frauenfelder — 2014-03-25T13:37:39-04:00 — #1
nixiebunny — 2014-03-25T13:44:07-04:00 — #2
How long before people get so fed up that they start ripping these things out of the ground?
acerplatanoides — 2014-03-25T13:53:54-04:00 — #3
scrub — 2014-03-25T13:56:38-04:00 — #4
Presumably building permits would provide a clue as to which were legit and which weren't...
skeptic — 2014-03-25T13:57:39-04:00 — #5
Just to be clear, Stingrays are compact, portable spying devices that act electronically like a cell tower. They are not physically disguised as a cell tower, just in case the photo of a physical cell tower gives people the wrong idea.
gyrofrog — 2014-03-25T14:18:01-04:00 — #6
I thought this might be about spying devices that otherwise look like a piece of infrastructure. There's one on my way to work, it's at least as tall as a utility pole if not as tall as a cell tower. So it's pretty nondescript although it looks like they put speed sensors/cameras on top (there had been a portable trap there at one point).
prestonsturges — 2014-03-25T14:18:15-04:00 — #7
I accidentally stumbled upon the local DHS HQ, which looked like a drab elementary school with few windows. On Google maps it's labeled "U.S. Citizenship and Immigration Services" but their entrance has an electronic security gate and DHS logo.
skeptic — 2014-03-25T14:22:50-04:00 — #8
The DHS is an umbrella agency. DHS includes:
U.S. Citizenship and Immigration Services
U.S. Customs and Border Protection
Federal Emergency Management Agency
U.S. Immigration and Customs Enforcement
Transportation Security Administration
U.S. Coast Guard
National Protection and Programs Directorate
U.S. Secret Service
acerplatanoides — 2014-03-25T14:29:22-04:00 — #9
I would make no such presumption. I presume the towers are erected by legitimate subcontractors in accordance with local, state, and federal code. Whose equipment is at the base of the tower is the question here.
acerplatanoides — 2014-03-25T14:29:59-04:00 — #10
it gave me the wrong idea.
skeptic — 2014-03-25T14:30:57-04:00 — #11
Stingrays are portable devices that fool cell phones into thinking they are talking to a cell tower, tricking cell phones in the area to give up information such as location data. Florida based Harris Corporation sells the devices to the government and tries to keep their capabilities secret from the public, and even the judiciary, through NDAs.
tinkafoo — 2014-03-25T14:33:10-04:00 — #12
Maybe this explains why I don't get more bars when driving next to certain "cell towers".
skeptic — 2014-03-25T14:41:21-04:00 — #13
Uh, more likely, those cell towers are for different cell providers. You know they don't all share the same towers, right?
Once again, stingrays are portable spying devices. When cops want your data they don't even need one of them, they can just demand it from the cell providers. Stingrays are just handy because they can take it anywhere for real-time results and skip that pesky paperwork that gets all of those darn civil libertarians (aka citizens) all riled up if they discover it.
crenquis — 2014-03-25T14:50:24-04:00 — #14
Have never tried it, but this is out there...Detects IMSI based device location tracking
SecUpwN/Android-IMSI-Catcher-Detector · GitHub
Provides counter measures against device tracking
Can provide swarm-wise-decision-based cellular service interruption
Can provide secure wifi/wimax alternative data routes through MESH-like networking
Detect and prevent remote hidden application installation
Detect and prevent remote hidden SMS-based SIM attacks
Prevent or spoof GPS data
Does NOT secure any data transmissions
Does NOT prevent already installed rogue application from full access
edit: looks like work in process... at the simplest level, they are compiling a database of gsm base stations -- since they really don't change much, if a new, strong, station shows up, then it is likely that it is a catcher.
brainspore — 2014-03-25T15:05:48-04:00 — #15
Aren't ALL cell phone towers essentially spying devices now?
dobby — 2014-03-25T15:11:43-04:00 — #17
There was a back and forth dialogue between the neo900(uber geeky community full hardware upgrade for the amazing Maemo linux N900 phone) team and Richard Stallman over at talk.maemo.org on including a plug in POCSAG pager circuit for the prototyping port and having an app that could call back numbers paged to you when you desired. It turned a mobile phone into an untrackable passive receiver until you were ready to activate the GSM system and make an outgoing call. The exchange got bogged down in discussing the firmware upgradeability of the modem chip module but it was interesting that RMS was actually showing interest in finally owning a mobile phone.
It might be inconvenient forcing all incoming calls to hit voicemail first, but especially at protests and the like it breaks the utility of these police state gadgets.
crenquis — 2014-03-25T15:47:16-04:00 — #18
I really need to take the time to repair my n900 usb connector... I miss having a really hackable device.
gyrofrog — 2014-03-25T16:05:20-04:00 — #19
Should've clarified... I was describing my initial impression after (only) reading the headline.
restless — 2014-03-25T16:10:23-04:00 — #20
It seems to me that they could get a good jumpstart by teaming up with folks from OpenSignal, Mozilla Foundation and the data being collected through MozStumbler, etc. There's a couple rich sets of data that they could employ for this, although you have to assume that those sets of data aren't already compromised.
fuzzyfungus — 2014-03-25T16:45:11-04:00 — #21
That tower has more constitutional rights than you do, citizen...
Also, since all the telcos cooperate like craven lapdogs, it's really a question of 'spying devices disguised as cell phone towers that also provide cell service' and 'spying devices disguised as cell phone towers'...
next page →