Thursday, August 28, 2014
How your being tracked from your smart phone - A must read & share over the internet.
This post is a MUST SHARE (( Especially for Activists)) - How your cell phone is used to track you.
How the Government and Police are tracking you via your Cell Phone.
They amount of information and data and metadata they can take from your mobile phone, seems to be endless and limitless.
The Government and Police are tracking YOU without your permission and you would NEVER know.
StingRay Phone Tracking.
- SPY on Calls
- SPY on SMS
- SPY on Emails
- Activate front and rear cameras
- Track GPS Location
- Monitor Internet Use
- View Multimedia Files
- Access calendar / contacts
- Intercept Instant Messages
- Record Surroundings
- Control Apps and Programs
(Some links below are directed at the US but we have added as much info as we can for our Australian supporters, also keep
in mind, that the US links are just as well as good of information for us Aussies as well).
StingRay Phone Tracker.
What it does: ( Watch the Video Below ).
The StingRay is an IMSI-catcher with both passive (digital analyzer) and active (cell site simulator) capabilities.
When operating in active mode, the device mimics a wireless carrier cell tower in order to force all nearby mobile phones and other
cellular data devices to connect to it.
The StingRay is capable of performing multiple operations upon a cellular device:
(1) extracting stored data such as International Mobile Subscriber Identity ("IMSI") numbers and Electronic Serial Number ("ESN").
(2) writing cellular protocol metadata to internal storage.
(3) forcing an increase in signal transmission power.
(4) forcing an abundance of radio signals to be transmitted.
(5) tracking and locating the user of the cellular device.
(6) conducting a denial of service attack.
The StingRay broadcasts a pilot signal that is either stronger than, or made to appear stronger than,
the pilot signals being broadcast by legitimate cell sites operating in the area.
A common function of all cellular communications protocols is to have the cellular device connect to the cell site offering the strongest signal.
StingRays exploit this function as a means to force connections from unsuspecting cellular device users.
((( A must read )))
Extracting Data From Internal Storage:
For example, if visual surveillance is being conducted on a group of protestors,a StingRay operator will use the device to download the IMSI or equivalent identifier
from each phone within the protest area locating and tracking operations can be conducted, and service providers can be forced to turn over account information identifying the device users.
Tracking and Locating:
A StingRay can be used to identify and track a phone or other compatible cellular data device even while the device is not engaged in a call or accessing data services.
((( PLEASE READ )))
Denial of Service:
The FBI has claimed that when used to identify, locate, or track a cellular device, the StingRay does not collect communications content or forward it to the service provider. Instead,
the device causes a disruptions in service. Under this scenario, any attempt by the cellular device user to place a call or access data services will fail while the StingRay is conducting its surveillance.
Telecommunications interception and surveillance:
The Attorney-General's Department administers the Telecommunications (Interception and Access) Act 1979 (the TIA Act) and the Surveillances Devices Act 2004 (the SD Act).
The TIA Act protects the privacy of Australians by prohibiting the interception of communications or access to stored communications. The privacy of Australians is also protected by the Telecommunications Act 1997,
which prohibits telecommunications service providers from disclosing information (telecommunications data) about their customers' use of telecommunications services.
The TIA Act sets out certain exceptions to these prohibitions to permit eligible Australian law enforcement and security agencies to:
* obtain warrants to intercept communications
* obtain warrants to access stored communications
* authorise the disclosure of telecommunications data.
Agencies can only obtain warrants or give authorisations for national security or law enforcement purposes set out in the TIA Act.
This just proves how much they can obtian and the question here is for us Aussies and those from other countries, can we beleive our
We do not have trust in them at all, thus, this means, now we know what information they can and will get from us if they want too.
73 Other Telecommunications Privacy Issues ( Australia )
Telecommunications (Interception and Access) Act:
Interception and stored communications
73.9 The Telecommunications (Interception and Access) Act makes it an offence to intercept a communication passing over a telecommunications system without the knowledge of the maker of the communication,
or to access a ‘stored communication’ without the knowledge of the sender or intended recipient of the communication. There are exceptions to these general offence provisions. Most importantly,
law enforcement agencies can intercept or access communications if they have obtained a warrant to do so. In addition, other individuals, such as employees of telecommunication providers,
can intercept or access communications in limited circumstances
The Act: ( Australia )
Telecommunications (Interception and Access) Act 1979
The compiled Act:
This is a compilation of the Telecommunications (Interception and Access) Act 1979 as amended and in force on 29 June 2013. It includes any amendment affecting the compiled Act to that date.
This compilation was prepared on 11 July 2013.
The notes at the end of this compilation (the endnotes) include information about amending Acts and instruments and the amendment history of each amended provision.
Uncommenced provisions and amendments
If a provision of the compiled Act is affected by an uncommenced amendment, the text of the uncommenced amendment is set out in the endnotes.
Application, saving and transitional provisions for amendments:
If the operation of an amendment is affected by an application, saving or transitional provision, the provision is identified in the endnotes.
If a provision of the compiled Act is affected by a textual modification that is in force, the text of the modifying provision is set out in the endnotes.
Provisions ceasing to have effect:
If a provision of the compiled Act has expired or otherwise ceased to have effect in accordance with a provision of the Act, details of the provision are set out in the endnotes.
Departmental submission - Parliament of Australia:
Intercept communications when investigating serious crimes and threats to national security. ( They can use this act in just about any circumstances - Beware).
Know Your Telecommunications Industry:
This is based on the USA however it could also be based on just about every other country in the world.
Usage by law enforcement:
The use of the devices has been frequently funded by grants from the Department of Homeland Security. The Los Angeles Police Department used a Department of Homeland Security grant in 2006 to buy a stingray for "regional terrorism investigations". However, according to the Electronic Freedom Foundation, the "LAPD has been using it for just about any investigation imaginable.
Cellphone surveillance, also known as cellphone spying, may involve the tracking, bugging, monitoring, interception and recording of conversations and text messages on mobile phones.
 It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.
 In the United States, law enforcement agencies can legally monitor the movements of people from their mobile phone signals upon obtaining a court order to do so.
 Cellphone spying software is software that is surreptitiously installed on mobile phones that can enable these actions.
Read More & Source:
Mobile phone tracking:
Mobile phone tracking refers to the attaining of the current position of a mobile phone, stationary or moving. Localization may occur either via multilateration of radio signals between (several) radio towers of the network and the phone,
or simply via GPS. To locate the phone using multilateration of radio signals, it must emit at least the roaming signal to contact the next nearby antenna tower, but the process does not require an active call. GSM is based on the signal strength to nearby antenna masts.
Read more & Source:
Electronic serial number:
IMEI Number -
International Mobile Station Equipment Identity:
IMEI and the law:
Many countries have acknowledged the use of the IMEI in reducing the effect of mobile phone theft. For example, in the United Kingdom, under the Mobile Telephones (Re-programming) Act, changing the IMEI of a phone, or possessing equipment that can change it, is considered an offence under some circumstance.
( DID YOU KNOW ) - If your phone was stolen and you reported it lost or stolen and notified your SP (Service Provider), they can block it from being used in your country but NOT in another country.
So think twice before you purchase a mobile phone on eBay from oversees, it is probably stolen.
Blacklists of stolen devices:
When mobile equipment is stolen or lost the owner can contact their local operator with a request that it should be blocked from the operator's network, and the operator can be expected to do so if required by law in the operator's jurisdiction.
If the local operator possesses an Equipment Identity Register (EIR), it then may put the device IMEI into it, and can optionally communicate this to shared registries, such as the Central Equipment Identity Register (CEIR) which blacklists the device in switches of other operators that use the CEIR.
With this blacklisting in place the device becomes unusable on any operator that uses the CEIR, making theft of mobile equipment a useless business proposition, unless for parts.
New Hi-Tech Police Surveillance: The “StingRay” Cell Phone Spying Device:
The US government doesn't want you to know how the cops are tracking you.
US Marshals transfer controversial ‘Stingray’ cellphone surveillance to prevent ACLU review:
How ‘Stingray’ Devices Work:
Electronic Spying gains ground in Australia:
Down Under data dump: Australian police track mobile phones the NSA way:
Revealed: How governments can take control of smartphones:
NSA, Cell Phone Tracking,Stingray Cell Phone Tracer, Social Media Surveillance, Spy Chips , RFID, Radio Frequency Identification, Identity Theft and You:
The StingRay Is The Virtually Unknown Device The US Government Uses To Track People Through Their Phones:
Australian police using tower dumps to slurp mass phone data:
So who makes the StingRay Phone Tracker?
Harris Corporation Receives $235 Million Order from Australian Department of Defence for Falcon Multiband Tactical Radio Systems:
Harris Solutions for Civilian Government:
(((( Watch this video ))))
Video to watch:
Police Using Cell Phones to Track People Without Consent:
Interesting product here: ( We do not endorse this but it is for YOUR information purposes only).
What can I do to prevent Stingray from tracking my cell phone?
10 Organizations Which Track You Illegally:
Judge Allows FBI To Use Evidence Collected Via "Stingray" Fake Cell Towers:
Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight:
Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List:
Milwaukee Police Upgrade to Stingray Technology, Track Residents Phones and Associations:
Court allows use of “stingray” cell tracking device in murder case:
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About:
Is Tempe PD planning to use cell phone data to identify participants at an anti-racist rally?
Defend Yourself Against Cell Phone Tracking:
Stingray Cell Phone Tracker Concealed by Police
How to Stingray-Proof Your Cell Phone:
Police Departments Buying Up Stingray Technology - Spy Tool used to Find Your Cell Phone Location:
Police Hide Use of Cell Phone Tracker From Courts "Stingray"
Warrantless Cell Phone Tracking Now Legal:
NSA Nicknames and Codewords:
#StingRay #NSA #Tracking #Surveillance #FBI #Privacy We Are Anonymous
Posted by We are Anonymous at 5:17 AM