The Hacker News Logo
Subscribe to Newsletter

Police Using Planes Equipped with Dirtbox to Spy on your Cell Phones

California Police Using Planes Equipped with Dirtbox to Spy on your Cell Phones
The Anaheim Police Department of California — Home of Disneyland — admitted that they used special Cell Phone surveillance technology, known as DirtBox, mounted on aircraft to track millions of mobile users activities.

More than 400 pages of new documents [PDF] published Wednesday revealed that Local Police and federal authorities are using, DRTBox, an advanced version of Dirtbox developed by Digital Receiver Technology (Boeing's Maryland-based subsidiary).

DRTBox — Spies in the Sky


DRTBox is a military surveillance technology that has capabilities of both Stingray as well as Dirtbox, allowing the police to track, intercept thousands of cellphone calls and quietly eavesdrop on conversations, emails, and text messages.

According to the report, DRTBox model is also capable of simultaneously breaking the encryption hundreds of cellphone communications at once, helping Anaheim Police Department track criminals while recording innocent citizens' information.

"This cell phone spying program – which potentially affects the privacy of everyone from Orange County’s 3 million residents to the 16 million people who visit Disneyland every year – shows the dangers of allowing law enforcement to secretly acquire surveillance technology," said Matt Cagle, technology and civil liberties policy attorney for ACLU-NC.

Besides Dirtbox, the police also purchased multiple Stingray devices, including one that can monitor LTE (Long Term Evolution) networks.

How does DRTBox Work?

dirtbox
DRTBox is capable of retrieving data from tens of thousands of mobile phones during a single flight in order to target criminals and suspects. However, the data on a vast number of innocent people are also being collected.
"Our products are lightweight, low power, small, and are supportable on multiple platforms. Our products are featured in UAVs, planes, helicopters, vehicles, towers, and on walk-tests, submarines, and boats." DRT website claims.
Generally, DRTBox works by masquerading as a cell phone tower. All the mobile phones, within the range that automatically connect to the strongest and nearest cell tower, respond to this signal and trick victims into connecting to it.

DRTBox also collects Hardware Numbers (registration information and identity data) associated with the phone – uniquely identifying IMEI numbers stored in every mobile device.

DRTBox surveillance device runs a Man In the Middle (MITM) attack that could not be detected by the users easily and thus, allows Police to track and catch criminals like drug-traffickers.

As it targets all nearby cellular devices, so Law Enforcements are able to get information from hundreds of devices concurrently.

How does DRTbox Crack Carrier-based Encryption?


Wireless Carriers are using various encryption standards to protect the privacy of cellphone data communication, which is built into GSM 2G, 3G, 4G and LTE networks.

Since GSM is nearly 30 years old and deprecated over the time because of...

  • lack of tower authentication,
  • bad key derivation algorithms
  • and terrible encryption algorithms, 

...it is easily crackable.

However, 3G, 4G and LTE networks have fixed these vulnerabilities and are using strong encryption standards to keep communication between the handset and the local tower secure.

If you are using 3G/4G SIM, then you must be aware that in case of network unavailability, your 3G/4G connections automatically drop down (failover or fallback) to GSM connection.

DRTbox exploits this fallback feature to implement a rollback attack -- jamming 3G/4G connection and thus re-activating all of the GSM attacks to crack encryption easily in order to intercept calls and other data that would have been harder to break, particularly in bulk.

The Government can then figure out who, when and to where a target is calling from, the precise location of every device within the range and even capture the content of the communication.

In this way, the federal agencies and local police can safely engage in passive, bulk surveillance without having original decryption keys and without leaving any trace whatsoever.

How to Protect yourself from DRTbox or Stingrays


Don’t confuse carrier-based encryption with application-level encryptions (end-to-end encryption), both are different.

So, if you are concerned about police snooping on your communication, the best option is...

...use software to encrypt your emails (PGP), instant messages (Telegram or Signal), documents and even your voice calls (RedPhone).

Besides this, you can also enable 3G/4G/LTE-only mode from device settings to forcefully limit your smartphone to use only secure connection.

This would prevent DRTBox or any cell phone tracking device to intercept your data communication, but might allow location tracking.

Warrantless Surveillance


Last year, the Department of Justice that oversees the FBI as well as the Department of Homeland Security announced a policy that required the Federal Investigation of Bureau and other federal authorities to obtain a court authorization or warrant before deploying these tracking devices.

Moreover, some individual states, including California, also passed a law that requires a warrant for the use of Stingrays and similar tracking devices.

Still, these spying devices continue to be used without the knowledge of citizens.

According to the documents, the police force lent its technology to police departments all over Orange County, thus, it impacted not only local residents but also 3 Million people live in Orange County and 16 Million people visiting Disneyland every year.
SHARE
Comments
Latest Stories
Top Deals

Always First — Subscribe

Over 500,000 Information Security professional read and trust our news platform. Join them and get all latest hacking news, free eBooks delivered to your inbox - free!