It’s official everyone…..
The F.B.I. can track your car using a surveillance technology known as “Stingray”. The tech isn’t really new, but the public has only known about it for roughly a decade now.
What’s interesting is that The F.B.I. has now officially gone on record as using it to track and catch someone by tracking a vehicle.
According to reports, they were able to track this particular person in Wisconsin by using the vehicle’s onboard wifi.
This same tech tracks cellphones and other mobile devices, and now that this tech is increasingly in cars, your car will be traceable if it isn’t already.
Let’s do a more in depth look at this tech and what it’s being used for:
stingray devices could disable the cellular function on systems like onstar that are used to detect crashes and send requests for help
this is not just a privacy violation, it is also a safety violation https://t.co/d9LNwFkeWc
— DilDog (@dildog) July 23, 2021
The police are secretly using fake cellphone towers called 'Sting Ray' to spy on people.
I've known this, since the 1990s
— William Paulsen (@wpaulsen31) June 14, 2018
Western Journal reports:
The FBI is now using built-in WiFi hotspots in cars to track people as new technologies give the surveillance state more avenues for hunting people down and monitoring their movements.
The technology, which is actually almost two decades old, is called Stingray. It was recently used to find a man in Wisconsin who was wanted on drugs and weapons charges. The technology used to find that man simulates a cell phone tower and is able to trick a mobile phone into giving away its position.
The controversial piece of high-tech equipment also works on now-common vehicular hotspots, which use the same towers as mobile phones to connect people to the internet.
Our Government had private developers create devices that act like real cell towers. These tower's intercept cell signals, And in seconds can scan your text, photos, redirect calls or send them to the real towers..in seconds! Google FBI "Stingray", OR " Triggerfish" get the facts pic.twitter.com/RlZFs2MIjG
— Leonard hougham (@LeonardHougham) July 20, 2021
The Intercept had a very in depth piece on “Stingray” tech:
A stingray masquerades as a cell tower in order to get phones to ping it instead of legitimate cell towers, and in doing so, reveal the phones’ IMSI numbers. In the past, it did this by emitting a signal that was stronger than the signal generated by legitimate cell towers around it.
The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. But a security researcher named Roger Piqueras Jover found that the authentication on 4G doesn’t occur until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it’s not communicating with an authentic cell tower and switches to one that is authenticated.
That vulnerability still exists in the 5G protocol, says Jover. Though the 5G protocol offers a feature that encrypts the IMSI when it’s disclosed during pre-authentication communication, law enforcement would simply be able to ask phone carriers to decrypt it for them. And a group of researchers from Purdue University and the University of Iowa also found a way to guess an IMSI number without needing to get a carrier to decrypt it.