dylan604 · 1h ago
Appoint, yet still needing Senate approval is probably what made this palatable to the founding fathers. I'm guessing the old white dudes in wigs never thought that the Senate would abdicate its role by become subservient to one old dude if not in a powdered wig at least in powdered face
vkou · 1h ago
Given that the Supreme Court has managed to appoint[1] two presidents in the past thirty years, I'd say that the Gordian knot has tightened.

[1] Bush 2000, and less directly but far more dangerously, by making Trump unprosecutable in the run-up to 2024.

tiahura · 5h ago
In a recently-unsealed search warrant reviewed by Forbes, ICE used such a cell-site simulator in an attempt to track down an individual in Orem, Utah.

Maybe you missed it when you read the article?

perihelions · 4h ago
The article[0] I'm replying to is about a political protest in Tukwila, Washington.

[0] https://san.com/cc/exclusive-evidence-of-cell-phone-surveill...

loeg · 3h ago
(It establishes that it is possible to obtain a warrant to use this device. One could have been obtained in Tukwila.)
throwawayq3423 · 1h ago
A warrant for several thousand people at a spontaneous event ?
vkou · 5h ago
When you treat with someone you know to be a compulsive liar, the onus of proof is on them.

If this government has not proven that they had one, you'd be mad to trust that they did.

There are no consequences to it for lying, or for not following the law, or not acting in good faith. It has a well-documented history of doing all three, and is headed by a convicted criminal.

analognoise · 4h ago
Can we stop sanewashing these people?

They clearly don't care for legality, constitutionality, anything positive or good.

No comments yet

xrd · 5h ago
It would be amazing if an authoritarian government like that in Venezuela could just "facilitate" (such a funny word these days) getting a single convicted murderer into the US and then turn the US into the same kind of authoritarian government.

Whoops, I hope no other country in conflict with the US gets this idea, that pool has expanded significantly lately!

I recall reading about the people who slammed planes into the World Trade Center towers. They were not hell bent on destroying buildings, they were hell bent on destroying society of the US, destroying buildings was just a stepping stone. And, sure seems like they succeeded.

kps30 · 5h ago
Castro did that. Google Mariel Boatlift of 1980.

But the US is not in decline because of whatever anyone from outside does. It's following the same cycle all Hegemons go through over 100-200 years. Whether its Greece, Babylon, Eygpt, Rome, Islamic Caliphates or all the later European powers. They all went through a similar a cycle - rise - dominate - decline. See Oswald Spengler - Rise and Fall of the West written 100 years ago.

bloomingeek · 3h ago
You're referring to history, which nobody gives a care about it seems. Here in the US, it's as if we're living in a bad sci-fi/horror movie the last ten years. People argue about politics, forgetting to hold politicians accountable to any laws. Most of SCOTUS is a party stooge and the POTUS is a mafia type thug, basically blackmailing corporations and law firms. Trouble is, this "cycle" will most likely have world wide repercussions and in a lot of cases already has.

No comments yet

pjc50 · 3h ago
The Venezuelan murderer doesn't actually have to exist for that to happen.
xrd · 36m ago
Good point, you could, for example, accuse someone of being equivalently dangerous, say in the MS-13 gang, illegally deport him without due process, and then hold up a doctored photo with those initials tattooed on his hands and insist he had those tattoos on his hands.

Then, just do whatever the hell you want all the name of protecting people from crime and protecting jobs.

What am I saying, that's completely ridiculous and could never happen in a "law and order" country like the US.

dpkirchner · 4h ago
It would be extremely easy:

https://www.nbcnews.com/news/amp/rcna206917

> Mexico’s security chief confirmed Tuesday that 17 family members of cartel leaders crossed into the U.S. last week as part of a deal between a son of the former head of the Sinaloa Cartel and the Trump administration.

I don't know how Republicans continue to support this administration. Maybe they just don't know he's aiding criminals?

autoexec · 2h ago
> . Maybe they just don't know he's aiding criminals?

I mean, our president is a criminal himself. Repeatedly violating the law and the constitution while in office. At this point those supporting the regime must doing it out of either cowardice or malice

dylan604 · 1h ago
> I mean, our president is a criminal himself. Repeatedly violating the law and the constitution while in office

Allegedly. No convictions have come from any of the accusations as POTUS.

autoexec · 47m ago
> No convictions have come from any of the accusations as POTUS.

I'm not sure we'll ever see one since the supreme court is in his pocket and has already ruled that that the president is allowed to commit crimes as long as it was an "official act" as determined on a case by case basis by the court

like_any_other · 2h ago
> He believed that was the case because the former cartel boss, whose lawyer said in January he had entered negotiations with U.S. authorities, had been pointing fingers at members of other criminal organizations likely as part of a cooperation agreement.

> “It is evident that his family is going to the U.S. because of a negotiation or an offer that the Department of Justice is giving him,” Garcia Harfuch said.

Looks like they're getting protection in exchange for testimony against other cartels.

apwell23 · 4h ago
>I recall reading about the people who slammed planes into the World Trade Center towers. They were not hell bent on destroying buildings, they were hell bent on destroying society of the US, destroying buildings was just a stepping stone. And, sure seems like they succeeded.

nah someone made all that up after the fact

vlabakje90 · 2h ago
Al Zawahiri's Knights Under the Prophet’s Banner argued that spectacular attacks should provoke U.S. overreach, bleed it economically, and expose its weakness. That was published in 2001. After 9/11, but only by two months.
GLdRH · 5h ago
That's why the orange man is protecting the border
xrd · 5h ago
I just can't wrap my head around why spending $500M to paint the wall is protecting me from a Venezuelan murderer. Do Venezuelan murderers see them like colorful poisonous dart frogs and avoid them somehow?

https://factually.co/fact-checks/politics/border-wall-paint-...

dylan604 · 1h ago
It's funny to me how Build That Wall was such a key part of Trump 45 but is a giant nothing burger for Trump 47. How could it be that it is so much less important just 4 years later, oh, right, never mind
vkou · 4h ago
They don't, which is why racial profiling is back on the menu.

Citizens on the streets don't need to show their papers to ICE, but that's been worked around by yesterday's SCOTUS. Being brown at Home Depot is now sufficient cause to get arrested by ICE.

No comments yet

maxerickson · 5h ago
Begs the question.
tolerance · 4h ago
Am I wrong for suspecting that the policy that colors the current Administration’s tyranny has its roots in those prior (Bush II, Obama)? Were we not warned of the possible consequences when less sensational or consenting news broke back then?
kristopolous · 2h ago
I was certainly talking about exactly this.

Trust me, people thought you were some wild crazy freak.

See here's how it works, watch:

There's going to be concentration camps. The volume of deportation required demands it. There always needs to be two sides agreeing in a deportation, the sending and the receiving. If there's a bottleneck at the receiving or an incompetence in the sending then you warehouse. It's inherent to any logistics.

No that feeling you have that I'm crazy, that's what I'm talking about.

Anyways... See you in a year or so and I'll link back to this.

stuartjohnson12 · 2h ago
I normally try to avoid commenting on politics because this account is tied to my identity and therefore my profession and it's generally not advisable to tie those things together.

So it is with no degree of lightness that I say that I agree and this concerns me gravely.

potato3732842 · 1h ago
The time to be concerned was 10-15yr ago when these tactics were being normalized (if you take issue with the means) and the policies that teed up the current immigration showdown were being figured out (if you take issue with the end).
h4ck_th3_pl4n3t · 1h ago
The solution to the warehouse cost problem is pretty easy, you just need to burn them because ashes are more compact, ergo less transportation costs.

You just don't want to realize that this has nothing to do with ethics anymore. It's about control and money.

bloomingeek · 3h ago
Absolutely, we were warned. No one heeded and then came the destruction of the Republican party by the likes of Rush, Newt and Rove who convinced the voting public everyone is evil who doesn't agree with them. Centrist and left leaning voters hoped it would just run it's course and go away, then evangelicals signed up with the Republicans and here we are.
tolerance · 3h ago
Right, I’ve heard this story before. But what are we attributing to whom we’d otherwise label incompetent or malicious from among the center and left, from among the electorate and the elected?

Or, what absolves them from not being held accountable for not taking heed to these warnings, being passive?

anecdatas · 1h ago
The left was a Cassandra the whole time -- it's been nothing but warnings from the left. The Democrats (note: the Dems are not a left party) refused to listen, assuring everyone it was fine, that we just needed to return to norms and decorum. If we just elected the most proper guy, if we just went a little more rightwards in our policies, all this would be fine.

Meanwhile, the left out there pointing at Obama's extrajudicial killings, Bush's whole post 9/11 fiasco, Clinton's "Superpredators" nonsense, etc. etc. and making tons of noise about how this was all going to end.

Turns out, the left was right, the Dems were wrong. But the Dems are still fighting to try and shut down the left. Look at how hard the Dem establishment hates Mamdani.

tolerance · 1h ago
My line of questioning could be interpreted as a conflation of the left ("the electorate") with Democrats ("the elected"). Thanks for pointing out that distinction. I think it offers some directive as far as accountability can be considered.

I’m curious to see where the Mamdani Experiment takes you all. His constituents are one group who are for certain no stranger to the armed presence reported elsewhere today. Under pretenses all too familiar.

Terr_ · 1h ago
They aren't absolved, but it's pretty normal to put more blame and attention on willful criminals as opposed to neglectful bystanders.
AnishLaddha · 3h ago
since reagan, actually: https://en.wikipedia.org/wiki/Unitary_executive_theory

John Yoo is probably the most influential lawyer of the 21st century.

cheald · 2h ago
The use of Stingrays to conduct mass surveillance dates back decades, yes.
potato3732842 · 1h ago
>Were we not warned of the possible consequences when less sensational or consenting news broke back then?

People were screeching about this stuff then but they were brushed off by as "conspiracy weirdos" or "yeah they're probably doing it but who cares because it'd be unconstitutional" or "they won't use it on petty criminals" depending upon the exact year and political context you brought it up in.

xp84 · 4h ago
> ICE used such a cell-site simulator in an attempt to track down an individual in Orem, Utah. The suspect had been ordered to leave the U.S. in 2023, but is believed to still be in the country. Investigators learned last month that before going to Utah, he’d escaped prison in Venezuela where he was serving a sentence for murder, according to the warrant. He’s also suspected of being linked to gang activity in the country, investigators said.

Sounds like a real cool guy.

Wiretaps have always been a tool in law enforcement's hands, and if it's subject to a warrant, which the article goes on to say it was, I am completely fine with this. If the ability to tap phone conversations 75 years ago didn't cause us to descend into fascism, I don't automatically think this is scary.

TheJoeMan · 2h ago
I'm totally against running Stingrays willy-nilly at protests, but this story seems like a non-issue. They had a warrant to track someone down, narrowed it to 30 blocks, then used the Stingray for final location tracking. Doesn't sound like they were logging IMEI's or interested in traffic.
whatsupdog · 3h ago
I'm tired of people protecting these murderous criminals who don't give two sh*s about any laws. This lack of empathy (for the victims of these criminals) is appalling.
JohnMakin · 3h ago
The thing that annoys me most about such thoughts is not the callousness - it’s the extremely short sighted opinion that the same tactics won’t eventually be used on them, or people they care about. It never even occurs to them that can happen until it does.

Erosion of anyone’s rights is an erosion of everyone’s rights.

bloomingeek · 3h ago
Absolutely, we older types used to argue with the term, "slippery slope". ICE is a classic slippery slope that will most likely be used, eventually, against all of us if the current administration isn't stopped breaking the law.

No comments yet

chasd00 · 3h ago
> I'm tired of people protecting these murderous criminals who don't give two sh*s about any laws. This lack of empathy (for the victims of these criminals) is appalling.

wait, are you talking about this guy and the people they killed in Venezuela or ICE?

whatsupdog · 3h ago
Isn't it obvious? How many people has ICE killed extra judicially?
nxobject · 3h ago
Do deaths in detention count? [0] 12 so far since the administration began through August (data only being published after 90 days.) Of course, nothing's stopping the administration from using "probable cause" to detain anyone suspicious - like citizens (or at least brown citizens.) [1]

[0] https://www.ice.gov/detain/detainee-death-reporting

[1] https://www.nbcnews.com/news/us-news/us-citizen-detained-ice...

anecdatas · 1h ago
Most likely in the hundreds if you count the deaths in detention, the deaths due to deportation to unsafe or unsanitary locations, and the suicides attributable to their actions.

This is based on a historical accounting of ~1 death a month in their direct care over the past 5 years, plus assuming at least as many due to other root causes. I expect that number to increase as they continue to expand operations and worsen protections for detainees.

zOneLetter · 5h ago
How would one go about detecting the IMSI commands? Would an advanced radio receiver be able to see these? I know pretty much nothing about SIGINT but been contemplating spending some time learning about it.
yencabulator · 5h ago
JumpCrisscross · 5h ago
The article describes a search conducted with a warrant. Given the brazen criminality ICE agents are acting with, I’d like to see evidence of malpractice before risking diluting the message.
rhcom2 · 5h ago
The argument with Stringrays is that even with a warrant to target an individual the police end up sucking up a large amount of random people's location and cell phone data.

Like license plate readers and facial recognition, you're out in the world without the expectation of privacy but I think for most people that feels different when a giant automated system is sucking everything up without recourse.

No comments yet

abirch · 5h ago
A warrant against a criminal. This is the case that most people support.
cosmicgadget · 4h ago
Even if that tool queries everyone in the neighborhood?
buellerbueller · 5h ago
I do not support having my cell phone location data sucked up by the government in general while exercising my First Amendment right to protest. That this particular government is doing it is frankly, terrifying.
abirch · 5h ago
I agree with you about cell phone data being sucked up when exercising your rights. I love the EFF: https://ssd.eff.org/module/attending-protest

This particular article was about using Stringray with a warrant. I'm sure that the government is abusing Stingray but it'd be nice to have evidence first.

coldtea · 4h ago
Warrants can also be malpractice when the law is in the hands of authoritative types.
MangoToupe · 4h ago
I hardly think the courts are above malpractice. They seemed fine with the patriot act, for instance. Citizens United is the definition of malpractice in my book, essentially legalizing corruption.
chasd00 · 2h ago
The Patriot Act was an eye opener to me. Fear has to be, by far, an authoritarian's best tool against the masses. I was shocked "we the people" let the Patriot Act happen, i was also shocked when people locked themselves up for a year voluntarily during covid. All you need is a way to produce fear in the population and they'll do and believe anything you say. Anything.
boston_clone · 5h ago
Edited to redact; response was referencing a different article.
abirch · 5h ago
Are you quoting from the Forbes article listed above?

"In a recently-unsealed search warrant reviewed by Forbes, ICE used such a cell-site simulator in an attempt to track down an individual in Orem, Utah. The suspect had been ordered to leave the U.S. in 2023, but is believed to still be in the country. Investigators learned last month that before going to Utah, he’d escaped prison in Venezuela where he was serving a sentence for murder, according to the warrant. He’s also suspected of being linked to gang activity in the country, investigators said.

When the government got the target’s number, they first got a warrant to get its location. However, the trace wasn’t precise–it only told law enforcement that the target was somewhere in an area covering about 30 blocks. That led them to asking a court for a Stingray-type device to get an accurate location.

The warrant was issued at the end of last month and it’s not yet known if the fugitive was found."

boston_clone · 5h ago
GuinansEyebrows · 5h ago
not sure if they just edited it very quickly or what, but that sentence no longer appears in the article.
exe34 · 5h ago
"Earlier this year, new media publication Straight Arrow News said it had analysed “mobile network anomalies” around a Washington state protest against ICE raids that were consistent with Stingray use."
notherhack · 44m ago
The Forbes article says ICE acquired mobile cellular surveillance equipment and services under the Biden administration, and there have been IMSI catchers detected at demonstrations for a long time, for example at the Dakota Access Pipeline demonstrations in November, 2016[1]. It's not a new thing.

[1] https://www.justsecurity.org/34449/investigating-surveillanc...

allseeingimei · 5h ago
Every bus stop and billboard with a CBS logo on it is doing the same thing and has been for a long time. They map your movements by presenting as a cell tower and record the IMEIs of passers by. Forbes won't write a story about that though.
afavour · 5h ago
Any citation for that? You seem to have created your account specifically to comment here so I have to assume you're well informed on the topic.
NoiseBert69 · 5h ago
That's not how cellular networks work.

Your IMEI will never be send in clear over the network. Not even back in old 2G networks.

If the gov needs your data they can use standardized lawful interception interfaces. This interface offers all juicy data - not only voice, SMS and your phone number.

octoberfranklin · 2h ago
You're confusing IMEI and IMSI.
lrvick · 1h ago
If your cell phone is connected to cell towers, almost anyone can buy your location.

Only option is stay in airplane mode and use wifi.

pizzly · 18m ago
Hello WiFi Geolocation technologies. https://en.wikipedia.org/wiki/Wi-Fi_positioning_system
CommanderData · 5h ago
Wasn't this thought impossible with LTE, I thought older bands were only susceptible to this attack.
jeroenhd · 5h ago
Classic 2G stingrays are a lot less complicated, but attempts to secure the IMSI haven't properly been implemented until 5G came around. Even then, the IMSI has been replaced with encryption and temporary identifiers your carrier knows belongs to you, and if law enforcement comes in with a warrant they can get those replacement identifiers from your carrier regardless.

You can't get the IMSIs passively anymore, but LTE doesn't make these attacks impossible, just less practical, especially for criminals that don't have warrants on their side.

NoiseBert69 · 5h ago
They can use standardized lawful interception interfaces to get all this data.

No big need to dig down deep into the radio and protocol layer.

betaby · 5h ago
5G standalone is not transmitting IMEI in plain text ever to my knowledge.
boston_clone · 5h ago
isn't this then ripe for a downgrade attack?
NoiseBert69 · 5h ago
To LTE? Doesn't work there either.

There are IMSI catchers - but they all require GSM. At least on Google Pixels you can turn off 2G with a switch. The phone even shows a message about its insecurity.

In Germany I'm running 100% on LTE/5GNR-only for many months now without having a single coverage gap.

boston_clone · 5h ago
thank you for the explainer; I do need to research for a more complete understanding of this space.

looks like iPhones will need to enable Lockdown Mode to disable 2G, at least for iOS 17+ per https://ssd.eff.org/module/attending-protest

yinznaughty · 4h ago
You can collect IMSI passively over LTE: https://github.com/SysSec-KAIST/LTESniffer

You can just jam everyone in the area and see who reconnects.

kotaKat · 3h ago
Couldn’t I just grab a Baicells eNB off eBay and point it at my own Open5GS installation and passively sniff IMSIs of users scanning around anyways that try to attach and reject? It feels like I could build some kind of “sniffer” fairly easily these days as well.
boston_clone · 5h ago
Could folks share more accessible methods for developing counter-Stingray type activities described in this paper, or rather, which ones they themselves have used with varying degrees of success?

https://www.cise.ufl.edu/~butler/pubs/ndss25-tucker-marlin.p...

Ideally, this is something I could hack together in the next few days since ICE is prepping to invade my city.

therobots927 · 5h ago
I can't help you, I'm just here to thank you for your service.
allseeingimei · 5h ago
burner phones and sunglasses are probably easier
therobots927 · 5h ago
My understanding of the linked paper is that it details methods of detecting stingrays. Not jamming them...
boston_clone · 5h ago
I could've been more clear :) don't think I could engage in prevention without violating some FCC laws. But in general, yes - prevention > detection > awareness > ignorance.

No comments yet

nisegami · 5h ago
'no phone' is the only safe option
chasd00 · 3h ago
that's what i would do, just leave the phone at home. Bring a camcorder and post your social media engagement dopamine hit when you get back home. No need for constant connectivity, people protested pretty effectively in the 60s before cell service even existed.
fsflover · 3h ago
My phone has hardware kill switches, so I can be sure the modem is off when I need it.
mdhb · 5h ago
No phone actually stands out a lot in real life surveillance systems and will very quickly get you a bunch of additional attention because it’s so unusual.

Not usually that I’m aware of as a single data point in any system but if there are other reasons to thing you’re trying to act surreptitiously you are going to be very close to the top of the list of people of interest.

There’s a lot to be said in 2025 for appearing uninteresting to anyone who might be watching.

therobots927 · 4h ago
So where is the burner phone kept? It can't be kept at your home - you have to assume its location is being logged. So you have to purchase and store it somewhere besides your house. You can't use your car to purchase it or store it, so you need a bike. On the day of the protest you need to charge the burner phone away from your car or home and then bike to the protest.

Is this too extreme? How expansive are the queries theyre running on these identifiers? Are they running algos to detect burner phones based on the highly anomalous activity patterms described above?

It's becoming common practice for protesters to store their phones in faraday bags. I don't think "no phone" would stand out as much as you think it would.

tpxl · 3h ago
> So where is the burner phone kept? It can't be kept at your home - you have to assume its location is being logged. So you have to purchase and store it somewhere besides your house

You can remove the battery, put it in a Faraday cage and charge it turned off (or in another device/out of one). It can be on only when you need it.

yinznaughty · 4h ago
If you rotate burner sims you are probably mostly fine but yeah with enough effort they can do a larger geo analysis with the IMSIs. Only IMSI (the sim id) is in the clear on LTE afaik so you might be okay if you are not otherwise of interest.

Just turning the phone off and wrapping it tight in aluminum foil is almost certainly better.

They can and do have the ability to MITM traffic though. There is not anything to stop someone with the hardware from doing it and everyday that passes it seems the rules matter less and less.

therobots927 · 3h ago
Sim swapping seems easy to detect based on anomalous patterns. And it's not a question of effort. If the data is there to allow links to be made, an algorithm can be designed to make those links. Then it's zero effort.

Sounds like "no phone" is the winner

mdhb · 2h ago
This is dumb advice that doesn’t match any kind of realistic threat model. It’s like something you saw in a movie I think.

The entire modern game is very literally, don’t be interesting and don’t do weird shit that normal people wouldn’t do. It’s a needle in a haystack problem so don’t go and start creating a really weird signature of whatever it might be: behaviour, communication, RF emissions etc. The anomaly is the signature and has been for about 20 years now.

therobots927 · 2h ago
So are you in the “no phone at protests” camp? Because it’s impossible to attend a protest and “act normal” because by definition you’re engaging in abnormal behavior and that’s exactly why they’re logging all the phones there
mdhb · 1h ago
I think you can still go to a protest with a phone just fine honestly.

The fact that there are a lot of people there is actually the strength of it.

I’d probably think carefully about what you want to use it for and what I had on there though. I wouldn’t recommend bringing a device with a a bunch of incriminating evidence to an event like that.

I think a good threat model is just operate on the assumption that maybe someone stops you and asked to look at your phone. Go ahead and also assume that they will ask at the most inconvenient point in the day also. Act accordingly and I wouldn’t anticipate much in the way of trouble from having one.

Also, look at it through the eyes of the opposition, what are their goals here…

1. Fix the signal to noise ratio in a crowd

2. Identify people

3. Map out networks

And your goal is to not to be “invisible” (you can’t anyways) but to be uninteresting. They aren’t the same thing and the difference is important.

For the overwhelming majority of people I don’t think there is much yet to worry about in simply attending a protest (Assuming you’re a citizen and you act sensibly because otherwise that’s an entirely different threat model and you probably shouldn’t be there at the moment).

But I would leave you with this bit of advice also… they very much want you to think they are the all knowing, all seeing and ever present 50ft tall enemy. That isn’t true. There is also no shortage of people who really seem to get off on pretending things are more dangerous than they really are but that shit turns into paranoia real quickly and then people become terrified to do anything or you start making bad decisions. Fight both of those things when you run into them.

You can and should feel good about getting out in the streets at the moment, it’s not going to get easier the longer it goes on just be sensible.

therobots927 · 1h ago
Thanks, that was a very thoughtful comment and you basically read my mind, in that I have become so paranoid that I’m afraid to go to a protest. And I can definitely see how that plays right into their hand. I think there is definitely a lot of room for messaging like yours because it seems like now many are becoming aware of the surveillance situation which is good but at the same time can result in a form of learned helplessness.
mdbh2 · 49m ago
It’s a weird new world for sure out there and honestly everyone is going through this.

Even the CIA had to stand up a whole new department years ago when the realised they even with all of their tradecraft and gadgets they couldn’t even move around London without the Brits knowing about it and had to totally change how they did business as a result. It’s not just an average protestor on the street problem at all.

I think a big part of the problem comes from this idea that you’re trying to be invisible and you keep running into all these new layers of problems all the damned time.

Maybe I’m using E2EE apps but the people I’m talking with take screenshots and run them through co-pilot or put them into their iCloud backups or a million other scenarios. It just feels like such an unwinnable game sometimes that you can very easily and convincingly get yourself to a place where you feel overwhelmed and you just freeze which is such a trap in and of itself.

I’d recommend keeping the illegal activity side of things extremely fucking low to non-existent personally and everything else will become much simpler as a result. It’s much easier to just not have evidence than trying to hide it. That doesn’t mean you shouldn’t do things with a sense of purpose though. There are many ways to frustrate the opposition, to tie up their resources, to send them on wild goose chases, to wear down their morale that are all firmly in the legal category.

antonvs · 4h ago
There’s no information or evidence about any system capable of detecting someone without a phone being in use today. You’d have to combine multiple technologies to do it, and while it might be technically possible the details go beyond any known current systems.
mdhb · 2h ago
What on earth are you talking about… that is not even a little bit true. I think you’re over complicating this in your head quite a bit.

Here’s something [1] that’s was public almost 20 years ago at this point. Things have advanced a lot since then. I don’t think you quite understand just how much of a pipeline there was for this kind of technology that went almost directly from quite classified SIGINT stuff in the GWOT to casual LEO / domestic stuff.

I know the whole no phone thing sounds like a real high speed operator move but it’s very literally a signal they go looking for when trying to sift through large amounts of data.

[1] https://www.pnnl.gov/main/publications/external/technical_re...

antonvs · 2h ago
They can detect the presence of phones, yes. But that doesn’t automatically mean being able to detect people that aren’t carrying phones. To do that, you’d need to integrate the phone detection data with some other source of data on people present in the area in question. I’m saying there’s no evidence of such a system actually being used in practice. The paper you linked doesn’t address that at all.

Btw, to help understand the technical challenges involved with this, the whole reason Tesla focused on vision-only for its self-driving was the difficulty of integrating sensor data from multiple sources, e.g. lidar + vision would be significantly more difficult to achieve. It’s not that this isn’t possible in theory - it’s just that there’s no evidence of anyone having done it for “lack of phone” detection, and that’s probably because it’s not really a requirement that’s in high demand.

mdhb · 1h ago
I’m not looking to argue with you here. You can take the advice or leave it but I will leave you with one quick tale to say that around the late 90s / early 2000s employees at GCHQ used to have a rule that when they were on their way to work they had to turn off their phones when they were I forget exactly how far but something like 30km of arriving to work.

They realised that technology had changed for them even that long ago that all it was doing was just making a really clear signal for the opposition as to who they were and that they were someone interesting.

I think the advice you have is very literally decades out of date.

If you have an hour or two to kill I’d recommend taking a look at this for a real no bullshit modern way of thinking about this problem space: https://youtu.be/0_04-lTu2wg?feature=shared

antonvs · 1h ago
In a tightly targeted situation like entering the GCHQ building, sure. Because it’s essentially a target-poor environment with a known point of interest that possible targets are visiting. Those constraints make the problem much simpler.

But the OP article is about a Stingray operation covering 30 blocks, and other discussion in this thread is about protests such as the anti-ICE protest which gathered cellphone info from the protestors. In those kinds of environments, if you don’t want to show up on surveillance, you’re much better off not carrying a phone.

Being more specific, this comment of yours is not supported by evidence:

> No phone actually stands out a lot in real life surveillance systems and will very quickly get you a bunch of additional attention because it’s so unusual.

But, if you’re getting your information from videos like the one you linked, I can see why you have these beliefs.

mdhb · 1h ago
It’s very clear that you just started thinking about this topic in the last hour but for some reason you’ve got a real unearned confidence in what you’re saying.

I have very good reasons to know what I’m talking about here but again, I’m not here to argue with you.

antonvs · 1h ago
The trust me bro argument is always a convincing one.

Perhaps if I read you my last comment in a voice lowered a few octaves like in that video, you’d believe me.

MandieD · 4h ago
Dreh dich nicht um, schau, schau… Der Kommissar geht um, oh oh!

Alles klar, Herr Kommissar?

boston_clone · 5h ago
I leave mine at home, but you're right; I should also get some counter-facial recognition paint.

However, my endeavor here is more focused on awareness and transparency for the masses than subterfuge for the individual.

ActorNightly · 5h ago
"small government"
hk1337 · 3h ago
This seems like it would be more useful as an Android app you can side load rather than a rust app.

If I am understanding correctly, I would need a mobile device?

Would this work using the phone as a hotspot? If so, then I guess my previous comment is moot.