A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year.
A Department of Homeland Security program discovered evidence of the surveillance devices, called IMSI catchers, as part of federal testing last year, according to a letter from DHS to Sen. Ron Wyden, D-Ore., on May 22. The letter didn’t specify what entity operated the devices and left open the possibility that there could be alternative explanations for the suspicious cellular signals collected by the federal testing program last year.
The discovery bolsters years of independent research suggesting that foreign intelligence agencies use sophisticated interception technology to spy on officials working within the hub of federal power in the nation’s capital. Experts in surveillance technology say that IMSI catchers – sometimes known by one popular brand name, Stingrays – are a standard part of the toolkit for many foreign intelligence services, including for such geopolitical rivals as Russia and China.
A DHS spokesman confirmed the contents of the letter to Wyden but declined further comment.
“This admission from DHS bolsters my concern about stingrays and other spying devices being used to spy on Americans’ phones,” Wyden said in a statement on Thursday. “Given the reports of rogue spying devices being identified near the White House and other government facilities, I fear that foreign intelligence services could target the president and other senior officials.”
The DHS letter came in response to a meeting last month in which Wyden pushed for more aggressive federal response to cellular system insecurity. IMSI catchers are widely used by local, state and federal police, as well as foreign intelligence agencies.
The devices work by simulating cell towers to trick nearby phones into connecting, allowing the IMSI catchers to collect calls, texts and data streams. Unlike some other forms of cell-phone interception, IMSI catchers must be near targeted devices in order to work.
When they are in range, IMSI catchers also can deliver malicious software to targeted devices for the purpose of stealing information stored on them or conducting longer-term monitoring of communications.
The same May 22 letter revealed that DHS was aware of reports that a global cellular network messaging, called SS7, was being used to spy on Americans through their cell phones. Such surveillance, which can intercept calls and locate cell phones from anywhere in the world, are sometimes used in conjunction with IMSI catchers.
ESD America, a defense and law enforcement technology contractor based in Las Vegas, has reported detecting IMSI catchers throughout the Washington area while conducting testing for private clients.
The company, which said it has federal contracts, declined to comment on work it has done for the U.S. government but said in a statement, “ESD America has several corporate and foreign government clients whom we have assisted in the detection of potential IMSI Catcher operation across many cities including Washington, D.C.”
In the DHS tests, which took place over the past three years, the company said it had detected signs of IMSI catchers near the White House, the FBI headquarters, the Senate, the Pentagon, the Russian Embassy and along the collection of other foreign embassies in an area known as Embassy Row in Northwest Washington.
The Washington area’s dense collection of U.S. officials and sensitive facilities makes it prime real estate for cellular interception, experts say.
“For any large intelligence agency, the United States, especially now, is a high-value target,” said Thomas Rid, a political science professor at the John Hopkins School of Advanced International Studies. “They get paid to go after high-value targets. It’s their job. . . It’s a complete no-brainer.”
The letter said DHS officials, during a pilot program last year, “did observe anomalous activity that appeared consistent with IMSI catcher technology” within the Washington area, including near the White House. It cautioned that DHS “has neither validated nor attributed such activity to specific entities, devices or purposes” and said that some of the suspicious signals may have been “emanating from legitimate cell towers.”
Experts on cellular interception say that various IMSI catchers have distinctive designs, making it clear from the resulting cellular signals and behavior whether they were made by American companies or by manufacturers in other countries.
Civil liberties groups have long warned that IMSI catchers are used with few limits by U.S. authorities, who collect calls, texts and other data from innocent bystanders as they conduct surveillance on criminal suspects or other legitimate targets. Increasingly, though, critics have sought to portray the technology as posing threats to national security because foreign intelligence services use them on Americans, both while in the United States and abroad.
“This is a huge concern from a national security perspective,” said Laura Moy, deputy director of Georgetown Law’s Center on Privacy & Technology. “People have been warning for years… that these devices were used by foreign agents operating on American soil.”
The surveillance devices are hard to counteract, though encrypted calling and messaging apps — such as Signal, WhatsApp or Apple’s FaceTime — provide protection against IMSI catchers. Some experts advocate wider deployment of such encrypted communication tools within the U.S. government, along with a move away from traditional cellular calling and texting.
Wyden and others also have called on the Federal Communications Commission, which along with DHS oversees the security of American cellular networks, to institute stronger protections against IMSI catchers, including possible technical fixes that cellular carriers or device makers could implement to resist surveillance.
The FCC said in response to questions about the discovery of IMSI catchers in Washington, “We continue to monitor reports of the use of IMSI devices and to coordinate closely with our counterparts at DHS, DOJ, and the FBI. The FCC strenuously enforces its rules against the unauthorized use of licensed radio spectrum and harmful interference with licensed users of the airwaves.”
(c) 2018, The Washington Post · Craig Timberg