The federal contract shows ICE spent $825,000 on vans equipped with “cell-site simulators” which allow the real-world location tracking of nearby phones and their owners.
I’m new to it and don’t have the hardware yet, but no I don’t think so. From BleepingComputer’s site: “When Rayhunter detects suspicious network traffic [like a 2g downgrade], Orbic’s default green/blue screen turns red, informing users of a potential Stingray attack.”
The idea is to make a mobile setup and carry it in the car or a backpack. Especially for protests.
More device options exist as well.
Rayhunter is confirmed to work on these devices.
https://www.bleepingcomputer.com/news/security/open-source-tool-rayhunter-helps-users-detect-stingray-attacks/
https://github.com/EFForg/rayhunter
https://www.ebay.com/sch/i.html?_nkw=orbic+rc400l+unlocked
Do you know if Rayhunter need an internet connection to function? Being able to carry it around portably would likely be the ideal setup.
I’m new to it and don’t have the hardware yet, but no I don’t think so. From BleepingComputer’s site: “When Rayhunter detects suspicious network traffic [like a 2g downgrade], Orbic’s default green/blue screen turns red, informing users of a potential Stingray attack.”
The idea is to make a mobile setup and carry it in the car or a backpack. Especially for protests.
More device options exist as well. Rayhunter is confirmed to work on these devices.
I made a discussion post on their GitHub requesting the information. If it does then I’m buying an Orbic right away.
I may be stepping outside my field of knowledge but I can’t see why they don’t just build a local database of known threats to utilize offline.