Newly Leaked “Stingray” Manual Reveals Details On Surveillance Device

Saturday, September 17, 2016
By Paul Martin

By Derrick Broze
ActivistPost.com
SEPTEMBER 17, 2016

Newly leaked manuals for “Stingray” surveillance provides a fresh look into how law enforcement and government agencies make use of the secretive device.

The Intercept has reported they have obtained several instruction manuals for cell-site simulators, also known as Stingrays. Stingray is the brand name of a popular cell-site simulator manufactured by the Harris Corporation. The Electronic Frontier Foundation describes Stingrays as “a brand name of an IMSI (International Mobile Subscriber Identity) Catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cell phone tower – to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not – and tricks your phone into connecting to it.”

As a result, whoever is in possession of the Stingray can figure out who, when, and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations.

Both the Harris Corp. and the Federal Bureau of Investigations (FBI) require police to sign non-disclosure agreements (NDA) related to the use of the devices. Through these NDAs local police departments have become subordinate to Harris, and even in court cases in front of a judge, are not allowed to speak on the details of their arrangements. Due to this secrecy, very little has been known about how exactly the Stingrays work. The leaked manuals obtained by The Intercept help shine a light in the darkness.

The Rest…HERE

Leave a Reply

Join the revolution in 2018. Revolution Radio is 100% volunteer ran. Any contributions are greatly appreciated. God bless!

Follow us on Twitter