How StingRay cellphone surveillance devices work

preview_player
Показать описание

Follow us:
Рекомендации по теме
Комментарии
Автор

This is what happens when citizens let a government get too tyrannical and sacrifice freedoms like right to privacy for perceived safety. This is obviously unconstitutional as it is an unreasonable search and seizure without a warrant. I’d like to see some ethical hackers start setting up jammers to ruin these unconstitutional devices.

commonsense
Автор

Big brother is everywhere he's coming to your house soon

ethanhoover
Автор

I don't know why the government is acting like they don't use those devices.. They been using them for many years how do you think they know where a person has been in a high profile case.. The only way to avoid it is turning your phone off or basically just not having a phone with you..

bengreedy
Автор

When my phone switches momentarily to LTE from 5G...

mkgreen
Автор

Why doesn't the government simply just audit the manufacturers to see who they're selling to

jaybartgis
Автор

These scumbags have ruined my life I lost everything because of these murders

matthewlogan
Автор

Hard to track my cellphone's location when I remove the battery, which is its normal condition. When I want to make a call, I just reinstall the battery and have at it.

walterbrown
Автор

My understanding is there are 2 distinct types of devices: 1) *passive* IMSI-catcher and 2) *active* cell-site simulator

DougGrinbergs
Автор

Classic "man in the middle" (MITM) attack whereby you think your device/browser/whatever is connected _directly_ to a provider, but instead you are connected to a "fake" device which in turn IS connected to the legitimate source and just passes the data along. However, the middle device also allows the attacker to eavesdrop on that data and you are none-the-wiser...

BluntForceTrauma
Автор

There is no such thing as a computer hacker who is hard to catch, just undetected hackers. If a stingray is being set up as a tower, that makes it that much easier to detect. Of course you have to have a device to do that. Is that Mitch McConnell??

ThankGodImBlack
Автор

yeah, law enforcement use these devices...

CoverageAwarenessStudio
Автор

Thats what counter surveillance is for. DHHS can find out whos doing it they just dont want to.

cocochanell
Автор

Damn they got me watching a commercial in the beginning and the end now damn.

relaxingtonuniversity
Автор

Have a hacker attached to my phone that doesn't want me asking questions.

meinegeheim
Автор

This is why the government wants to open up Apple encrypted system for iMessage and make it more like android.

Because this stingray tech can only work on SMS and radio signals, where Apple’s iMessage is direct user-to-user interface. They hate that.

ruijua
Автор

"They don't know who or what". What do you mean what? You think the terminator is behind this?

jaybartgis
Автор

The same homeland security with its five eyes released this technology and invested it in multiple stock market companies to get goverment contracts and use with both national and international agencies

JuanDuron-ky
Автор

This has been around the dc area for years.

uindy
Автор

This is interesting! I bet Bobby Ware has one, Tommy Ware, Martha Ware, Cynthia Ware !

deanreich
Автор

But I can detect this use, and I have encounters with individuals using these devices, so what should I do next? Attorney general? Congress reps, governor, senator?

AngelicStorm