Skip to main content

Stingray phone tracker used to locate man living in country illegally

It’s being reported that agents from Immigration and Customs Enforcement and the FBI have used a Stingray to track an undocumented individual who was living in Michigan. The Electronic Frontier Foundation (EFF) has described this usage of the technology as “novel,” prompting concerns that it could potentially be misused in a way that infringes upon civil liberties.

Stingray has become something of a catch-all terms for cell-site simulators, even though it started out as branding for a particular product developed by the Harris Corporation. It works by fooling phones into thinking it’s a standard cell tower, which causes the devices to share information related to the identity and location of its owner.

Recommended Videos

FBI and ICE operatives used a Stingray device to track the whereabouts of a man from El Salvador who was working at a restaurant in Michigan, according to a report from Engadget. The man had been deported twice in the past, and investigators obtained a warrant before utilizing the hardware, so there’s not much cause for complaint regarding the way this particular investigation played out. However, it does perhaps signal that the Stingray is set to become more widely used across all levels of law enforcement.

Stingrays were originally designed for the military, and then used by federal investigators to track terrorists. Last year, local law enforcement began adopting the technology, a move that was criticized in a report published by the U.S. House of Representatives.

At present, there’s a gray area when it comes to situations where it’s appropriate for law enforcement to utilize a Stingray device. In February 2017, a bill known as the Cell Location Privacy Act was submitted, with the intention of setting a requirement for a probable cause warrant before the hardware could be employed. However, the bill has not been passed as of the time of writing.

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more