Triggerfish (surveillance) explained

Triggerfish describes a technology of cell phone interception and surveillance using a mobile cellular base station (microcell or picocell). The devices are also known as cell-site simulators or digital analyzers.

Device capability

Controversy and concerns

Neither the user nor the cell phone provider need to know about Triggerfish for it to be used successfully.[2] A court order is required, but the device circumvents provisions of CALEA barring use of pen register or trap-and-trace devices.[3]

The device is similar to but distinct from an IMSI catcher.[4]

On March 28, 2013, the Washington Post reported that federal investigators "routinely" use the systems to track criminal suspects, but sometimes fail to explain the technology sufficiently to magistrate judges from whom they seek search warrants.[5]

See also

References

  1. News: FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs. Ryan Singel. 2007-12-20. Wired.
  2. Web site: With Technology Like This, Who Needs the Law?. 2008-11-14. Rachel Myers. ACLU.
  3. Web site: FOIA docs show feds can lojack mobiles without telco help. Julian Sanchez. 2008-11-16. Ars Technica.
  4. Web site: Cyber Espionage : The Triggerfish. 2008-11-18. Infected Packets. 2016-12-15. Jonathan Racicot.
  5. News: Nakashima. Ellen. Little-known surveillance tool raises concerns by judges, privacy activists. The Washington Post. 28 March 2013. 2013-03-28.

Further reading