Daily Local News (West Chester, PA)

U.S. suspects cellphone spying devices in D.C.

- By Frank Bajak AP Technology Writer

For the first time, the U.S. government has publicly acknowledg­ed the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.

The use of what are known as cellphone-site simulators by foreign powers has long been a concern, but American intelligen­ce and law enforcemen­t agencies — which use such eavesdropp­ing equipment themselves — have been silent on the issue until now.

In a March 26 letter to Oregon Sen. Ron Wyden, the Department of Homeland Security acknowledg­ed that last year it identified suspected unauthoriz­ed cell-site simulators in the nation’s capital. The agency said it had not determined the type of devices in use or who might have been operating them. Nor did it say how many it detected or where.

The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police department­s. The Federal Communicat­ions Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly.

The devices work by tricking mobile devices into locking onto them instead of legitimate cell towers, revealing the exact location of a particular cellphone. More sophistica­ted versions can eavesdrop on calls by forcing phones to step down to older, unencrypte­d 2G wireless technology. Some attempt to plant malware.

They can cost anywhere from $1,000 to about $200,000. They are commonly the size of a briefcase; some are as small as a cellphone. They can be placed in a car next to a government building. The most powerful can be deployed in low-flying aircraft.

Thousands of members of the military, the NSA, the CIA, the FBI and the rest of the national-security apparatus live and work in the Washington area. The surveillan­ce-savvy among them encrypt their phone and data communicat­ions and employ electronic countermea­sures. But unsuspecti­ng citizens could fall prey.

Wyden, a Democrat, wrote DHS in November requesting informatio­n about unauthoriz­ed use of the cell-site simulators.

The reply from DHS official Christophe­r Krebs noted that DHS had observed “anomalous activity” consistent with Stingrays in the Washington area. A DHS official who spoke on condition of anonymity because the letter has not been publicly released added that the devices were detected in a 90-day trial that began in January 2017 with equipment from a Las Vegas-based DHS contractor, ESD America .

Krebs, the top official in the department’s National Protection and Programs Directorat­e, noted in the letter that DHS lacks the equipment and funding to detect Stingrays even though their use by foreign government­s “may threaten U.S. national and economic security.” The department did report its findings to “federal partners” Krebs did not name. That presumably includes the FBI.

The CEO of ESD America, Les Goldsmith, said his company has a relationsh­ip with DHS but would not comment further.

Legislator­s have been raising alarms about the use of Stingrays in the capital since at least 2014, when Goldsmith and other security-company researcher­s conducted public sweeps that located suspected unauthoriz­ed devices near the White House, the Supreme Court, the Commerce Department and the Pentagon, among other locations.

The executive branch, however, has shied away from even discussing the subject.

Aaron Turner, president of the mobile security consultanc­y Integricel­l, was among the experts who conducted the 2014 sweeps, in part to try to drum up business. Little has changed since, he said.

Like other major world capitals, he said, Washington is awash in unauthoriz­ed intercepti­on devices. Foreign embassies have free rein because they are on sovereign soil.

Every embassy “worth their salt” has a cell tower simulator installed, Turner said. They use them “to track interestin­g people that come toward their embassies.” The Russians’ equipment is so powerful it can track targets a mile away, he said.

Shutting down rogue Stingrays is an expensive propositio­n that would require wireless network upgrades the industry has been loath to pay for, security experts say. It could also lead to conflict with U.S. intelligen­ce and law enforcemen­t.

In addition to federal agencies, police department­s use them in at least 25 states and the District of Columbia, according to the American Civil Liberties Union.

Wyden said in a statement Tuesday that “leaving security to the phone companies has proven to be disastrous.” He added that the FCC has refused to hold the industry accountabl­e “despite repeated warnings and clear evidence that our phone networks are being exploited by foreign government­s and hackers.”

After the 2014 news reports about Stingrays in Washington, Rep. Alan Grayson, D-Fla, wrote the FCC in alarm. In a reply, then-FCC chairman Tom Wheeler said the agency had created a task force to combat illicit and unauthoriz­ed use of the devices. In that letter, the FCC did not say it had identified such use itself, but cited media reports of the security sweeps.

 ?? THE ASSOCIATED PRESS ?? This undated file photo provided by the U.S. Patent and Trademark Office shows the StingRay II, a cellular site simulator used for surveillan­ce purposes manufactur­ed by Harris Corporatio­n, of Melbourne, Fla.
THE ASSOCIATED PRESS This undated file photo provided by the U.S. Patent and Trademark Office shows the StingRay II, a cellular site simulator used for surveillan­ce purposes manufactur­ed by Harris Corporatio­n, of Melbourne, Fla.

Newspapers in English

Newspapers from United States