The 2024 Democratic National Convention (DNC) in Chicago may have seen the deployment of a cell-site simulator, a device that mimics cell towers to intercept phone signals and collect sensitive data. This revelation, based on an investigation by the Electronic Frontier Foundation (EFF) and WIRED, has sparked concerns about privacy, transparency, and the potential misuse of such surveillance tools.
What Is a Cell-Site Simulator?
Cell-site simulators, often known as Stingrays, can secretly capture call data, location information, and app traffic from all mobile devices within range. These devices raise alarms for privacy advocates, who fear they could be used to monitor protests and suppress dissent. Their use is often controversial, especially when it occurs without public knowledge or proper legal oversight.
Surveillance During the DNC Amid Protests
The DNC, held in Chicago amidst widespread protests over Israel’s actions in Gaza, drew significant attention both politically and socially. While political elites gathered at exclusive events, thousands of demonstrators faced a heavy presence of law enforcement, including officers from the Secret Service, U.S. Capitol Police, and local authorities. Given the tense environment, WIRED launched an investigation into possible surveillance practices.
Using Rayhunter, a tool developed by the EFF to detect anomalies linked to cell-site simulators, WIRED reporters equipped with Android phones and Wi-Fi hotspots surveyed signals at protest locations and event venues across the city. The investigation aimed to determine whether such surveillance technology was in use during the high-profile event.
Early Findings and Breakthrough
Initially, the survey didn’t uncover solid evidence of a cell-site simulator being used. However, further analysis of the data months later revealed troubling patterns. By using advanced detection methods, EFF technologists discovered a device carried by WIRED reporters that switched unexpectedly to a new cell tower on August 18, just before the DNC officially began. The new tower requested the device’s IMSI (International Mobile Subscriber Identity) number before abruptly disconnecting, a pattern consistent with a cell-site simulator’s operation.
Cooper Quintin, a senior technologist at EFF, expressed concern over the findings: “Normal towers don’t behave this way.” While the evidence isn’t definitive, the data strongly suggests that a cell-site simulator may have been deployed. However, the identity of the party responsible remains unclear, with possibilities ranging from government agencies to foreign actors or other unknown entities.
Legal Questions and Oversight Gaps
Under Illinois law, law enforcement agencies are required to obtain a warrant before deploying cell-site simulators. Federal agencies, including the Department of Homeland Security (DHS), must also seek a warrant unless there’s an imminent national security threat. However, a 2023 report from the DHS Inspector General raised concerns over the failure of the Secret Service and Homeland Security Investigations to consistently follow these legal procedures, further fueling concerns about potential misuse of the technology.
The Chicago Police Department denied deploying a cell-site simulator at the DNC. However, the Secret Service refused to comment on the matter, citing its policy of not discussing the “means and methods” used for National Special Security Events. Efforts to get comments from other officials, including the DHS and DNC organizers, were unsuccessful.
History of Covert Surveillance
Cell-site simulators have a controversial history. In 2019, the FBI accused Israel of using a cell-site simulator near the White House, though Israel denied the claim. EFF has previously detected suspicious activity in Washington, D.C., an area known for its concentration of embassies and government offices, suggesting that such tools are used in politically sensitive locations.
Concerns from Privacy Advocates
The potential use of a cell-site simulator at the DNC has alarmed privacy advocates. Nate Wessler of the ACLU emphasized the seriousness of the findings, stating that if the detected anomalies were indeed caused by a cell-site simulator, it would signify an alarming attempt to track and identify individuals, especially protesters. However, Wessler also acknowledged that law enforcement might have used the tool for lawful purposes in some cases, such as monitoring security threats.
Still, Wessler expressed concern over the lack of transparency surrounding such surveillance practices. “The ambiguity around their use is chilling,” he said, adding that this uncertainty could undermine the public’s confidence in their ability to express themselves without fear of surveillance.