Search for: "IMSI" Results 101 - 120 of 154
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Mar 2015, 11:58 am by Gritsforbreakfast
Bryan Hughes yesterday filed HB 2263 - a reprise of his HB 1608 last session which garnered 107 joint and coauthors in the House - which would require warrants for law enforcement to access cell phone location data, and there is interest (including among law enforcement interests) in potentially amending the bill language to include Stingrays (a trade name, the technical term is "IMSI catchers") before everything is said and done.There's nothing wrong with law enforcement… [read post]
18 Jun 2020, 11:34 am by Dave Maass
Also known as IMSI catchers, these devices pretend to be cell phone towers in order to trick phones into connecting to them. [read post]
2 Apr 2015, 9:06 am by Matthew Harwood
When the judge took the unprecedented step of requiring state prosecutors to demonstrate exactly how a stingray (also called cell site simulators, dirtboxes, and IMSI catchers) worked, they offered McKenzie a deal he couldn’t refuse to avoid disclosing information about the device. [read post]
6 May 2024, 2:54 pm by Matthew Guariglia
Also known as Stingrays or IMSI catchers, CSS are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. [read post]
8 Jun 2018, 3:00 am by Christopher Tyner
  The Washington Post reported late last week the Department of Homeland Security has discovered potentially widespread deployment of IMSI catchers, also known as Stingrays, near the White House and in other sensitive locations in Washington. [read post]
26 Mar 2007, 11:53 am
The CellDEK software automatically performs forensic extraction of the following data: Handset Time and Date, Serial Numbers (IMEI, IMSI), Dialed Calls, Received Calls, Phonebook (both handset and SIM), SMS (both handset and SIM), Deleted SMS from SIM, Calendar, Memos, To Do Lists, Pictures, Video, and Audio. [read post]
29 Feb 2016, 4:00 am by Administrator
… DroitDu.netLes Stingrays, l’outil de surveillance à la James Bond Les cell-site simulators (IMSI) appelés “Stingrays” sont des appareils de surveillance hautement sophistiqués. [read post]
4 Aug 2011, 11:13 am by Kim Zetter
Army target drone into their personal remote-controlled spy plane, complete with Wi-Fi and hacking tools, such as an IMSI catcher and antenna to spoof a GSM cell tower and intercept calls. [read post]
4 Feb 2015, 5:10 am by Martin Steiger
In diesem Rahmen sind unter anderem die Legalisierung von Bundestrojanern und IMSI-Catchern, eine Verdoppelung der Vorratsdatenspeicherung und «Kabelaufklärung» im Stil der amerikanischen Nachrichtendienste vorgesehen. [read post]
2 Feb 2021, 7:11 pm by Katitza Rodriguez
This post is the third in a series about our new State of Communications Privacy Laws report, a set of questions and answers about privacy and data protection in Argentina, Brazil, Chile, Colombia, Mexico, Paraguay, Panama, Peru, and Spain. [read post]
7 Apr 2020, 10:54 am by Alan Z. Rozenshtein
By contrast, if the government were to track people’s movement by directly surveilling cellphones—for example, though IMSI (international mobile subscriber identity) catchers, which mimic cell towers—that might violate a person’s reasonable expectation of privacy. [read post]
13 Sep 2023, 10:16 am by Cooper Quintin
Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware. [read post]
14 Apr 2016, 6:02 am by Daniel Severson
The bill contains many investigative powers, including authorizations to conduct searches of homes at night under certain conditions, to use IMSI-catchers to eavesdrop on mobile phone traffic, to impose administrative measures (including house arrests) for persons who return to France and are suspected of joining or attempting to join terrorist theaters of operation, and to strengthen counterterrorism finance measures. [read post]
3 Sep 2015, 8:15 am by Dave Maass
Stingrays IMSI catchers—which go by brand names like “Stingrays” or “DRTBoxes—are devices that mimic cell phone towers in order to determine a cell phone’s location. [read post]
4 Jun 2020, 12:05 pm by Andrés Arrieta
These aren’t encrypted and, along with your location, can be seen by your service provider and be intercepted with the use of IMSI catchers. [read post]
19 Mar 2018, 12:30 pm by Lindsay Oliver
LPL has done incredible work via the open records process to expose the use of cell-site simulators (sometimes referred to as “Stingrays” or IMSI Catchers) by the Chicago Police Department. [read post]
22 Jul 2022, 9:28 am by Beryl Lipton
Cell-site simulators (often referred to as IMSI catchers or stingrays) are an extra-sneaky and privacy-invasive type of police tech. [read post]
30 Dec 2018, 9:35 am by Katitza Rodriguez
The report found the government of the Patriot Party (Partido Patriota) spent more than 90 million quetzales (US $12 million) on IMSI-catchers and software to monitor and collect social media information for investigations and surveillance. [read post]
17 Mar 2015, 1:53 pm by Dave Maass
” Most Egregious Nationwide Conspiracy to Hide Surveillance Technologies Federal and local law enforcement agencies across the United States We received scores of nominations regarding law enforcement use of “Stingrays,” also known as IMSI catchers, devices that emulate cell towers to track mobile phone users. [read post]
30 Dec 2018, 9:35 am by Katitza Rodriguez
The report found the government of the Patriot Party (Partido Patriota) spent more than 90 million quetzales (US $12 million) on IMSI-catchers and software to monitor and collect social media information for investigations and surveillance. [read post]