Triggerfish (surveillance): Difference between revisions
Appearance
Content deleted Content added
Basic stub - there's not very much known about this, and many sources say no more than is said by these, but more info would be most welcome. |
cleanup and headings |
||
Line 1: | Line 1: | ||
'''Triggerfish''' describes a technology of [[cell phone]] interception and surveillance using a mobile [[cellular base station]] ([[microcell]] or [[picocell]]). The devices are also known as cell-site simulators or digital analyzers. |
'''Triggerfish''' describes a technology of [[cell phone]] interception and surveillance using a mobile [[cellular base station]] ([[microcell]] or [[picocell]]). The devices are also known as cell-site simulators or digital analyzers. |
||
==Device capability== |
|||
* Tracking of a cell phone by a mobile FBI van (Wireless Intercept and Tracking Team) which seeks to locate a cell phone lacking GPS tracking by scanning for its emissions. This first became known for its use in tracking hacker [[Kevin Mitnick]].<ref>{{cite web|url=http://www.wired.com/politics/onlinerights/news/2007/12/fbi_cell?currentPage=1|title=FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs|author=Ryan Singel|date=2007-12-20|publisher=Wired}}</ref> |
* Tracking of a cell phone by a mobile FBI van (Wireless Intercept and Tracking Team) which seeks to locate a cell phone lacking GPS tracking by scanning for its emissions. This first became known for its use in tracking hacker [[Kevin Mitnick]].<ref>{{cite web|url=http://www.wired.com/politics/onlinerights/news/2007/12/fbi_cell?currentPage=1|title=FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs|author=Ryan Singel|date=2007-12-20|publisher=Wired}}</ref> |
||
Line 8: | Line 10: | ||
<!--- considering the similarity of "iNAC managed access" blocking of prison cell phone calls, the use of this system to block cell phone calls e.g. at a political protest should be researched further. ---> |
<!--- considering the similarity of "iNAC managed access" blocking of prison cell phone calls, the use of this system to block cell phone calls e.g. at a political protest should be researched further. ---> |
||
==Controversy and concerns== |
|||
Neither the user nor the cell phone provider needs to know about Triggerfish for it to be used successfully.<ref>{{cite web|url=http://www.aclu.org/2008/11/14/with-technology-like-this-who-needs-the-law|title=With Technology Like This, Who Needs the Law?|date=2008-11-14|author=Rachel Myers|publisher=ACLU}}</ref> A court order is required, but the device circumvents provisions of [[CALEA]] barring use of [[pen register]] or [[trap-and-trace]] devices.<ref>{{cite web|url=http://arstechnica.com/tech-policy/news/2008/11/foia-docs-show-feds-can-lojack-mobiles-without-telco-help.ars|title=FOIA docs show feds can lojack mobiles without telco help|author=Julian Sanchez|date=2008-11-16|publisher=Ars Technica}}</ref> |
Neither the user nor the cell phone provider needs to know about Triggerfish for it to be used successfully.<ref>{{cite web|url=http://www.aclu.org/2008/11/14/with-technology-like-this-who-needs-the-law|title=With Technology Like This, Who Needs the Law?|date=2008-11-14|author=Rachel Myers|publisher=ACLU}}</ref> A court order is required, but the device circumvents provisions of [[CALEA]] barring use of [[pen register]] or [[trap-and-trace]] devices.<ref>{{cite web|url=http://arstechnica.com/tech-policy/news/2008/11/foia-docs-show-feds-can-lojack-mobiles-without-telco-help.ars|title=FOIA docs show feds can lojack mobiles without telco help|author=Julian Sanchez|date=2008-11-16|publisher=Ars Technica}}</ref> |
Revision as of 14:15, 17 February 2011
Triggerfish describes a technology of cell phone interception and surveillance using a mobile cellular base station (microcell or picocell). The devices are also known as cell-site simulators or digital analyzers.
Device capability
- Tracking of a cell phone by a mobile FBI van (Wireless Intercept and Tracking Team) which seeks to locate a cell phone lacking GPS tracking by scanning for its emissions. This first became known for its use in tracking hacker Kevin Mitnick.[1]
- Mimicking a cell phone tower to force cell phones in the area to reveal their phone numbers, serial numbers and locations. A report by Global Research of Canada suggests that this feature was used to identify and round up the RNC 8, organizers seeking to lead protests at the 2008 Republican National Convention.[2]
- Intercepting a cell phone call by a man in the middle attack, if the option is enabled, and the user makes or receives a call.
Controversy and concerns
Neither the user nor the cell phone provider needs to know about Triggerfish for it to be used successfully.[3] A court order is required, but the device circumvents provisions of CALEA barring use of pen register or trap-and-trace devices.[4]
The device is similar to but distinct from an IMSI catcher.[5]
See also
References
- ^ Ryan Singel (2007-12-20). "FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs". Wired.
- ^ Tom Burghart (2008-11-19). "Preemptive Policing & the National Security State: Repressing Dissent at the Republican National Convention". Global Research.
- ^ Rachel Myers (2008-11-14). "With Technology Like This, Who Needs the Law?". ACLU.
- ^ Julian Sanchez (2008-11-16). "FOIA docs show feds can lojack mobiles without telco help". Ars Technica.
- ^ Johnathan Racicot (2008-11-18). "Cyber Espionage : The Triggerfish". Cyberwarfare Magazine.