Israeli-Made Stingray Device Found In The Hands Of South African Businessmen

from the snooping-for-the-masses! dept

IMSI catchers: not just for law enforcement agencies anymore! (via Slashdot) The cellphone signal-slurping devices are normally found in the hands of cops and investigators and carefully hidden from public examination by a fine mesh of redactions, withheld documents, non-disclosure agreements and dismissed cases. But two South African men walked into a sting operation, leaving behind an intriguing bit of interception equipment.

At 10am on Friday, [two people] were lured to Irene Mall outside Pretoria in a police and intelligence sting that resulted in their arrest for illegally being in possession of the cellphone-tapping, -tracking and -locator machine worth over R25 million.

The machine, specially installed in a German-made multi-purpose vehicle, was impounded.

The Star knows the identity of the two arrested men – a top businessman in the gold industry and a bank employee – but can only identify them once they have appeared in court.

The device recovered during this appears to be some sort of Stingray-esque device, albeit not one manufactured by Harris Corporation. Instead, “The Grabber” (as it’s known) is manufactured in Israel. “The Grabber” is likely not its official name, as the web is largely free of other references to an IMSI catcher with this name. Israel’s Rayzone Group offers a selection of interception devices, but so far, only one (the Pirahna) has any documentation that has surfaced publicly.

Like any powerful interception device, its sales are supposed to be limited to government agencies. From what’s being reported here, the South African government was involved, but not in the typical way.

The Hawks [special investigative unit] said senior government officials are believed to have helped the suspects purchase the device – which is highly regulated in South Africa and globally.

According to the report, an official from the Department of Public Works is alleged to have written a fraudulent letter “on a government letterhead” claiming that the government wanted to buy the device.

Putting everything together from multiple reports, it appears the device was used (or intended to be used) to intercept communications of government officials overseeing certain lucrative bidding processes: small scale industrial/economic espionage by private persons acting on behalf of both themselves and a few government officials.

If the claims made by unnamed police officials are to be believed, the “Grabber” is possibly more powerful than Harris’ Stingrays.

Police sources told The Star that evidence showed The Grabber, which could bug at least 10,000 lines at a time, had been used to advance certain parties in commercial transactions.

MyBroadband brings these claims a bit more down to earth with a longer examination of the device’s purported capabilities. It appears to be, more or less, a Stingray. It imitates a cell tower and boosts its signal to route as many phone calls through it as possible. It can “grab” phones and track their location. According to the unnamed “security professional” interviewed by MyBroadband, it’s unlikely the device can actually intercept calls, which makes the police sources’ claims of “bugging 10,000 lines” particularly suspect.

In the abstract, a Stingray-device can gather any number of “lines,” but actual interception (i.e., “bugging”) of calls and text messages tends to be on a smaller scale. Whether or not this device can actually intercept communications (as the Stingray has been reported to do), it’s likely true that it does have some interception capabilities, considering that in this context (snooping on government contract bidding, hints of blackmail) call records and phone location would be of minimal use.

Documentation on devices sold by Israel’s Rayzone Group do hint at some powerful interception capabilities. Its “Pirahna” offers “remote control” of targeted devices, and additional software provides even more access via a targeted phone’s WiFi connection.


However, there’s not enough information available to ascertain exactly what device the South African police have recovered. But the technology has been around for years and a number of companies worldwide are steadily improving capabilities.

Finding one of these in the hands of private citizens is a bit surprising, but certainly can’t be completely unexpected. Stingray-type technology was never going to remain under strict government control. The tech itself can be duplicated and utilized by criminals — either by fraudulently obtaining a device from a manufacturer or by putting one together themselves. China’s Amazon (AliBaba) has listings for IMSI catchers and Bruce Schneier points to researchers at 2010’s Def Con displaying a home-built IMSI catcher that ran about $1,500 for parts. So, the capabilities the police feel they enjoy exclusively are undoubtedly in the hands of civilians.

What is remarkable is the circuitous nature of the criminal activity, which involved government insiders providing the paperwork needed for the acquisition, which was then deployed against other government officials to the mutual benefit of both.

Filed Under: , , , , ,
Companies: rayzone group

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Israeli-Made Stingray Device Found In The Hands Of South African Businessmen”

Subscribe: RSS Leave a comment
14 Comments
Anonymous Coward says:

Re: Re:

This is why we need encryption

No, this is why we need [mutual] authentication. Mobile phones have encryption, at least sometimes, but GSM phones trust the network. They’ll connect to whatever network is broadcasting the correct ID without verifying it’s really operated by the correct people. And if the network says it doesn’t support encryption, they’ll turn encryption off (and inform the user—unless the network tells them to keep it quiet!).

Authentication won’t stop telco-assisted spying though. It would be technically feasible to use Chaumian cryptocurrency and onion routing to buy network access without providers tracking you (as the Freedom network showed a decade ago).

For now, force your phone into a 4G/LTE-only mode if you can. The newer standards do have decent authentication, and most stingray users have not yet upgraded to ones with 4G support (which might only allow location tracking anyway, not data interception).

GEMont (profile) says:

Like flies to shit

Any device/technology/invention developed by governments, at taxpayer’s expense for gaining access to things that governments are not supposed to have, will, absolutely and irrevocably, find its way into the hands of corporations, criminals and others, who wish to use it for the exact same purpose.

The more Government weakens security to allow its own access to data which does not belong to it, the more they enable the ability of the criminal/business elements of the world to gain that same access to data that does not belong to them.

Where once government was “supposedly” in place to prevent crime against the public, and support the population that paid its wages, it has now become the best source for means/methods; for use by itself and others, of robbing that same public that still pays its wages.

Government no longer fills any public positive position and should be eliminated and maybe replaced with something that might actually be able to fulfill its mythological purpose.

Like a screw driver perhaps, or a pencil.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...