Multiple US agencies have purchased this mysterious mobile eavesdropping device

(Image credit: Shutterstock / GoodStudio)

Multiple US federal agencies have obtained a mysterious new eavesdropping device thought to be designed to monitor 4G-enabled mobile phones.

Very little is known about the ‘Crossbow’ device, other than it iterates on the Stingray ISMI-catchers manufactured by Harris, used to trace location data and listen in on phone calls. 

While devices of this kind are used by law enforcement and intelligence across the globe, the air of mystery around the kit and a lack of transparency over the way in which it is being deployed has given rise to concern it could be used to infringe upon civil liberties.

Procurement documents show the US Marshals placed an order with Harris for Crossbow devices worth $1.7 million, while the US Army and Navy made similar purchases worth circa $380,000.

Mobile surveillance

ISMI-catchers, or international mobile subscriber identity-catchers, are able to mimic the qualities of a cellphone tower and, by this mechanism, record the SIM card identity, eavesdrop on calls, access text messages and capture location data.

The devices allow law enforcement agencies, including in the UK, to monitor the movement of known criminals without their knowledge.

In targeting a specific individual, however, it is possible ISMI-catchers also intercept data relating to civilian users - and are also said to interfere with calls to emergency numbers.

The American Civil Liberties Union (ACLU) has voiced concerns over the lack of publicly available information about the devices and the manner in which they are used, which the organisation suggests restricts the ability to assess the propriety of the devices.

“The public, judges, and lawmakers cannot provide effective oversight without basic information about the capabilities of this new military-grade equipment,” said Alexia Ramirez, ACLU member.

However, according to a spokesperson for the US Marshals, the agency is not at liberty to discuss the use of certain equipment, for fear of handing an advantage to criminal parties under investigation.

“We cannot confirm the use of any specific, sensitive equipment and techniques that may be deployed by law enforcement. To do so would allow criminal defendants to determine our capabilities and limitations in this area,” said Drew J. Wade, Chief of the Office of Public Affairs at the US Marshals.

“With that said, it is the case that US Marshals use various investigative techniques to pursue and arrest violent felony fugitives based on pre-established probable cause...These techniques are carried out consistent with federal law and are subject to court approval,” he added.

While many app developers claim to offer solutions to detect the presence of ISMI-catchers in a specific area, reports suggest these apps are easily circumvented and therefore ineffective.

Via Motherboard

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras