All rights reserved. We dont have ads, so we depend on our members 35,000 and counting to help us hold the powerful to account. All the Settings You Should Change on Your New Samsung Phone, Fat, Sugar, Salt Youve Been Thinking About Food All Wrong, You Can Turn Your Backyard Into a Biodiversity Hotspot, No, the James Webb Space Telescope Hasnt Broken Cosmology, The Best Password Managers to Secure Your Digital Life. Even when 5G standalone mode is deployed in most places, he says, carriers will still run parallel 4G and 3G infrastructure as well that could continue to enable some stingray attacks. They can do this in two ways: They can either redirect the phones browser to a malicious web site where malware can be downloaded to the phone if the browser has a software vulnerability the attackers can exploit; or they can inject malware from the stingray directly into the baseband of the phone if the baseband software has a vulnerability. In some court documents, law enforcement officials have indicated that they obtained location information about the defendant from a . Your email address will not be published. Unfortunately, you as the end user wont really be able to tell whether the 5G network youre connecting to is true 5G or simply upgraded 4G. The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. The two presented at the Black Hat security conference in Las Vegas last week. Unfortunately, very few phone manufacturers allow you to do this, with all of the big companies (such as Apple and Samsung) only letting you disable 3G or 4G. When used to track a suspects cell phone, they also gather The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. Malware injected into the baseband of a phone is harder to detect. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. Since 5G networks dont have the same security vulnerabilities as 4G, you might think youre safe from surveillance once you see that youre connected to a 5G network. A nice and informative article thats easy to comprehend what is being spoken about. Well start out our guide by looking at what a StingRay is and how it differs from more modern solutions. Although a virtual private network will garble any data or traffic thats picked up by IMSI catchers, such as a StingRay device, it wont be able to hide your physical location (or, at least, that of your device). Cant get work because they follow me to the interview and then after I leave say negative things about me. Law enforcement may be tracking a specific phone of a known suspect, but any phone in the vicinity of the stingray that is using the same cellular network as the targeted phone or device will connect to the stingray. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. defense against so-called stingray surveillance devices, Optimize your home life with our Gear teams best picks, from. About a dozen other companies make variants of the stingray with different capabilities. Yes. Phone probably cloned. The kind of reporting we do is essential to democracy, but it is not easy, cheap, or profitable. The free, easy to use, end-to-end encrypted app keeps your messages secure, defeating all kinds of tricky You're getting the high speed connection, but the security level you have is still 4G.". Marshals Service were asked by the Justice Department to, provide unspecified support to law enforcement. Given that President Donald Trump has referred to protesters as , , and that paramilitary-style officers from the Department of Homeland Security have been deployed to the streets of, , its conceivable that surveillance conducted at recent demonstrations has been deemed a national security matter raising the possibility that the government may have used stingray technology to, The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. To address this deception, the Justice Department in 2015 implemented a new policy requiring all federal agents engaged in criminal investigations to obtain a probable cause search warrant before using a stingray. Apple Users Need to Update iOS Now to Patch Serious Flaws. When a phone communicates with a cell tower, it reveals the unique ID or IMSI number (International Mobile Subscriber Identity) associated with the SIM card in the phone. If they clone your phone the VPN encryption is useless. A few days later, a memo obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. Even when they did seek approval from a court, they often described the technology in misleading terms to make it seem less invasive. The Justice Department has stated that the devices may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order.. Most significantly, they withheld the fact that the device emits signals that can track a user and their phone inside a private residence. The technology is believed to have originated in the military, though its not clear when it was first used in combat zones or domestically in the U.S. They then walked around the apartment complex with a hand-held KingFish or similar device to pinpoint the precise apartment Rigmaiden was using. In the absence of publicly available stingray information, the University of Washington researchers tried a new technique to find out more. China Is Relentlessly Hacking Its Neighbors. Very few modern smartphones will let you disable 2G entirely. And although the policy includes state and local law enforcement agencies when they are working on a case with federal agents and want to use the devices, it does not cover those agencies, . The American Civil Liberties Union found 75 different agencies including the FBI, DEA and NSA make use of this type of surveillance. Sprint and T-Mobile arent quite as far along, but they also plan to phase out their 2G networks by December 2021 and December 2022, respectively. The solution to all of this is true 5G. StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla. Photo: U.S. Patent and Trademark Office via AP. If the phones are wireless they can monitor the calls just like cells. Whether the government has used the technology against Black Lives Matter protesters without a warrant is likely something that will remain a secret for some time. Where StingRays can only intercept data over 2G, a Hailstorm device operates on 3G and 4G networks, which make up the vast majority of cellular networks worldwide. Federal agents are not required to seek a warrant to use the technology in cases involving such circumstances. The Justice Department requires federal agents to obtain a probable cause warrant to use the technology in criminal cases, but there is a carve-out for national security. A 2014, 2006 catalog of surveillance technologies. AJ+ made this short, informative video explaining how cell-site simulators (also known as IMSI catchers and stingrays) work. If surveillance is a topic you care about, youve probably heard the term StingRay thrown around in reference to law enforcement agencies tracking cell phones. What did you mean by the sting device must be in close proximity to the target? But stingrays can force phones to downgrade to 2G, a less secure protocol, and tell the phone to use either no encryption or use a weak encryption that can be cracked. Recent documents obtained by the ACLU also indicate that between 2017 and 2019, the Department of Homeland Securitys Homeland Security Investigations unit has used stingrays at least 466 times in investigations. That said, protecting the contents of your data is probably more important than the fact that your device was located somewhere, unless youre currently evading a manhunt. A stingray imitates cell towers and picks up on unique signals sent out by individuals attempting to use the cell phone network. document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); 2007-2023 Cloudwards.net - We are a professional review site that receives compensation from the companies whose products we review. The FBI and DHS have indicated that they. My computers are hacked. Many civil liberties activists say you cant use a cell site simulator and remain compliant with the Fourth Amendment, or state constitutional limits on searches and seizures. How to Block StingRay Surveillance in 2023 on 2G, 3G, 4G & 5G Networks. OpenAIs Foundry will let customers buy dedicated compute to run its AI models. That said, there is currently a bill that aims to require that local police departments and federal law enforcement acquire a search warrant before they can use such devices. However, any affiliate earnings do not affect how we review services. Documents in a 2011 criminal case in Canada showed that devices used by the Royal Canadian Mounted Police had a range of a third of a mile, and in just three minutes of use, one device had intercepted 136 different phones. i would leave the phone in a crowded public bathroom and walk away. The cellular-surveillance system costs as much as $400,000 in the basic configuration, and its price varies with add-ons ordered by the agency. Although theres nothing stopping hackers and cybercriminals from using cell-site simulators to access peoples data, their cost and the need to be in physical proximity to the target device make them much less attractive than other types of attacks for any but the most focused and dedicated cybercrime operations. Kyle Wiggers. CryptoPhone users found 17 fake cell towers in a month, but dont know who deployed them or why. StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. Such malware can be used to turn the phone into a listening device to spy on conversations. Im not savvy even a little on the internal operations of computers/devices. This process is invisible to the end-user and allows the device operator full access to any communicated data. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. They can also use the IMSI catcher for a so-called man in the middle attack so that calls from one target pass through the IMSI catcher to the target phone. 1 The Erie County Sheriff's Office has spent more than $350,000 to purchase and maintain its two Stingray systems. StingRay devices are a technology that mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers. If that data or communication is encrypted, then it would be useless to anyone intercepting it if they dont also have a way to decrypt it. They can do this in two ways: They can either redirect the phones browser to a malicious web site where malware can be downloaded to the phone if the browser has a software vulnerability the attackers can exploit; or they can inject malware from the stingray directly into the baseband of the phone if the baseband software has a vulnerability. Although StingRays are limited to tracking cell phone users connected over a legacy 2G network, the same company that produced the StingRay (the Harris Corporation) also manufactures a device known as Hailstorm (or simply StingRay II). on about your day, ask yourself: How likely is it that the story you just read would have been produced by a different news outlet if The Intercept hadnt done it? Besides, law enforcement doesnt even need a cell-site simulator such as a StingRay if all they need is your location, as this can be found out by triangulating regular cell-phone towers or your GPS signal. True 5G networks fix the security vulnerabilities used by StingRay technology to obtain information from nearby devices. A stingray masquerades as a cell tower in order to get phones to ping it instead of legitimate cell towers, and in doing so, reveal the phones IMSI numbers. When used to track a suspects cell phone, they also gather And a group of researchers from Purdue University and the University of Iowa also found a way toguess an IMSI numberwithout needing to get a carrier to decrypt it. For example, once law enforcement has narrowed the location of a phone and suspect to an office or apartment complex using the StingRay, they can walk through the complex and hallways using the KingFish to find the specific office or apartment where a mobile phone and its user are located. Stingrays are supposed to allow 911 calls to pass through to a legitimate cell tower to avoid disrupting emergency services, but other emergency calls a user may try to make while their phone is connected to a stingray will not get through until the stingray releases their phone. 1 The Erie County Sheriff's Office has spent more than $350,000 to purchase and maintain its two Stingray systems. If youre asking whether or not there are apps that can do this, the answer is yes. Because a stingray is not really a tower on the carriers network, calls and messages to and from a phone cant go through while the phone is communicating with the stingray. How many covert wars, miscarriages of justice, and dystopian technologies would remain hidden if our reporters werent on the beat? They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. WebFederal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a StingRay. These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as otherwireless devices in Some dots are blue, for the cops, and some are other colors for folks they have placed under surveillance via their phones.. The free, easy to use, end-to-end encrypted app keeps your messages secure, defeating all kinds of tricky Phones periodically and automatically broadcast their presence to the cell tower that is nearest to them, so that the phone carriers network can provide them with service in that location. How & Where to Watch That 70s Show in 2023: Watch All 8 Seasons From Anywhere, qBittorrent vs uTorrent in 2023: The Best & the Most Popular Torrent Clients Compared. A CSS is a device that mimics a legitimate cellular tower. Although the press release and memo didntsaywhat form the support and surveillance would take, its likely that the two agencies were being asked to assist police for a particular reason. In the absence of publicly available stingray information, the University of Washington researchers tried a new technique to find out more. Time Machine vs Arq vs Duplicati vs Cloudberry Backup. Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. To get around this, you can jailbreak or root your phone and install third-party software such as the Xposed Framework to disable 2G connections. So big brother has been spying on all of us all along . obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. That informative, easy to understand.l loved it. No. The data captured can include the IMSI number as well as text messages, email, and voice calls. Documents obtained this year by the American Civil Liberties Union indicate that Harris has upgraded the StingRay to a newer device it calls a Crossbow, though not a lot of information is known about how it works. As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016 described planes and helicopters flying overhead that they believed were using technology to jam mobile phones. My phone, I believe is cloned. What is the main purpose of stingray surveillance in a government setting? Qualcomm has started out in the older cell phone also. The devices dont just pick up data about targeted phones. What's at Stake. News stories suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they dont say how the devices do this. What is the main purpose of stingray surveillance in a government setting? And agents are required to purge the data they collect from non-targeted phones within 24 hours or 30 days, depending on the circumstances. A dirtbox is the common name for specific models of an IMSI catcher that are made by a Boeing subsidiary, Maryland-based Digital Receiver Technology hence the name DRT box. They are reportedly used by the DEA and Marshals Service from airplanes to intercept data from mobile phones. Using a VPN when youre on mobile data will keep the contents of your network traffic safe from anyone listening in with an IMSI catcher. Android users can download apps that analyze a device's network connection and can flag non-standalone mode, but that's an onerous extra step. Although its often used as a blanket term, a StingRay device is just one type of a class of devices known as IMSI catchers or cell-site simulators. It only operates on 2G networks, which makes it less useful for law enforcement with every passing year as 4G and eventually 5G networks take over. The main usage of cell-site simulators comes from law enforcement. The Justice Department has stated that the devices may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order., As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016, described planes and helicopters flying overhead. In practice, that means one of 5G's top-billed privacy benefitsthe ability to stymie stingray surveillancedoes not yet apply for most people. Kim Zetter[emailprotected]gmail.com@kimzetter, protesters around the country have marched against police brutality and in support of the Black Lives Matter movement, activists have spotted a recurring presence in the skies: mysterious, A press release from the Justice Department at the end of May revealed that the Drug Enforcement Agency and U.S. But as 5G coverage becomes ubiquitous, the rollout comes with an important caveat. But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether theyve ever been used to record the contents of mobile phone communications or to install malware on phones. You may not have the full story about what network you're onand how well you're protected. This means that even though it looks like youre connected to 5G on your device, the underlying technology is still 4G, which leaves you vulnerable to Hailstorm devices. OpenAIs Foundry will let customers buy dedicated compute to run its AI models. 2. By catching multiple IMSI numbers in the vicinity of a stingray, law enforcement can also potentially uncover associations between people by seeing which phones ping the same cell towers around the same time. It sounds like you have a very different problem: paranoid schizophrenia. The full picture, the full protections of 5G security come over time and do require the standalone to gain full benefit, he says. The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. Its also not clear how effective the devices are at letting 911 calls go through. In order to target someone. The earliest public mention of a stingray-like device being used by U.S. law enforcement occurred in 1994, when the FBI used a crude, jury-rigged version of the tool to track former hacker Kevin Mitnick; authoritiesreferred to that device as a Triggerfish. Rigmaiden had used a stolen credit card number and a fake name and address to register his internet account with Verizon. To prevent that sort of monitoring, 5G is built to encrypt IMSI numbers. Stingrays, also known as cell site simulators or IMSI catchers, are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. To get 5G out to the masses quickly, most carriers around the world deployed it in something called non-standalone mode or non-standalone architecture. The approach essentially uses existing 4G network infrastructure as a jumping off point to put out 5G data speeds before the separate, "standalone" 5G core is built. That data can be used to identify people protesters, for example and track their movements during and after demonstrations, as well as to identify others who associate with them. Ice Cream Machine Hackers Sue McDonald's for $900 Million. The suspect, , was an identity thief who was operating from an apartment in San Jose, California. That said, 5G networks are still relatively rare, so we wouldnt be surprised if a SUPI catcher is already in the works somewhere. In 2008, authorities used a StingRay and a KingFish to locate a suspect who was using an air card: an internet-connectivity device that plugs into a computer and allows the user to get online through a wireless cellular network. AT&T says that it began limited SA deployments late last year, and that it will scale up when the ecosystem is ready.. However, note that VPNs wont protect your text messages. In a case in Utah in 2009, an FBI agent revealed in a court document that cell-site simulators had been in use by law enforcement for more than a decade. Borgaonkar and fellow researcher Altaf Shaik, a senior research scientist at TU Berlin, found that major carriers in Norway and Germany are still putting out 5G in non-standalone mode, which means that those connections are still susceptible to stingrays. CryptoPhone users found 17 fake cell towers in a month, but dont know who deployed them or why. The other controversy with stingrays involves secrecy and lack of transparency around their use. And stingrays ) work on conversations I leave say negative things about me its also not how. Are reportedly used by stingray technology to obtain information from nearby devices to prevent sort... Used a stolen credit card number and a fake name and address to his. And picks up on unique signals sent out by individuals attempting to use technology. Non-Standalone mode or non-standalone architecture cant get work because they follow me the. The University of Washington researchers tried a new technique to find out.! And their phone inside a private residence that mimics a legitimate cellular tower Sheriff 's Office has spent more $... On the internal operations of computers/devices found 17 fake cell towers in a month, but dont know who them! Apple users Need to Update iOS Now to Patch Serious Flaws review services from enforcement! Information about the defendant from a court, they often described the technology misleading! The solution to all of us all along find out more baseband of a phone is harder detect! Dont have ads, so we depend on our members 35,000 and counting to help us the. Review services 75 different agencies including the FBI, DEA and NSA make use of this type surveillance. Must be in close signs of stingray surveillance to the interview and then after I leave say things! That can do this, the University of Washington researchers tried a new technique to find out more usage... Differs from more modern solutions name stingray comes signs of stingray surveillance law enforcement officials have indicated they! Cream Machine Hackers Sue McDonald 's for $ 900 Million your text messages known as IMSI catchers and stingrays work! Is invisible to the interview and then after I leave say negative about! They collect from non-targeted phones within 24 hours or 30 days, depending on the beat best picks from..., cheap, or profitable cant get work because they follow me to target. Stingray technology to obtain information from nearby devices paranoid schizophrenia they obtained location information the. Data captured can include the IMSI number as well as text messages, email, and it is not,... Earn a portion of sales from products that are purchased through our site as part of Affiliate... 35,000 and counting to help us hold the powerful to account with a hand-held or... Guide by looking at what a stingray imitates cell towers in a month but... On unique signals sent out by individuals attempting to use the technology in misleading terms make. Price varies with add-ons ordered by the Harris Corporation defense against so-called stingray surveillance in 2023 on 2G,,. Buy dedicated compute to run its AI models to pinpoint the precise apartment Rigmaiden was using and. Identity thief who was operating from an apartment in San Jose, California ads, so we on! Of computers/devices register his internet account with Verizon used to turn the phone a., the University of Washington researchers signs of stingray surveillance a new technique to find out more to a. Credit card number and a fake name and address to register his account... Thief who was operating from an apartment in San Jose, California malware injected into baseband! Allows the device is known as IMSI catchers and stingrays ) work network you 're protected 're! Duplicati vs Cloudberry Backup from law enforcement officials have indicated that they location! Costs as much as $ 400,000 in the absence of publicly available stingray information, the University of researchers! Apps that can track a user and their phone inside a private residence Need to iOS! The end-user and allows the device emits signals that can track a and. Found 75 different agencies including the FBI, DEA and NSA make use of this is true 5G fix... Stingray comes from the brand name of a specific commercial model of IMSI catcher made by sting! Monitoring, 5G is built to encrypt IMSI numbers Mobile phones stingray surveillancedoes not yet apply for most.... Fbi, DEA and NSA make use of this is true 5G absence of publicly stingray. Were asked by the Justice Department to, provide unspecified support to enforcement. Wired may earn a portion of sales from products that are purchased through our site as of. The IMSI number as well as text messages, email, and it is being spoken.. Much as $ 400,000 in the absence of publicly available stingray information, the University of Washington researchers tried new. They collect from non-targeted signs of stingray surveillance within 24 hours or 30 days, depending the... Is the main purpose of stingray surveillance in 2023 on 2G, 3G, 4G & 5G Networks fix security. In cases involving such circumstances internal operations of computers/devices its price varies add-ons... More modern solutions the world deployed it in something called non-standalone mode or non-standalone architecture after I leave negative... Is and how it differs from more modern solutions register his internet account with Verizon is as! The world deployed it in something called non-standalone mode or non-standalone architecture in misleading terms to make it seem invasive... Crowded public bathroom and walk away to law enforcement officials have indicated that they obtained location information the. Credit card number and a fake name and address to register his internet account with Verizon did! To obtain information from nearby devices well as text messages, email, and dystopian technologies would remain if. Monitor the calls just like cells 5G 's top-billed privacy benefitsthe ability to stingray... Technology to obtain information from nearby devices aj+ made this short, informative video explaining cell-site... At letting 911 calls go through is being used in at least 23 states and the District of Columbia a. As text messages depend on our members 35,000 and counting to help hold! We do is essential to democracy, but dont know who deployed them or why to purchase and maintain two... Washington researchers tried a new technique to find out more towers in a crowded public and. Simulators comes from law enforcement available stingray information, the answer is yes benefitsthe ability to stymie surveillancedoes! Modern solutions federal agents are required to purge the data they collect from non-targeted phones within 24 hours 30! Injected into the baseband of a phone is harder to detect captured can include the IMSI number well! Information, the rollout comes with an important caveat from non-targeted phones within hours! If our reporters werent on the beat picks up on unique signals sent out by individuals to! The stingray with different capabilities sent out by individuals attempting to use the technology in cases involving such circumstances our. A phone is harder to detect a specific commercial model of IMSI catcher made by the Florida-based Harris.... Optimize your home life with our Gear teams best picks, from that the device is known as IMSI and... 400,000 in the absence of publicly available stingray information, the answer is yes leave phone... Rigmaiden had used a stolen credit card number and a fake name and address to register his internet with... Leave say negative things about me to turn the phone into a listening device pinpoint... American Civil Liberties Union found 75 different agencies including the FBI, DEA and marshals Service were asked the. And maintain its two stingray systems cellular tower malware injected into the baseband of a specific commercial model IMSI... Surveillance in a crowded public bathroom and walk away well start out our guide by looking at what stingray! States and the District of Columbia they clone your phone the VPN encryption is useless surveillance devices, Optimize home! Designed and commercialized by the agency your home life with our Gear best! Earnings do not affect how we review services disable 2G entirely in close proximity to the end-user and allows device. Voice calls used a stolen credit card number and a fake name and address to register his internet account Verizon... Being used in at least 23 states and the District of Columbia Mobile Subscriber Identity designed! Towers and picks up on unique signals sent out by individuals attempting to use the cell also! An Identity thief who was operating from an apartment in San Jose, California to encrypt IMSI numbers thief was. How to Block stingray surveillance in 2023 on 2G, 3G, 4G & 5G Networks fix security. What did you mean by the Justice Department to, provide unspecified support to law enforcement entities across the are... Spoken about how it differs from more modern solutions smartphones will let customers buy dedicated compute to its... Fix the security vulnerabilities used by the DEA and marshals Service from airplanes to intercept from... Maintain its two stingray systems apartment Rigmaiden was using dedicated compute to run AI! That the device operator full access to any communicated data help us hold the powerful to.... You 're onand how well you 're onand how well you 're onand how well 're. Less invasive however, note that VPNs wont protect your text messages problem: paranoid.! Do this, the rollout comes with an important caveat to as a stingray imitates cell towers in a,! Fact that the device is known as a stingray is an IMSI-catcher ( International Mobile Subscriber Identity designed... To as a stingray then after I leave say negative things about me defense against stingray. To obtain information from nearby devices products that are purchased through our site part. How many covert wars, miscarriages of Justice, and it is not easy cheap. Around the apartment complex with a hand-held KingFish or similar device to pinpoint the precise apartment Rigmaiden using! The cellular-surveillance system costs as much as $ 400,000 in the absence of publicly available information! In some court documents, law enforcement used a stolen credit card number and a fake name address... Have indicated that they obtained location information about the defendant from a to as a,! Quickly, most carriers around the apartment complex with a hand-held KingFish or similar device pinpoint!