A border patrol helicopter was seen circling Capitol Hill yesterday. Theories range from scare tactic, planning for future raids or even active stingray snooping.
So if you have a stingray detector in the flight path maybe check your logs.
https://www.flightradar24.com/data/aircraft/n741c
https://bsky.app/profile/victoriascott.bsky.social/post/3lnonj253os2h
I've confirmed that the Orbic Speed (RC400L) Mobile Hotspot is unlocked (well, not locked' is more accurate). I have a Ting SIM in mine which was new and factory sealed and the hot spot is working (as well as #Rayhunter, which works with or without an activated SIM - they do come with a unactivated Verizon SIM already installed).
I bought 10 more of them and plan to load them and give them out to activists, organizers, and people concerned with such things. (then I wanna look into cheap meshtastic radios)
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
Interesting. https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying #EFF #rayhunter it seems all the devices listed on eBay are locked to Verizon. I’m wondering would it be possible to get an unlocked device? Or if that would be necessary in Australia
A question for anyone who has made their own, working, #rayhunter from an #orbic #rc400l ...
After reading the #EFF material, there doesn't seem to be any conclusion on whether an active #Verizon #SIM card is needed to process cell tower signals for analyzing. Can someone confirm either way if one is required?
Additionally, does the Orbic need to be officially unlocked for RayHunter to work?
Man, the kit it takes to visit Minneapolis is a chore…
#alwaysBeWardriving #rayHunter #wardrive #allTheWifi @WiGLEnet
Shoutout to the @eff!
Just got my hotspot in the mail and installing #Rayhunter couldn't have been simpler.
Can't wait to try it out!
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
Meet Rayhunter: A New Open Source Tool from @eff to Detect Cellular Spying
The Electronic Frontier Foundation has released an #opensource project called #Rayhunter. It is designed to run on an inexpensive (~$20) mobile hotspot and look for signs of mobile spying devices called cell-site simulators. Also known as Stingrays or IMSI catchers, they masquerade as legitimate cellphone towers, tricking phones w/in a certain radius into connecting to the device rather than a tower.
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
My Orbic RC400L arrived to install Rayhunter on. I can tell this will take a lot of time understanding the more important parts of the LTE RRC protocol because I have no idea what I’m doing.
Hopefully some more interesting data will appear tomorrow when I have it record the drive to the office.
#privacy #surveillance #eff #infosec #mobile #rayhunter
I was not expecting this to arrive so quickly, but it’s here and I already have #Rayhunter installed on it. Going to take it out for a drive this evening.
I think this has some value above and beyond catching stingrays because of what it collects when recording. :)
A New Tool to Detect Cellular #Spying | EFFector 37.3
This edition of the newsletter covers our new open source tool to detect cellular spying, #Rayhunter ; The #Foilies2025 , our tongue-in-cheek awards to the worst responses to public records requests; and our recommendations to the #NSF for the new #AI Action Plan to put people first.
https://www.eff.org/deeplinks/2025/03/new-tool-detect-cellular-spying-effector-373
A note on the name: Rayhunter is named such because Stingray is a brand name for cell-site simulators which has become a common term for the technology. One of the only natural predators of the stingray in the wild is the orca, some of which hunt stingrays for pleasure using a technique called wavehunting. Because we like Orcas, we don’t like stingray technology (though the animals are great!), and because it was the only name not already trademarked
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
@kuketzblog
Danke, aber wie komme ich an das Kästchen? Ist zwar schade, dass sich ein fake call nicht mit dem Handy entlarven lässt, aber auch extra HW hole ich mir gern, wenn ich mich damit effizient schützen kann.
#eff #rayhunter #imsicatcher
EFF veröffentlicht Rayhunter: Open-Source-Tool zur Erkennung von IMSI-Catchern. Rayhunter spürt Cell-Site-Simulatoren (CSS) auf, die Handys täuschen und überwachen. Es läuft auf günstiger Hardware und warnt bei verdächtigen Aktivitäten.
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
Quelqu'un a réussi à acheter un joujou 4G-Wifi hotspot Orbic en France ? J'aimerai éviter Amazon (qui de toute façon ne veut pas le livrer en France) et je n'ai pas de compte Ebay. C'est pour installer #Rayhunter https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
Successfully installed #Rayhunter. Works good. Don't have a stingray to test it with ... but I know who doeeeesssss. Can I leave it on record and have it save everything as I drive around? Hmm, testing testing.
Open-source tool 'Rayhunter' helps users detect Stingray attacks
Meet #Rayhunter: A New #OpenSource Tool from #EFF to Detect Cellular Spying
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying