But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether theyve ever been used to record the contents of mobile phone communications or to install malware on phones. The marshals' action was extreme, but it fits into a broader pattern of secrecy surrounding stingray surveillance. Harris also makes products like the Harpoon, a signal booster that makes the StingRay more powerful, and the KingFish, a smaller hand-held device that operates like a stingray and can be used by a law enforcement agent while walking around outside a vehicle. Telephony networks are notorious for using ancient, insecure tech that exposes users for decades. The military also uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone. The only option you have for finding out is to contact your phone carrier and ask them, but whether or not youll get a truthful answer depends on the company. Documents obtained this year by the American Civil Liberties Union indicate that Harris has upgraded the StingRay to a newer device it calls a Crossbow, though not a lot of information is known about how it works. If that data or communication is encrypted, then it would be useless to anyone intercepting it if they dont also have a way to decrypt it. To get around this, you can jailbreak or root your phone and install third-party software such as the Xposed Framework to disable 2G connections. use u-check to see what needs to be up dated quickly updates id part of the key. without needing to get a carrier to decrypt it. Let us know if you liked the post. the FBI does not obtain judicial warrants, to find drug dealers, despite their promises, Pass robust state legislation in Massachusetts, Pass local resolutions in towns and cities. Unlike with StingRays and similar devices, protecting yourself against a Hailstorm attack is much more difficult. Otherwise excellent work creating this article thanks. Whats worse is that the StingRay in itself is an outdated technology. in 2015 also indicate such devices do have the ability to record the numbers of incoming and outgoing calls and the date, time, and duration of the calls, as well as to intercept the content of voice and text communications. Any referencing to any news articles involving law enforcement agencies and also civilians being involved with this technology would be interesting if possible. VPN would be a delay tactic at most its not guarantee but it probably will make it harder. Especially places with tourists. Disable 2G On Android To Block Stingray Devices 1) Pull up the phone dialer and dial *#*#4636#*#* (that spells INFO) 2) This brings you to the testing screen, select "Phone/Device information". After the FBI used a stingray to track Rigmaiden (the identity thief in San Jose) in his apartment, Rigmaidens lawyers got the Justice Department to acknowledge it qualified as a Fourth Amendment search that would require a warrant. Versions of the devices used by the military and intelligence agencies can potentially inject malware into targeted phones, depending on how secure the phone is.