{"id":1050,"date":"2021-04-20T12:46:21","date_gmt":"2021-04-20T06:46:21","guid":{"rendered":"https:\/\/jobanmagazine.com\/globaledition\/?p=1050"},"modified":"2021-04-20T13:00:41","modified_gmt":"2021-04-20T07:00:41","slug":"how-cops-can-secretly-track-your-phone","status":"publish","type":"post","link":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/","title":{"rendered":"How Cops can secretly track your phone?"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>\u00a0\u200d<\/strong>Since May (2020), AS\u00a0protesters around the country have marched against police brutality and in support of the Black Lives Matter movement, activists have spotted a recurring presence in the skies: mysterious\u00a0<a href=\"https:\/\/theintercept.com\/2020\/07\/23\/air-force-surveillance-plane-portland-protests\/\">planes<\/a>\u00a0and helicopters hovering overhead, apparently conducting surveillance on protesters.\u00a0A press release from the Justice Department at the end of May revealed that the Drug Enforcement Agency and U.S. Marshals Service were asked by the Justice Department to\u00a0provide unspecified support to law enforcement\u00a0during protests. A few days later, a\u00a0<a href=\"https:\/\/www.buzzfeednews.com\/article\/jasonleopold\/george-floyd-police-brutality-protests-government\">memo<\/a>\u00a0obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement.<\/p>\n<p style=\"text-align: justify;\">Although the press release and memo didn\u2019t\u00a0say\u00a0what form the support and surveillance would take, it\u2019s likely that the two agencies were being asked to assist police for a particular reason. Both the DEA and the Marshals possess airplanes outfitted with so-called stingrays or dirtboxes: powerful technologies capable of tracking mobile phones or, depending on how they\u2019re configured, collecting data and communications from mobile phones in bulk.<\/p>\n<p style=\"text-align: justify;\">Stingrays have been used on the ground and in the air by law enforcement for years but are highly controversial because they don\u2019t just collect data from targeted phones; they collect data from any phone in the vicinity of a device. That data can be used to identify people \u2014 protesters, for example \u2014 and track their movements during and after demonstrations, as well as to identify others who associate with them. They also can inject spying software onto specific phones or direct the browser of a phone to a website where malware can be loaded onto it, though it\u2019s not clear if any U.S. law enforcement agencies have used them for this purpose.<\/p>\n<p style=\"text-align: justify;\">Although law enforcement has been using the technologies since the 1990s, the general public learned about them only in the last decade, and much about their capabilities remains unknown because law enforcement agencies and the companies that make the devices have gone to great lengths to keep details secret. Stingrays are routinely used to target suspects in drug and other criminal investigations, but activists also believe the devices were used during\u00a0<a href=\"https:\/\/www.kgw.com\/article\/news\/nd-pipeline-protesters-question-aircraft-surveillance-jamming\/283-345780315\">protests against the Dakota Access pipeline<\/a>, and against Black Lives Matter protesters over the last three months. The Justice Department requires federal agents to obtain a probable cause warrant to use the technology in criminal cases, but there is a\u00a0<a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/09\/finally-doj-reverses-course-and-will-get-warrants-stingrays\">carve-out for national security<\/a>. Given that President Donald Trump has referred to protesters as \u201c<a href=\"https:\/\/www.cnn.com\/2020\/07\/25\/politics\/us-protests-trump-terrorists-intl\/index.html\">terrorists<\/a>,\u201d and that paramilitary-style officers from the Department of Homeland Security have been deployed to the streets of\u00a0<a href=\"https:\/\/theintercept.com\/2020\/07\/24\/portland-federal-police-protests\/\">Portland<\/a>, Oregon, it\u2019s conceivable that surveillance conducted at recent demonstrations has been deemed a national security matter \u2014 raising the possibility that the government may have used stingray technology to\u00a0<a href=\"https:\/\/theintercept.com\/2020\/06\/24\/fbi-surveillance-social-media-cellphone-dataminr-venntel\/\">collect data on protesters<\/a>\u00a0without warrants.<\/p>\n<p style=\"text-align: justify;\">To better understand the kind of surveillance that may be directed at protesters, here\u2019s a breakdown of what we know and still don\u2019t know about stingrays, and why their use is so controversial.<\/p>\n<p style=\"text-align: justify;\"><strong>What is a stingray?<\/strong><\/p>\n<p style=\"text-align: justify;\">Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are \u201ccell-site simulator\u201d and \u201cIMSI catcher.\u201d<\/p>\n<p style=\"text-align: justify;\"><strong>Why is it called a stingray?<\/strong><\/p>\n<p style=\"text-align: justify;\">The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. That company\u2019s StingRay is a briefcase-sized device that can be operated from a vehicle while plugged into the cigarette lighter. Harris also makes products like the Harpoon, a signal booster that makes the StingRay more powerful, and the KingFish, a smaller hand-held device that operates like a stingray and can be used by a law enforcement agent while walking around outside a vehicle. About a dozen other companies make variants of the stingray with different capabilities. The surveillance equipment is pricey and often sold as a package. For example, in documents obtained by Motherboard in 2016, Harris offered a\u00a0<a href=\"https:\/\/www.vice.com\/en_us\/article\/gv5k3x\/heres-how-much-a-stingray-cell-phone-surveillance-tool-costs\">KingFish package that cost $157,300<\/a>\u00a0and a StingRay package that cost $148,000, not including training and maintenance. Documents obtained this year by the American Civil Liberties Union indicate that Harris has upgraded the StingRay to a newer device it calls a\u00a0<a href=\"https:\/\/www.aclu.org\/sites\/all\/libraries\/pdf.js\/web\/viewer.html?file=https%3A%2F%2Fwww.aclu.org%2Fsites%2Fdefault%2Ffiles%2Ffield_document%2F1-282_-_1_-_march_2020_release_.pdf#page=67\">Crossbow<\/a>, though\u00a0<a href=\"https:\/\/www.vice.com\/en_us\/article\/jgxm3g\/crossbow-imsi-catcher-new-stingray\">not a lot of information<\/a>\u00a0is known about how it works. Separately, a\u00a0<a href=\"https:\/\/theintercept.com\/document\/2015\/12\/16\/government-cellphone-surveillance-catalogue\/\">classified catalog of surveillance tools<\/a>\u00a0leaked to The Intercept in 2015 describes other similar devices.<\/p>\n<h3 style=\"text-align: justify;\">How does the stingray work?<\/h3>\n<p style=\"text-align: justify;\">Phones periodically and automatically broadcast their presence to the cell tower that is nearest to them, so that the phone carrier\u2019s network can provide them with service in that location. They do this even when the phone is not being used to make or receive a call. When a phone communicates with a cell tower, it reveals the unique ID or IMSI number (International Mobile Subscriber Identity) associated with the SIM card in the phone. The IMSI number identifies that phone and its owner as a paying customer of a cell carrier, and that number can be matched by the carrier to the owner\u2019s name, address, and phone number.<\/p>\n<p style=\"text-align: justify;\">A stingray masquerades as a cell tower in order to get phones to ping it instead of legitimate cell towers, and in doing so, reveal the phones\u2019 IMSI numbers. In the past, it did this by emitting a signal that was stronger than the signal generated by legitimate cell towers around it. The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. But a security researcher named Roger Piqueras Jover found that the\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1607.05171\">authentication on 4G doesn\u2019t occur<\/a>\u00a0until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it\u2019s not communicating with an authentic cell tower and switches to one that is authenticated. That vulnerability\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1809.06925\">still exists in the 5G protocol<\/a>, says Jover. Though the 5G protocol offers a feature that encrypts the IMSI when it\u2019s disclosed during pre-authentication communication, law enforcement would simply be able to ask phone carriers to decrypt it for them. And a group of researchers from Purdue University and the University of Iowa also found a way to\u00a0<a href=\"https:\/\/homepage.divms.uiowa.edu\/~comarhaider\/publications\/LTE-torpedo-NDSS19.pdf\">guess an IMSI number<\/a>\u00a0without needing to get a carrier to decrypt it.<\/p>\n<p style=\"text-align: justify;\">Because a stingray is not really a tower on the carrier\u2019s network, calls and messages to and from a phone can\u2019t go through while the phone is communicating with the stingray. So after the stingray captures the device\u2019s IMSI number and location, the stingray \u201creleases\u201d the phone so that it can connect to a real cell tower. It can do this by broadcasting a message to that phone that effectively tells the phone to find a different tower.<\/p>\n<h3 style=\"text-align: justify;\">What can law enforcement do with the IMSI number?<\/h3>\n<p style=\"text-align: justify;\">Law enforcement can use a stingray either to identify all of the phones in the vicinity of the stingray or a specific phone, even when the phones are not in use. Law enforcement can then, with a subpoena, ask a phone carrier to provide the customer name and address associated with that number or numbers. They can also obtain a historical log of all of the cell towers a phone has pinged in the recent past to track where it has been, or they can obtain the cell towers it\u2019s pinging in real time to identify the user\u2019s current location. By catching multiple IMSI numbers in the vicinity of a stingray, law enforcement can also potentially uncover associations between people by seeing which phones ping the same cell towers around the same time.<\/p>\n<p style=\"text-align: justify;\">If law enforcement already knows the IMSI number of a specific phone and person they are trying to locate, they can program that IMSI number into the stingray and it will tell them if that phone is nearby. Law enforcement can also home in on the location of a specific phone and its user by moving the stingray around a geographical area and measuring the phone\u2019s signal strength as it connects to the stingray. The Harris StingRay can be operated from a patrol vehicle as it drives around a neighborhood to narrow a suspect\u2019s location to a specific cluster of homes or a building, at which point law enforcement can switch to the hand-held KingFish, which offers even more precision. For example, once law enforcement has narrowed the location of a phone and suspect to an office or apartment complex using the StingRay, they can walk through the complex and hallways using the KingFish to find the specific office or apartment where a mobile phone and its user are located.<\/p>\n<h3 style=\"text-align: justify;\">Does the device only\u00a0track\u00a0mobile phones?<\/h3>\n<p style=\"text-align: justify;\">No. In 2008, authorities used a StingRay and a KingFish to locate a suspect who was using an air card: an internet-connectivity device that plugs into a computer and allows the user to get online through a wireless cellular network. The suspect,\u00a0<a href=\"https:\/\/www.theverge.com\/2016\/1\/13\/10758380\/stingray-surveillance-device-daniel-rigmaiden-case\">Daniel Rigmaiden<\/a>, was an identity thief who was operating from an apartment in San Jose, California. Rigmaiden had\u00a0<a href=\"https:\/\/www.wired.com\/2013\/04\/verizon-rigmaiden-aircard\/\">used a stolen credit card number<\/a>\u00a0and a fake name and address to register his internet account with Verizon. With Verizon\u2019s help, the FBI was able to identify him. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. They then walked around the apartment complex with a hand-held KingFish or similar device to pinpoint the precise apartment Rigmaiden was using.<\/p>\n<h3 style=\"text-align: justify;\">What is a dirtbox?<\/h3>\n<p style=\"text-align: justify;\">A dirtbox is the common name for specific models of an IMSI catcher that are made by a Boeing subsidiary, Maryland-based Digital Receiver Technology \u2014 hence the name \u201cDRT box.\u201d They are reportedly used by the DEA and Marshals Service from airplanes to intercept data from mobile phones. A 2014\u00a0Wall Street Journal article\u00a0<a href=\"https:\/\/www.wsj.com\/articles\/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533\">revealed<\/a>\u00a0that the Marshals Service began using dirtboxes in Cessna airplanes in 2007. An airborne dirtbox has the ability to collect data on many more phones than a ground-based stingray; it can also move more easily and quickly over wide areas. According to the\u00a0<a href=\"https:\/\/theintercept.com\/document\/2015\/12\/16\/government-cellphone-surveillance-catalogue\/\">2006 catalog of surveillance technologies<\/a>\u00a0leaked in 2015, models of dirtboxes described in that document can be configured to track up to 10,000 targeted IMSI numbers or phones.<\/p>\n<h3 style=\"text-align: justify;\">Do stingrays and dirtboxes have other capabilities?<\/h3>\n<p style=\"text-align: justify;\">Stingrays and dirtboxes can be configured for use in either active or passive mode. In active mode, these technologies broadcast to devices and communicate with them. Passive mode involves grabbing whatever data and communication is occurring in real time across cellular networks without requiring the phone to communicate directly with the interception device. The data captured can include the IMSI number as well as text messages, email, and voice calls.<\/p>\n<p style=\"text-align: justify;\">If that data or communication is encrypted, then it would be useless to anyone intercepting it if they don\u2019t also have a way to\u00a0 decrypt it. Phones that are using 4G employ strong encryption. But stingrays can force phones to downgrade to 2G, a less secure protocol, and tell the phone to use either no encryption or use a weak encryption that can be cracked. They can do this because even though most people use 4G these days, there are some areas of the world where 2G networks are still common, and therefore all phones have to have the ability to communicate on those networks.<\/p>\n<p style=\"text-align: justify;\">The versions of stingrays used by the military can intercept the contents of mobile communications \u2014 text messages, email, and voice calls \u2014 and decrypt some types of this mobile communication. The military also uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone.<\/p>\n<p style=\"text-align: justify;\">In addition to collecting the IMSI number of a device and intercepting communications, military-grade IMSI catchers can also spoof text messages to a phone, according to David Burgess, a telecommunications engineer who used to work with U.S. defense contractors supporting overseas military operations. Burgess says that if the military knows the phone number and IMSI number of a target, it can use an IMSI catcher to send messages to other phones as if they are coming from the target\u2019s phone. They can also use the IMSI catcher for a so-called man in the middle attack so that calls from one target pass through the IMSI catcher to the target phone. In this way, they can record the call in real time and potentially listen to the conversation if it is unencrypted, or if they are able to decrypt it. The military systems can also send a silent SMS message to a phone to alter its settings so that the phone will send text messages through a server the military controls instead of the mobile carrier\u2019s server.<\/p>\n<h3 style=\"text-align: justify;\">Can the devices be used to infect phones with malware?<\/h3>\n<p style=\"text-align: justify;\">Versions of the devices used by the military and intelligence agencies can potentially inject malware into targeted phones, depending on how secure the phone is. They can do this in two ways: They can either redirect the phone\u2019s browser to a malicious web site where malware can be downloaded to the phone if the browser has a software vulnerability the attackers can exploit; or they can inject malware from the stingray directly into the baseband of the phone if the baseband software has a vulnerability. Malware injected into the baseband of a phone is harder to detect. Such malware can be used to turn the phone into a listening device to spy on conversations. Recently, Amnesty International reported on the cases of two Moroccan activists whose phones\u00a0<a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2020\/06\/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools\/\">may have been targeted through such network injection attacks<\/a>\u00a0to install spyware made by an Israeli company.<\/p>\n<p style=\"text-align: justify;\">U.S. law enforcement use of stingrays domestically is more curtailed, given that they, unlike the military, need to obtain warrants or court orders to use the devices in federal investigations. But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether they\u2019ve ever been used to record the contents of mobile phone communications or to install malware on phones.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.wsj.com\/articles\/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533\">News stories<\/a>\u00a0suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they don\u2019t say how the devices do this.\u00a0Documents<a href=\"https:\/\/www.wired.com\/2015\/10\/stingray-government-spy-tools-can-record-calls-new-documents-confirm\/\">\u00a0obtained by the ACLU<\/a>\u00a0in 2015 also indicate such devices do have the ability to record the numbers of incoming and outgoing calls and the date, time, and duration of the calls, as well as to intercept the content of voice and text communications. But the Justice Department has long asserted publicly that the stingrays it uses domestically\u00a0<a href=\"http:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-enhanced-policy-use-cell-site-simulators\">do not intercept the content of communications<\/a>. The Justice Department has stated that the devices \u201cmay be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order.\u201d<\/p>\n<p style=\"text-align: justify;\">As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016\u00a0<a href=\"https:\/\/www.kgw.com\/article\/news\/nd-pipeline-protesters-question-aircraft-surveillance-jamming\/283-345780315\">described planes and helicopters flying overhead<\/a>\u00a0that they believed were using technology to jam mobile phones. Protesters described having problems such as phones crashing, livestreams being interrupted, and\u00a0issues uploading videos and other posts to social media.<\/p>\n<h3 style=\"text-align: justify;\">Why are stingrays and dirtboxes so controversial?<\/h3>\n<p style=\"text-align: justify;\">The devices don\u2019t just pick up data about targeted phones. Law enforcement may be tracking a specific phone of a known suspect, but any phone in the vicinity of the stingray that is using the same cellular network as the targeted phone or device will connect to the stingray. Documents in a 2011 criminal case in Canada showed that devices used by the Royal Canadian Mounted Police had a range of a third of a mile, and in just three minutes of use, one device had intercepted\u00a0<a href=\"https:\/\/web.archive.org\/web\/20160419030412\/https:\/www.theglobeandmail.com\/news\/national\/rcmp-listening-tool-capable-of-knocking-out-911-calls-memo-reveals\/article29672075\/\">136 different phones<\/a>.<\/p>\n<p style=\"text-align: justify;\">Law enforcement can also use a stingray in a less targeted way to sweep up information about all nearby phones. During the time a phone is connecting to or communicating with a stingray, service is disrupted for those phones until the stingray releases them. The connection should last only as long as it takes for the phone to reveal its IMSI number to the stingray, but it\u2019s not clear what kind of testing and oversight the Justice Department has done to ensure that the devices release phones. Stingrays are supposed to allow 911 calls to pass through to a legitimate cell tower to avoid disrupting emergency services, but other emergency calls a user may try to make while their phone is connected to a stingray will not get through until the stingray releases their phone. It\u2019s also not clear how effective the devices are at letting 911 calls go through. The FBI and DHS have indicated that they\u00a0<a href=\"https:\/\/docs.fcc.gov\/public\/attachments\/DOC-355228A2.pdf\">haven\u2019t commissioned studies<\/a>\u00a0to measure this, but a study conducted by federal police in Canada found that the 911 bypass didn\u2019t always work.<\/p>\n<p style=\"text-align: justify;\">Depending on how many phones are in the vicinity of a stingray, hundreds could connect to the device and potentially have service disrupted.<\/p>\n<h3 style=\"text-align: justify;\">How long has law enforcement been using stingrays?<\/h3>\n<p style=\"text-align: justify;\">The technology is believed to have originated in the military, though it\u2019s not clear when it was first used in combat zones or domestically in the U.S. The earliest public mention of a stingray-like device being used by U.S. law enforcement occurred in 1994, when the FBI used a crude, jury-rigged version of the tool to<a href=\"https:\/\/www.wired.com\/1996\/02\/catching\/\">\u00a0track former hacker Kevin Mitnick<\/a>; authorities\u00a0referred to that device as a Triggerfish. In a case in Utah in 2009, an FBI agent revealed in a court document that cell-site simulators had been in use by law enforcement for more than a decade. He also said they weren\u2019t just used by the FBI but also by the Marshals Service, the Secret Service, and other agencies. Recent documents obtained by the ACLU also indicate that between 2017 and 2019, the Department of Homeland Security\u2019s Homeland Security Investigations unit has\u00a0<a href=\"https:\/\/www.aclu.org\/news\/immigrants-rights\/ice-records-confirm-that-immigration-enforcement-agencies-are-using-invasive-cell-phone-surveillance-devices\/\">used stingrays at least 466 times<\/a>\u00a0in investigations. BuzzFeed News had previously obtained records showing that from 2013 to 2017, HSI had used the technology\u00a0<a href=\"https:\/\/www.buzzfeednews.com\/article\/adolfoflores\/this-is-how-many-times-the-department-of-homeland-security\">1,885 times<\/a>.<\/p>\n<h3 style=\"text-align: justify;\">Aside from the potential for widespread surveillance, are there other problems with the technology?<\/h3>\n<p style=\"text-align: justify;\">The other controversy with stingrays involves secrecy and lack of transparency around their use. Law enforcement agencies and the companies that make the devices have prevented the public from obtaining information about their capabilities and from learning how often the technology is deployed in investigations. Agencies sign nondisclosure agreements with the companies, which they use as a shield whenever journalists or others file public records requests to obtain information about the technology. Law enforcement agencies claim criminals could craft anti-surveillance methods to undermine the technology if they knew how it worked. The companies themselves cite trade secrets and proprietary information to prevent the public from obtaining sales literature and manuals about the technology.<\/p>\n<p style=\"text-align: justify;\">For years, law enforcement used the devices without obtaining a court order or warrant. Even when they did seek approval from a court, they often described the technology in misleading terms to make it seem less invasive. They would often refer to stingrays in court documents as a \u201cpen register device,\u201d passive devices that sit on a network and record the numbers dialed from a certain phone number. They withheld the fact that the devices force phones to connect to them, that they force other phones that aren\u2019t the target device to connect to them, and that they can perform more functions than simply grabbing an IMSI number. Most significantly, they withheld the fact that the device emits signals that can track a user and their phone inside a private residence. After the FBI used a stingray to track Rigmaiden (the identity thief in San Jose) in his apartment, Rigmaiden\u2019s lawyers got the Justice Department to\u00a0<a href=\"https:\/\/www.wired.com\/2011\/11\/feds-fake-cell-phone-tower\/\">acknowledge it qualified as a Fourth Amendment search<\/a>\u00a0that would require a warrant.<\/p>\n<p style=\"text-align: justify;\">Law enforcement agents have not only deceived judges, however; they\u2019ve also misled defense attorneys seeking information about how agents tracked their clients. In some court documents, law enforcement officials have indicated that they obtained location information about the defendant from a \u201c<a href=\"https:\/\/www.aclu.org\/blog\/free-future\/aclu-obtained-documents-reveal-breadth-secretive-stingray-use-florida\">confidential source<\/a>,\u201d when in truth they used a stingray to track them.<\/p>\n<p style=\"text-align: justify;\">To address this deception, the Justice Department in 2015 implemented a new policy requiring all federal agents engaged in criminal investigations to obtain a probable cause search warrant before using a stingray. It also requires agents and prosecutors to tell judges when the warrant they are seeking is for a stingray; and it requires them to limit the use of the stingray\u2019s capabilities to tracking the location of a phone and logging the phone numbers for calls received and made by the phone. They cannot collect the contents of communication, such as text messages and emails. And agents are required to purge the data they collect from non-targeted phones within 24 hours or 30 days, depending on the circumstances.<\/p>\n<p style=\"text-align: justify;\">The problem, however, is that Justice Department policy is not law. And although the policy includes state and local law enforcement agencies when they are working on a case with federal agents and want to use the devices, it does not cover those agencies\u00a0<a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/09\/finally-doj-reverses-course-and-will-get-warrants-stingrays\">when they are working on cases alone<\/a>. To address this loophole, lawmakers would need to pass a federal law banning the use of stingrays without a warrant, but\u00a0<a href=\"https:\/\/www.wired.com\/2015\/11\/new-bill-would-force-cops-to-get-warrants-before-spying-with-stingrays\/\">efforts to do so<\/a>\u00a0have so far been unsuccessful.<\/p>\n<p style=\"text-align: justify;\">One bigger issue with the Justice Department policy is that, as noted above, it only applies to criminal investigations, not national security ones, and it also includes a carve-out for \u201cexigent circumstances\u201d that are not clearly defined. Federal agents are not required to seek a warrant to use the technology in cases involving such circumstances. Whether the government has used the technology against Black Lives Matter protesters without a warrant is likely something that will remain a secret for some time.<\/p>\n<p>Source: <a href=\"https:\/\/theintercept.com\/2020\/07\/31\/protests-surveillance-stingrays-dirtboxes-phone-tracking\/\">The Intercept<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u200dSince May (2020), AS\u00a0protesters around the country have marched against police brutality and in support of the Black Lives Matter [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":62,"featured_media":1053,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[56,16,55],"tags":[],"class_list":["post-1050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-featured","category-technology","odd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Cops can secretly track your phone? - Joban Global Edition<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Cops can secretly track your phone? - Joban Global Edition\" \/>\n<meta property=\"og:description\" content=\"\u00a0\u200dSince May (2020), AS\u00a0protesters around the country have marched against police brutality and in support of the Black Lives Matter [...]Read More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\" \/>\n<meta property=\"og:site_name\" content=\"Joban Global Edition\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-20T06:46:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-20T07:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/singray-theintercept-SH-25.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kim Zetter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kim Zetter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\"},\"author\":{\"name\":\"Kim Zetter\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/f2026ec0029f06ce487cbfc6299acf15\"},\"headline\":\"How Cops can secretly track your phone?\",\"datePublished\":\"2021-04-20T06:46:21+00:00\",\"dateModified\":\"2021-04-20T07:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\"},\"wordCount\":3757,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#organization\"},\"articleSection\":[\"Cyber Security\",\"Featured\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\",\"name\":\"How Cops can secretly track your phone? - Joban Global Edition\",\"isPartOf\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#website\"},\"datePublished\":\"2021-04-20T06:46:21+00:00\",\"dateModified\":\"2021-04-20T07:00:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jobanmagazine.com\/globaledition\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Cops can secretly track your phone?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#website\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/\",\"name\":\"Joban Global Edition\",\"description\":\"Specialised News &amp; Opinion\",\"publisher\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jobanmagazine.com\/globaledition\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#organization\",\"name\":\"Joban Global Edition\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/english_joban_global.svg\",\"contentUrl\":\"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/english_joban_global.svg\",\"caption\":\"Joban Global Edition\"},\"image\":{\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/f2026ec0029f06ce487cbfc6299acf15\",\"name\":\"Kim Zetter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/avatar_user_62_1618901462-96x96.jpg\",\"contentUrl\":\"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/avatar_user_62_1618901462-96x96.jpg\",\"caption\":\"Kim Zetter\"},\"description\":\"Kim Zetter is an award-winning investigative journalist who has been covering privacy, computer security and national security for more than a decade. She is also author of the book 'Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon', which tells the story of a virus\/worm created by the US and Israel to sabotage Iran\u2019s nuclear program.\",\"url\":\"https:\/\/jobanmagazine.com\/globaledition\/author\/kkzettereng\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Cops can secretly track your phone? - Joban Global Edition","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/","og_locale":"en_US","og_type":"article","og_title":"How Cops can secretly track your phone? - Joban Global Edition","og_description":"\u00a0\u200dSince May (2020), AS\u00a0protesters around the country have marched against police brutality and in support of the Black Lives Matter [...]Read More...","og_url":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/","og_site_name":"Joban Global Edition","article_published_time":"2021-04-20T06:46:21+00:00","article_modified_time":"2021-04-20T07:00:41+00:00","og_image":[{"width":2000,"height":1000,"url":"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/singray-theintercept-SH-25.jpg","type":"image\/jpeg"}],"author":"Kim Zetter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kim Zetter","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#article","isPartOf":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/"},"author":{"name":"Kim Zetter","@id":"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/f2026ec0029f06ce487cbfc6299acf15"},"headline":"How Cops can secretly track your phone?","datePublished":"2021-04-20T06:46:21+00:00","dateModified":"2021-04-20T07:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/"},"wordCount":3757,"commentCount":0,"publisher":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/#organization"},"articleSection":["Cyber Security","Featured","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/","url":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/","name":"How Cops can secretly track your phone? - Joban Global Edition","isPartOf":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/#website"},"datePublished":"2021-04-20T06:46:21+00:00","dateModified":"2021-04-20T07:00:41+00:00","breadcrumb":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jobanmagazine.com\/globaledition\/2021\/04\/20\/how-cops-can-secretly-track-your-phone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jobanmagazine.com\/globaledition\/"},{"@type":"ListItem","position":2,"name":"How Cops can secretly track your phone?"}]},{"@type":"WebSite","@id":"https:\/\/jobanmagazine.com\/globaledition\/#website","url":"https:\/\/jobanmagazine.com\/globaledition\/","name":"Joban Global Edition","description":"Specialised News &amp; Opinion","publisher":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jobanmagazine.com\/globaledition\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jobanmagazine.com\/globaledition\/#organization","name":"Joban Global Edition","url":"https:\/\/jobanmagazine.com\/globaledition\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/logo\/image\/","url":"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/english_joban_global.svg","contentUrl":"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/english_joban_global.svg","caption":"Joban Global Edition"},"image":{"@id":"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/f2026ec0029f06ce487cbfc6299acf15","name":"Kim Zetter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jobanmagazine.com\/globaledition\/#\/schema\/person\/image\/","url":"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/avatar_user_62_1618901462-96x96.jpg","contentUrl":"https:\/\/jobanmagazine.com\/globaledition\/wp-content\/uploads\/sites\/2\/2021\/04\/avatar_user_62_1618901462-96x96.jpg","caption":"Kim Zetter"},"description":"Kim Zetter is an award-winning investigative journalist who has been covering privacy, computer security and national security for more than a decade. She is also author of the book 'Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon', which tells the story of a virus\/worm created by the US and Israel to sabotage Iran\u2019s nuclear program.","url":"https:\/\/jobanmagazine.com\/globaledition\/author\/kkzettereng\/"}]}},"_links":{"self":[{"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/posts\/1050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/comments?post=1050"}],"version-history":[{"count":13,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/posts\/1050\/revisions"}],"predecessor-version":[{"id":1064,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/posts\/1050\/revisions\/1064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/media\/1053"}],"wp:attachment":[{"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/media?parent=1050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/categories?post=1050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jobanmagazine.com\/globaledition\/wp-json\/wp\/v2\/tags?post=1050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}