Skip to main content may receive compensation from affiliate partners for some links on the site. Read our full Disclosure here.



It’s official everyone…..

The F.B.I. can track your car using a surveillance technology known as “Stingray”. The tech isn’t really new, but the public has only known about it for roughly a decade now.

What’s interesting is that The F.B.I. has now officially gone on record as using it to track and catch someone by tracking a vehicle.

According to reports, they were able to track this particular person in Wisconsin by using the vehicle’s onboard wifi.

This same tech tracks cellphones and other mobile devices, and now that this tech is increasingly in cars, your car will be traceable if it isn’t already.

Let’s do a more in depth look at this tech and what it’s being used for:

Western Journal reports:

The FBI is now using built-in WiFi hotspots in cars to track people as new technologies give the surveillance state more avenues for hunting people down and monitoring their movements.

The technology, which is actually almost two decades old, is called Stingray. It was recently used to find a man in Wisconsin who was wanted on drugs and weapons charges. The technology used to find that man simulates a cell phone tower and is able to trick a mobile phone into giving away its position.

The controversial piece of high-tech equipment also works on now-common vehicular hotspots, which use the same towers as mobile phones to connect people to the internet. 

The Intercept had a very in depth piece on “Stingray” tech:

A stingray masquerades as a cell tower in order to get phones to ping it instead of legitimate cell towers, and in doing so, reveal the phones’ IMSI numbers. In the past, it did this by emitting a signal that was stronger than the signal generated by legitimate cell towers around it.

The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. But a security researcher named Roger Piqueras Jover found that the authentication on 4G doesn’t occur until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it’s not communicating with an authentic cell tower and switches to one that is authenticated.

That vulnerability still exists in the 5G protocol, says Jover. Though the 5G protocol offers a feature that encrypts the IMSI when it’s disclosed during pre-authentication communication, law enforcement would simply be able to ask phone carriers to decrypt it for them. And a group of researchers from Purdue University and the University of Iowa also found a way to guess an IMSI number without needing to get a carrier to decrypt it.


Join the conversation!

Please share your thoughts about this article below. We value your opinions, and would love to see you add to the discussion!

We Love Trump
Thanks for sharing!
Send this to a friend