Top
Best
New

Posted by coloneltcb 3 days ago

ICE is using fake cell towers to spy on people's phones(www.forbes.com)
665 points | 255 commentspage 2
coderatlarge 3 days ago|
isn’t this essentially a warrantless search of any bystander who happens to connect to the tower? basically random, digital stop-and-frisk?
nobodywillobsrv 2 days ago||
What is the baseline spying by ALL agencies? For non experts this would be useful to know. Just heard something suggesting most comms are fully infiltrated anyway for certain foreign actors but have no idea how to validate those claims myself.
boston_clone 3 days ago||
Could folks share more accessible methods for developing counter-Stingray type activities described in this paper, or rather, which ones they themselves have used with varying degrees of success?

https://www.cise.ufl.edu/~butler/pubs/ndss25-tucker-marlin.p...

Ideally, this is something I could hack together in the next few days since ICE is prepping to invade my city.

therobots927 3 days ago||
I can't help you, I'm just here to thank you for your service.
allseeingimei 3 days ago||
burner phones and sunglasses are probably easier
therobots927 3 days ago|||
My understanding of the linked paper is that it details methods of detecting stingrays. Not jamming them...
boston_clone 3 days ago||
I could've been more clear :) don't think I could engage in prevention without violating some FCC laws. But in general, yes - prevention > detection > awareness > ignorance.
nisegami 3 days ago||||
'no phone' is the only safe option
chasd00 3 days ago|||
that's what i would do, just leave the phone at home. Bring a camcorder and post your social media engagement dopamine hit when you get back home. No need for constant connectivity, people protested pretty effectively in the 60s before cell service even existed.
fsflover 3 days ago||||
My phone has hardware kill switches, so I can be sure the modem is off when I need it.
reorder9695 2 days ago||
What phone is that? I've been wanting a phone with mic/camera especially hardware kill switches
fsflover 1 day ago||
https://en.wikipedia.org/wiki/Librem_5
mdhb 3 days ago|||
No phone actually stands out a lot in real life surveillance systems and will very quickly get you a bunch of additional attention because it’s so unusual.

Not usually that I’m aware of as a single data point in any system but if there are other reasons to thing you’re trying to act surreptitiously you are going to be very close to the top of the list of people of interest.

There’s a lot to be said in 2025 for appearing uninteresting to anyone who might be watching.

therobots927 3 days ago|||
So where is the burner phone kept? It can't be kept at your home - you have to assume its location is being logged. So you have to purchase and store it somewhere besides your house. You can't use your car to purchase it or store it, so you need a bike. On the day of the protest you need to charge the burner phone away from your car or home and then bike to the protest.

Is this too extreme? How expansive are the queries theyre running on these identifiers? Are they running algos to detect burner phones based on the highly anomalous activity patterms described above?

It's becoming common practice for protesters to store their phones in faraday bags. I don't think "no phone" would stand out as much as you think it would.

yinznaughty 3 days ago|||
If you rotate burner sims you are probably mostly fine but yeah with enough effort they can do a larger geo analysis with the IMSIs. Only IMSI (the sim id) is in the clear on LTE afaik so you might be okay if you are not otherwise of interest.

Just turning the phone off and wrapping it tight in aluminum foil is almost certainly better.

They can and do have the ability to MITM traffic though. There is not anything to stop someone with the hardware from doing it and everyday that passes it seems the rules matter less and less.

therobots927 3 days ago|||
Sim swapping seems easy to detect based on anomalous patterns. And it's not a question of effort. If the data is there to allow links to be made, an algorithm can be designed to make those links. Then it's zero effort.

Sounds like "no phone" is the winner

mdhb 3 days ago|||
This is dumb advice that doesn’t match any kind of realistic threat model. It’s like something you saw in a movie I think.

The entire modern game is very literally, don’t be interesting and don’t do weird shit that normal people wouldn’t do. It’s a needle in a haystack problem so don’t go and start creating a really weird signature of whatever it might be: behaviour, communication, RF emissions etc. The anomaly is the signature and has been for about 20 years now.

therobots927 3 days ago||
So are you in the “no phone at protests” camp? Because it’s impossible to attend a protest and “act normal” because by definition you’re engaging in abnormal behavior and that’s exactly why they’re logging all the phones there
mdhb 3 days ago||
I think you can still go to a protest with a phone just fine honestly.

The fact that there are a lot of people there is actually the strength of it.

I’d probably think carefully about what you want to use it for and what I had on there though. I wouldn’t recommend bringing a device with a a bunch of incriminating evidence to an event like that.

I think a good threat model is just operate on the assumption that maybe someone stops you and asked to look at your phone. Go ahead and also assume that they will ask at the most inconvenient point in the day also. Act accordingly and I wouldn’t anticipate much in the way of trouble from having one.

Also, look at it through the eyes of the opposition, what are their goals here…

1. Fix the signal to noise ratio in a crowd

2. Identify people

3. Map out networks

And your goal is to not to be “invisible” (you can’t anyways) but to be uninteresting. They aren’t the same thing and the difference is important.

For the overwhelming majority of people I don’t think there is much yet to worry about in simply attending a protest (Assuming you’re a citizen and you act sensibly because otherwise that’s an entirely different threat model and you probably shouldn’t be there at the moment).

But I would leave you with this bit of advice also… they very much want you to think they are the all knowing, all seeing and ever present 50ft tall enemy. That isn’t true. There is also no shortage of people who really seem to get off on pretending things are more dangerous than they really are but that shit turns into paranoia real quickly and then people become terrified to do anything or you start making bad decisions. Fight both of those things when you run into them.

You can and should feel good about getting out in the streets at the moment, it’s not going to get easier the longer it goes on just be sensible.

542354234235 2 days ago|||
>For the overwhelming majority of people I don’t think there is much yet to worry about in simply attending a protest (Assuming you’re a citizen and you act sensibly because otherwise that’s an entirely different threat model and you probably shouldn’t be there at the moment).

That seems a tad naive. I think being recorded by local/Federal agencies at a protest, especially one critical of current government actions, is a legitimate concern. Especially since those tools are being brought out specifically for the protest, not because they are looking for some murderer that happens to be a block away from you.

Also, the word "yet" is doing a lot of work there. Considering that data can be stored indefinitely with little oversight, there is little to stop police from searching through the database and looking for "targets of interest" like phones that showed up to multiple protests.

Being at a protest is already known to make you interesting, which is why those tools are being brought out in the first place, why police are "friending" protest organization FB pages to gather membership data, etc. Keeping yourself out of databases that could be used later to jam you up is reasonable. There is also no way for police to tell who has a phone and who doesn't at a protest, so you aren’t highlighting yourself anymore by not bringing your phone (or turning it off), unlike say wearing a mask and sunglasses to reduce facial recognition visually highlights you.

therobots927 3 days ago|||
Thanks, that was a very thoughtful comment and you basically read my mind, in that I have become so paranoid that I’m afraid to go to a protest. And I can definitely see how that plays right into their hand. I think there is definitely a lot of room for messaging like yours because it seems like now many are becoming aware of the surveillance situation which is good but at the same time can result in a form of learned helplessness.
mdbh2 3 days ago|||
It’s a weird new world for sure out there and honestly everyone is going through this.

Even the CIA had to stand up a whole new department years ago when the realised they even with all of their tradecraft and gadgets they couldn’t even move around London without the Brits knowing about it and had to totally change how they did business as a result. It’s not just an average protestor on the street problem at all.

I think a big part of the problem comes from this idea that you’re trying to be invisible and you keep running into all these new layers of problems all the damned time.

Maybe I’m using E2EE apps but the people I’m talking with take screenshots and run them through co-pilot or put them into their iCloud backups or a million other scenarios. It just feels like such an unwinnable game sometimes that you can very easily and convincingly get yourself to a place where you feel overwhelmed and you just freeze which is such a trap in and of itself.

I’d recommend keeping the illegal activity side of things extremely fucking low to non-existent personally and everything else will become much simpler as a result. It’s much easier to just not have evidence than trying to hide it. That doesn’t mean you shouldn’t do things with a sense of purpose though. There are many ways to frustrate the opposition, to tie up their resources, to send them on wild goose chases, to wear down their morale that are all firmly in the legal category.

therobots927 3 days ago||
Very good advice. I make a big effort to stay on the good side of the law as like you I have a healthy respect for their abilities. I’m also interested in your last couple sentences there about sending them on wild goose chases. It reminds me of a YouTube video I watched recently about a way to send AI data scrapers into an infinite hall of mirrors filled with randomly generated text. Not something I have the time to cook up at the moment but I found it amusing. At the same time it’s not hard for me to imagine how easy it would be to pass laws that make such efforts to poison AI a felony.
cindyllm 3 days ago|||
[dead]
tpxl 3 days ago|||
> So where is the burner phone kept? It can't be kept at your home - you have to assume its location is being logged. So you have to purchase and store it somewhere besides your house

You can remove the battery, put it in a Faraday cage and charge it turned off (or in another device/out of one). It can be on only when you need it.

antonvs 3 days ago||||
There’s no information or evidence about any system capable of detecting someone without a phone being in use today. You’d have to combine multiple technologies to do it, and while it might be technically possible the details go beyond any known current systems.
mdhb 3 days ago||
What on earth are you talking about… that is not even a little bit true. I think you’re over complicating this in your head quite a bit.

Here’s something [1] that’s was public almost 20 years ago at this point. Things have advanced a lot since then. I don’t think you quite understand just how much of a pipeline there was for this kind of technology that went almost directly from quite classified SIGINT stuff in the GWOT to casual LEO / domestic stuff.

I know the whole no phone thing sounds like a real high speed operator move but it’s very literally a signal they go looking for when trying to sift through large amounts of data.

[1] https://www.pnnl.gov/main/publications/external/technical_re...

antonvs 3 days ago||
They can detect the presence of phones, yes. But that doesn’t automatically mean being able to detect people that aren’t carrying phones. To do that, you’d need to integrate the phone detection data with some other source of data on people present in the area in question. I’m saying there’s no evidence of such a system actually being used in practice. The paper you linked doesn’t address that at all.

Btw, to help understand the technical challenges involved with this, the whole reason Tesla focused on vision-only for its self-driving was the difficulty of integrating sensor data from multiple sources, e.g. lidar + vision would be significantly more difficult to achieve. It’s not that this isn’t possible in theory - it’s just that there’s no evidence of anyone having done it for “lack of phone” detection, and that’s probably because it’s not really a requirement that’s in high demand.

mdhb 3 days ago||
I’m not looking to argue with you here. You can take the advice or leave it but I will leave you with one quick tale to say that around the late 90s / early 2000s employees at GCHQ used to have a rule that when they were on their way to work they had to turn off their phones when they were I forget exactly how far but something like 30km of arriving to work.

They realised that technology had changed for them even that long ago that all it was doing was just making a really clear signal for the opposition as to who they were and that they were someone interesting.

I think the advice you have is very literally decades out of date.

If you have an hour or two to kill I’d recommend taking a look at this for a real no bullshit modern way of thinking about this problem space: https://youtu.be/0_04-lTu2wg?feature=shared

antonvs 3 days ago|||
In a tightly targeted situation like entering the GCHQ building, sure. Because it’s essentially a target-poor environment with a known point of interest that possible targets are visiting. Those constraints make the problem much simpler.

But the OP article is about a Stingray operation covering 30 blocks, and other discussion in this thread is about protests such as the anti-ICE protest which gathered cellphone info from the protestors. In those kinds of environments, if you don’t want to show up on surveillance, you’re much better off not carrying a phone.

Being more specific, this comment of yours is not supported by evidence:

> No phone actually stands out a lot in real life surveillance systems and will very quickly get you a bunch of additional attention because it’s so unusual.

But, if you’re getting your information from videos like the one you linked, I can see why you have these beliefs.

mdhb 3 days ago|||
It’s very clear that you just started thinking about this topic in the last hour but for some reason you’ve got a real unearned confidence in what you’re saying.

I have very good reasons to know what I’m talking about here but again, I’m not here to argue with you.

ThrowMeAway1618 3 days ago|||
>I have very good reasons to know what I’m talking about here but again, I’m not here to argue with you.

You are exactly right!

Because the gub'mint can track the nasal implant inserted when I was anally probed by the aliens!

You're making a ridiculous claim that makes exactly zero sense.

If folks are tracking cell phones, they can track yours just as well as everyone else's. Which means they can identify you.

If you don't have a pocket surveillance device on you, unless you're broadcasting RF waves with your (tiny) penis, you cannot be tracked via radio/cell. Full stop.

mdhb 3 days ago|||
You not having a phone is absolutely not a meaningful barrier towards identifying you in a crowd when things like ClearView exist. It will only make you stand out as someone who’s trying not to be known and get you towards the top of the list of people they are now interested in.

Your chance of even being able to move from your home to a protest and back completely anonymously is close to zero without you standing out very quickly. Honestly, do what you want but I’m telling you with a great deal of certainty that the only thing you’re are doing in reality is inviting a greater deal of scrutiny and your security situation is actually worse as a result of it.

ragnot 2 days ago||
I've been following your responses in this thread. I do agree with you but you make it seem that it's almost impossible to blend in now. Based on this, wouldn't it be almost impossible for intelligence agencies to develop human sources in modern countries? They could just trace the case officer back to their home base or just classify them as a spy based on other patterns? Doesn't this mean that human intelligence is practically dead in 1st world countries?
mdhb 2 days ago||
No not at all, it is done completely differently though.

Before when I was talking about the needle in a haystack problem which is the biggest weakness of the modern big data era.

So to give a really concrete example imagine you need to meet a source clandestinely in the past it’s lots of sneaking around doing surveillance detection routes and meeting in hotel rooms and things like that. Those days are completely dead. You stand out immediately.

Instead you’re looking to have very normal and plausible reasons to be in the same space together while remaining in a large crowd and not having contact usually outside of that.

So imagine you and I both get season tickets to the local sports team and we go there to watch a game just as regular fans and we find a way to communicate in that crowd.

Even the best data analysis / ML algorithms are only ever going to see two people going to a sports match every few weeks. There’s nothing interesting about either one of them that stands out.

It’s just a very different way of doing business basically but hopefully that’s an illustrative example to show you what I mean.

rkomorn 3 days ago|||
> track the nasal implant inserted when I was anally probed

That's a reach. Literally.

ThrowMeAway1618 3 days ago||
Those were separate insertions done in parallel.

The aliens are very efficient!

antonvs 3 days ago|||
The trust me bro argument is always a convincing one.

Perhaps if I read you my last comment in a voice lowered a few octaves like in that video, you’d believe me.

boston_clone 3 days ago|||
fwiw, that video does describe a threat model for more casual individuals, but does describe some overall good protections mentioned elsewhere (e.g. lockdown mode). the guest also does tacitly admit that the government is much more like the eye of Sauron, and is a wholly different beast.
boston_clone 3 days ago||||
i’m not sure about this approach - what about in the event of apprehension or some other means of physical access to the device? biometrics can (sometimes) be used even if the authenticator is unconscious.
mdhb 3 days ago||
I’m explicitly making the argument that you should act as though your phone (and any other devices) can and will be searched by someone at the most inconvenient point possible and assume that that search isn’t necessarily tied in any meaningful way to you having your phone on your person and go from there.

Because that 1000% is a real capability you will have to deal with and like sure, do what you can to make the costs associated with that as hard as possible but don’t get confused into thinking it’s a technical solution that is going to fix this problem.

Fully patched iOS in lockdown mode isn’t going to save you from someone physically making you open it in front of them.

Think something a lot closer to this xkcd comic: https://xkcd.com/538/

MandieD 3 days ago|||
Dreh dich nicht um, schau, schau… Der Kommissar geht um, oh oh!

Alles klar, Herr Kommissar?

dredmorbius 3 days ago||||
"Israel targeted top Iranian leaders by hacking, tracing their bodyguards’ phones — report"

<https://www.timesofisrael.com/israel-targeted-top-iranian-le...>

I'm listing the Times of Israel first as it's an Israeli publication, though it cites the following NY Times article which researched the story:

"Targeting Iran’s Leaders, Israel Found a Weak Link: Their Bodyguards"

Despite all the precautions, Israeli jets dropped six bombs on top of the bunker soon after the meeting began, targeting the two entrance and exit doors. Remarkably, nobody in the bunker was killed. When the leaders later made their way out of the bunker, they found the bodies of a few guards, killed by the blasts.

The attack threw Iran’s intelligence apparatus into a tailspin, and soon enough Iranian officials discovered a devastating security lapse: The Israelis had been led to the meeting by hacking the phones of bodyguards who had accompanied the Iranian leaders to the site and waited outside...

<https://www.nytimes.com/2025/08/30/us/politics/israel-iran-a...>

(Archive / paywall: <https://archive.is/XdZet>)

It's not just your phone, it's the phones of those around you. Whether or not you have a security detail.

This is one factor which makes pervasive surveillance so absolutely insidious.

boston_clone 3 days ago|||
I leave mine at home, but you're right; I should also get some counter-facial recognition paint.

However, my endeavor here is more focused on awareness and transparency for the masses than subterfuge for the individual.

notherhack 3 days ago||
The Forbes article says ICE acquired mobile cellular surveillance equipment and services under the Biden administration, and there have been IMSI catchers detected at demonstrations for a long time, for example at the Dakota Access Pipeline demonstrations in November, 2016[1]. It's not a new thing.

[1] https://www.justsecurity.org/34449/investigating-surveillanc...

CommanderData 3 days ago||
Wasn't this thought impossible with LTE, I thought older bands were only susceptible to this attack.
jeroenhd 3 days ago||
Classic 2G stingrays are a lot less complicated, but attempts to secure the IMSI haven't properly been implemented until 5G came around. Even then, the IMSI has been replaced with encryption and temporary identifiers your carrier knows belongs to you, and if law enforcement comes in with a warrant they can get those replacement identifiers from your carrier regardless.

You can't get the IMSIs passively anymore, but LTE doesn't make these attacks impossible, just less practical, especially for criminals that don't have warrants on their side.

NoiseBert69 3 days ago||
They can use standardized lawful interception interfaces to get all this data.

No big need to dig down deep into the radio and protocol layer.

542354234235 2 days ago|||
>In order to maintain an uninterrupted connection to a target’s phone, the Harris software also offers the option of intentionally degrading (or “redirecting”) someone’s phone onto an inferior network, for example, knocking a connection from LTE to 2G. [1]

>In its most basic functionality, the [LTE] IMSI catcher receives connection/attach request messages from all mobiledevices in its vicinity. These attach messages are forced to disclose the SIM’s IMSI, thus allowing the IMSI catcher to retreive the IMSI for all devices in its vicinity... a fully LTE-based IMSI catcher is possible, very simple and very cheap to implement without requiring to jam the LTE and 3G bands to downgrade the service to GSM. [2]

Exploits on 5G to retrieve the IMSI. [3]

[1] https://theintercept.com/2016/09/12/long-secret-stingray-man...

[2] https://arxiv.org/abs/1607.05171

[3] https://arxiv.org/abs/1809.06925

yinznaughty 3 days ago|||
You can collect IMSI passively over LTE: https://github.com/SysSec-KAIST/LTESniffer

You can just jam everyone in the area and see who reconnects.

kotaKat 3 days ago||
Couldn’t I just grab a Baicells eNB off eBay and point it at my own Open5GS installation and passively sniff IMSIs of users scanning around anyways that try to attach and reject? It feels like I could build some kind of “sniffer” fairly easily these days as well.
betaby 3 days ago||
5G standalone is not transmitting IMEI in plain text ever to my knowledge.
boston_clone 3 days ago||
isn't this then ripe for a downgrade attack?
NoiseBert69 3 days ago||
To LTE? Doesn't work there either.

There are IMSI catchers - but they all require GSM. At least on Google Pixels you can turn off 2G with a switch. The phone even shows a message about its insecurity.

In Germany I'm running 100% on LTE/5GNR-only for many months now without having a single coverage gap.

boston_clone 3 days ago||
thank you for the explainer; I do need to research for a more complete understanding of this space.

looks like iPhones will need to enable Lockdown Mode to disable 2G, at least for iOS 17+ per https://ssd.eff.org/module/attending-protest

lrvick 3 days ago||
If your cell phone is connected to cell towers, almost anyone can buy your location.

Only option is stay in airplane mode and use wifi.

pizzly 3 days ago|
Hello WiFi Geolocation technologies. https://en.wikipedia.org/wiki/Wi-Fi_positioning_system
ActorNightly 3 days ago||
"small government"
knodi 3 days ago||
[flagged]
petcat 3 days ago|
Ehh I don't know. They were granted two separate warrants by a judge to use the technology to track down and deport an escaped murderer from Venezuela. I really just don't feel strongly enough about this to care. This is quite a bit more restrained than what the CCP does. But hyperbole, I guess.
chasd00 3 days ago|||
i'm kind of surprised it showed up at all let alone on HN. Search warrants and wiretaps are granted and executed all day every day. Now catching ICE setting up one of these with no warrant would be newsworthy but that pretty much guarantees whatever case they're building gets thrown out the window and worse.
harimau777 3 days ago|||
Sure, but was it a Trump judge? If so, then it doesn't mean much.
M3L0NM4N 3 days ago||
It's still highly targeted, not sweeping surveillance.
trump4eva 3 days ago||
[dead]
kyle_martin1 3 days ago|
[dead]