Come on the investigation method 'Stingray' to gather information of the target person impersonating the communication base station of the smartphone

By Ervins Strauhmanis

Mobile phones and smartphones have emerged, and the world has become "connected" to the Internet, the speed at which society changes is even faster than before. Now that smartphones and other crime are also being used, devices called "Stingray" that can grasp criminal activities at the terminal level are being used, but as for the operation There are still plenty of voices pros and cons.

How a Hacker Proved Cops Used a Secret Government Phone Tracker to Find Him - POLITICO Magazine

In the summer of 2008, a man who was Santa Clara, a suburb of San Francisco, California, was marked as an investigation agency. The agent of FBI who was conducting a secret investigation found a man in town and started the tail. The man noticed the tail and accelerated the walk.

According to the owner of the rental property that he lives, his name is Professor Steven Travis Bronner and his career is a software engineer, who is a man who surfaced investigating a bank account used for fraud. However, this is a pseudonym, and the actual name was not known until the investigator actually secured his identity, and among investigative officials it was called with the name "hacker". Between 2005 and 2008, Mr. Hacker collaborated with two colleagues to do more than 1,900 tax refund frauds, got $ 4 million (about 400 million yen), remitted to more than 170 bank accounts It is believed to have been.

For this Mr. Hacker's investigation, a special device called "Stingray" was used without a warrant. Stingray intercepts the communication of surrounding terminals by impersonating a mobile phone base station installed at every place in the city and acquires an individual identification number and position information. As of 2018, it is thought that it is already installed in many investigation institutions, but it was thought that the criminal side hardly marked it because the existence was still very little known at that time.

Actual condition of investigation method "Stingray" to gather personal identification information and location information of smartphone by impersonating mobile phone base station - GIGAZINE

Mr. Hacker who realized that it is marked is flying away on the train and fleeing way such as escape by flying on the train or riding high on the plane is overwhelming and it is actually being pursued by the agent, It seems that I do not know whether it is only obsessed, but I was convinced of the situation when the police car of Santa Clara police appeared before me. I tried to escape immediately.

However, Mr. Hacker can not escape from the siege net, and will be arrested without problems. After that, police got a warrant and proceeded to investigate the surroundings such as a residence, in the room with only a bed and a desk, a terminal of Verizon Wireless data communication plan "Internet AirCard" and a terminal of "Steven Travis · Bronner" Patrick Stout "and other forged drivers license etc etc were discovered. According to FBI's announcement after that, according to the contents announced by FBI, there are multiple hard disks, cash of 116,340 dollars (about 12 million yen), gold coins equivalent to over $ 208,000 (about 21 million yen), about 10,000 dollars It is said that silver coins for the amount of 1 million yen, counterfeit IDs and devices for forgery were also found.

The investigation institution figured out identity from Mr. Hacker's fingerprint, and it became clear that the real name is "Daniel · Rigmeiden". Mr. Ligumein said that he had been convicted of misdemeanor in the past. Analysis of Mr. Ligmeyden's computer showed that "Migrating to Dominica away from the United States" and "Getting citizenship of other countries" in the history of e-mails "Passing bribes of Dominican government officials and proof of birth It was also found that contents such as "getting a letter and passport" were included.

Eric King, a privacy-based activist based in London, said that "What laws allowed you to use Stingray?" That gathered attention during this investigation I will. Mr. King said, "We know that the police have singing and doing it, do not admit it, and that we have been using it for over a decade." We are preaching the need to be subject to public debate.

By osde8info

In addition, Stingray is a device whose main body is as small as a device to ride on a desk, it can also be carried easily on board a car. In the past, secret catalogs of equipment such as Stingray were sometimes leaked like the following article.

A secret catalog of equipment used for spy investigation by intercepting and eavesdropping mobile phones leaks - GIGAZINE

Even after being sent to the detention center, there was a big mystery left by Mr. Rigmeyden. For Mr. Ligmeyden who used multiple IDs to keep their identity and did not use credit cards for payment so that no footprints remain, why investigative organizations find themselves and almost everyone is known I was not able to understand the point whether the living bite that was supposed to have been found was found out. Mr. Ligmeideen thought that "the investigation institution must have not taught himself yet," Mr. Ligumeiden did not proceed as thought to reveal its secret through a lawyer, dismissed two lawyers in a row, Eventually I decided to take a method to defend myself myself.

Mr. Ligmeyden was permitted to use the library on law for 5 hours per day. Mr. Ligmeyden who read through various materials discovered that the name "Stingray" appears in it. Mr. Ligmeyden who was in the restrained state did not have the specifications of the Internet, but he began to know that Stingray was widely used in investigative agencies using cooperators and all other methods.

The problem that exists here is "There is no warrant on investigation". Regarding the pros and cons of using Stingray for the investigation without a warrant, it is said that there is no common recognition among judges and judges, but it is possible to determine the location of the target person and issue a warrant There are voices showing concern about what can be used without it.

By Esther Vargas

Ultimately, Mr. Ligmeyden summarized what we had investigated. According to it, the police firstly tracks and identifies the IP address of the data communication terminal on the network and inquires of the information to Verizon Wireless, an Internet service provider, that the contractor is Mr. Ligmeyden who uses pseudonyms . And at this time, Verizon provided the police with a record indicating that the AirCard associated with the IP address was communicating via some particular cell tower in Santa Clara. Ultimately, the police probably seems to have used Stingray to find the exact area of ​​the room where Mr. Ligmeyden lived.

When it is about to be in 2010, Mr. Ligmeyden judged that a collaborator is necessary to inform this, and the incident to various organizations including the American Civil Liberties Union (ACLU) and the Electronic Frontier Foundation (EFF) We started activities such as sending details and research files. After that, the existence of STINGRAY is gradually becoming known to people, and there is also growing concern about the actual use of STINGRAY.

In January 2014, Mr. Ligmeyden and the Federal prosecutor agreed to a judicial deal. However, there was no conclusion on the discussion on the operation without Stingray 's warrant, and it can be said that the investigation authority can be said that Stingray can be used freely. Just as people's lives have changed with the emergence of new technologies, in modern society where the form of crime has also changed, how the criminal law has been changed and how to prevent its operation and abuse It seems that society is approaching at the turning point when thinking about such a thing.

in Note,   Mobile,   Hardware, Posted by darkhorse_log