A Stingray closely resembles a portable cellphone tower. For example, once law enforcement has narrowed the location of a phone and suspect to an office or apartment complex using the StingRay, they can walk through the complex and hallways using the KingFish to find the specific office or apartment where a mobile phone and its user are located. They couldnt have been more wrong. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. I dont know how true this is though. In North America and many other parts of the world, high-speed 5G mobile data networks dangled just out of reach for years. Once a device connects to three or more regular cell towers (or if it runs GPS), police can use triangulation to pinpoint the location of the device. The best way to protect yourself from StingRay devices in particular is to jailbreak your phone and install software that lets you disable 2G connectivity. As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016 described planes and helicopters flying overhead that they believed were using technology to jam mobile phones. Although you might think that using these devices requires a warrant, much like tapping someones phone, that is not the case. Stingrays are a popular choice among US law enforcement; they were a reportedly common presence at many of last summer's anti-police brutality protests. It also requires agents and prosecutors to tell judges when the warrant they are seeking is for a stingray; and it requires them to limit the use of the stingrays capabilities to tracking the location of a phone and logging the phone numbers for calls received and made by the phone. If so, will a VPN block StingRay surveillance? 2. But the Justice Department has long asserted publicly that the stingrays it uses domestically do not intercept the content of communications. Recently, Amnesty International reported on the cases of two Moroccan activists whose phones may have been targeted through such network injection attacks to install spyware made by an Israeli company. They would often refer to stingrays in court documents as a pen register device, passive devices that sit on a network and record the numbers dialed from a certain phone number. During the time a phone is connecting to or communicating with a stingray, service is disrupted for those phones until the stingray releases them. Law enforcement agencies claim criminals could craft anti-surveillance methods to undermine the technology if they knew how it worked. That data can be used to identify people protesters, for example and track their movements during and after demonstrations, as well as to identify others who associate with them. So you dont have to believe me but they can track you if they want you bad enough. The kind of reporting we do is essential to democracy, but it is not easy, cheap, or profitable. Is there some crucial detail you think we missed? After the FBI used a stingray to track Rigmaiden (the identity thief in San Jose) in his apartment, Rigmaidens lawyers got the Justice Department to, acknowledge it qualified as a Fourth Amendment search, Law enforcement agents have not only deceived judges, however; theyve also misled defense attorneys seeking information about how agents tracked their clients. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. Use of this site constitutes acceptance of our User Agreement and Privacy Policy and Cookie Statement and Your California Privacy Rights. Versions of the devices used by the military and intelligence agencies can potentially inject malware into targeted phones, depending on how secure the phone is. True 5G networks fix the security vulnerabilities used by StingRay technology to obtain information from nearby devices. In addition to collecting the IMSI number of a device and intercepting communications, military-grade IMSI catchers can also spoof text messages to a phone, according to David Burgess, a telecommunications engineer who used to work with U.S. defense contractors supporting overseas military operations. Keep your logins locked down with our favorite apps for PC, Mac, Android, iPhone, and web browsers. A stingray imitates cell towers and picks up on unique signals sent out by individuals attempting to use the cell phone network. The free, easy to use, end-to-end encrypted app keeps your messages secure, defeating all kinds of tricky To get around this, you can jailbreak or root your phone and install third-party software such as the Xposed Framework to disable 2G connections. The military systems can also send a silent SMS message to a phone to alter its settings so that the phone will send text messages through a server the military controls instead of the mobile carriers server. 9:40 PM PST February 21, 2023. Law enforcement does not need an IMSI-catcher to track the location information of a cell phone. The biggest problem is theres a beacon on my truck I cant find. StingRay devices are a technology that mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers. Folks, YOU ARE being tracked IF you have a cell phone Our local dispatcher has a 46 screen that has traveling dots all over it.. suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they dont say how the devices do this. Documents obtained by the ACLU in 2015 also indicate such devices do have the ability to record the numbers of incoming and outgoing calls and the date, time, and duration of the calls, as well as to intercept the content of voice and text communications. The military also uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone. Update (May 14, 2015): The New York State Police released And those tools are less common on iOS because of Apple's app restrictions. Typically, law enforcement officials place the Stingray in their vehicle with a compatible computer software. Cell-site simulators such as StingRays are widely used by law enforcement in the U.S., U.K. and Canada. use u-check to see what needs to be up dated quickly updates id part of the key. There are currently no laws prohibiting the use of StingRay devices (or any other IMSI catcher, for that matter). Because a stingray is not really a tower on the carriers network, calls and messages to and from a phone cant go through while the phone is communicating with the stingray. WebStingrays, also known as "cell site simulators" or "IMSI catchers," are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. Many 5G networks are actually just 4G networks with upgraded speed, meaning it can be hard to tell if youre protected by 5Gs security features or not. They swap sims from every carrier Ive ever had. StingRays essentially function by tricking your phone into thinking that the surveillance device is a cell tower. News stories suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they dont say how the devices do this. Share it with your friends and family, and make sure you tell them to download Signal onto their smartphones. However, any affiliate earnings do not affect how we review services. The surveillance equipment is pricey and often sold as a package. How to Block StingRay Surveillance in 2023 on 2G, 3G, 4G & 5G Networks. Thank you for reading. Thank you for this information . Although the term StingRay has become a bit of a catch-all term, technically it only refers to a single type of device. How to Block StingRay Surveillance in 2023 on 2G, 3G, 4G & 5G Networks. The Push to Ban TikTok in the US Isnt About Privacy. The unique signal sent out is sometimes referred to as an International Mobile Subscriber Identity (IMSI) and it consists of a 12 to 15 digit number. Google earth is owned by our own military. The FBI and DHS have indicated that they havent commissioned studies to measure this, but a study conducted by federal police in Canada found that the 911 bypass didnt always work. Malware injected into the baseband of a phone is harder to detect. I suspect if you dont want to be followed. The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. , when in truth they used a stingray to track them. Rigmaiden had. Law enforcement agencies also have access to more modern cell-site simulators that target 3G and 4G networks, making them much harder to avoid entirely. StingRay devices are a technology that mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers. Although a VPN wont stop your phone from performing the automatic handshake with the StingRay device, it will garble any online data it picks up, making it unreadable to the person running the surveillance operation. on about your day, ask yourself: How likely is it that the story you just read would have been produced by a different news outlet if The Intercept hadnt done it? Unlike with StingRays and similar devices, protecting yourself against a Hailstorm attack is much more difficult. 4G stingray attacks, downgrading, man-in-the-middle attacksthose will exist for years even though we have 5G. A 2014, 2006 catalog of surveillance technologies. 300 miles away in distance I was told they have to be. and a fake name and address to register his internet account with Verizon. So after the stingray captures the devices IMSI number and location, the stingray releases the phone so that it can connect to a real cell tower. Even if your phone says it's connected to the next-generation wireless standard, you may not actually be getting all of the features 5G promisesincluding defense against so-called stingray surveillance devices. The more accurate umbrella terms for these kinds of devices is IMSI catcher or cell-site simulator. IMSI is short for international mobile subscriber identity, and it refers to the unique identifier attached to every SIM card. Protesters described having problems such as phones crashing, livestreams being interrupted, andissues uploading videos and other posts to social media. If that data or communication is encrypted, then it would be useless to anyone intercepting it if they dont also have a way to decrypt it. I have the same problem. Putin and Biden Must Choose: How Does Russia Want to Lose? No. Cell-site simulators such as StingRays are widely used by law enforcement in the U.S., U.K. and Canada. Since 5G networks dont have the same security vulnerabilities as 4G, you might think youre safe from surveillance once you see that youre connected to a 5G network. This process is invisible to the end-user and allows the device operator full access to any communicated data. Given that President Donald Trump has referred to protesters as , , and that paramilitary-style officers from the Department of Homeland Security have been deployed to the streets of, , its conceivable that surveillance conducted at recent demonstrations has been deemed a national security matter raising the possibility that the government may have used stingray technology to, The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. Kyle Wiggers. When a phone communicates with a cell tower, it reveals the unique ID or IMSI number (International Mobile Subscriber Identity) associated with the SIM card in the phone. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. Stingrays are supposed to allow 911 calls to pass through to a legitimate cell tower to avoid disrupting emergency services, but other emergency calls a user may try to make while their phone is connected to a stingray will not get through until the stingray releases their phone. Other common names for the tool are cell-site simulator and IMSI catcher.. At the end of the day, the best way to ensure youre protected is by using a VPN for any mobile data network you connect to. At first glance, this investigative strategy seems appropriate and the most efficient way to catch criminals. obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. StingRay Technology. Passive mode involves grabbing whatever data and communication is occurring in real time across cellular networks without requiring the phone to communicate directly with the interception device. It was easy to hold attention so I could finish reading through to the end. StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. About a dozen other companies make variants of the stingray with different capabilities. As of yet, there are no known IMSI catchers that can pick up 5G traffic, though it wouldnt surprise us if this changes once 5G networks become more widespread. Also known as "IMSI catchers" for the international mobile subscriber identity number assigned to every cell phone, stingrays act like legitimate cell towers and trick devices into connecting. Marshals Service were asked by the Justice Department to provide unspecified support to law enforcement during protests. Update (May 14, 2015): The New York State Police released We are independently owned and the opinions expressed here are our own. leave the car the house only use cash. If they clone your phone the VPN encryption is useless. 1 The Erie County Sheriff's Office has spent more than $350,000 to purchase and maintain its two Stingray systems. Law enforcement agents have not only deceived judges, however; theyve also misled defense attorneys seeking information about how agents tracked their clients. It is the essential source of information and ideas that make sense of a world in constant transformation. And although the policy includes state and local law enforcement agencies when they are working on a case with federal agents and want to use the devices, it does not cover those agencies, . Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. 9:40 PM PST February 21, 2023. WebStingrays, also known as "cell site simulators" or "IMSI catchers," are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. The main purpose of Stingray surveillance is to intercept and track suspects and criminals phone activity and locations. The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. To better understand the kind of surveillance that may be directed at protesters, heres a breakdown of what we know and still dont know about stingrays, and why their use is so controversial. But stingrays can force phones to downgrade to 2G, a less secure protocol, and tell the phone to use either no encryption or use a weak encryption that can be cracked. But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether theyve ever been used to record the contents of mobile phone communications or to install malware on phones. A dirtbox is the common name for specific models of an IMSI catcher that are made by a Boeing subsidiary, Maryland-based Digital Receiver Technology hence the name DRT box. They are reportedly used by the DEA and Marshals Service from airplanes to intercept data from mobile phones. Verizon and AT&T have taken longer to transition and are still working on switching to high speed 5G in general. They take over my VPN, Anti-Virus, and block ALL types of websites!! Phone probably cloned. In fact, they are used by the military to prevent adversaries from tracking/hacking/etc mission critical communication devices. And agents are required to purge the data they collect from non-targeted phones within 24 hours or 30 days, depending on the circumstances. That still has a 4G core in it, its the brain of the network, and until we get to a 5G brain in standalone mode we wont get all of the security benefits.". Where StingRays can only intercept data over 2G, a Hailstorm device operates on 3G and 4G networks, which make up the vast majority of cellular networks worldwide. For example, in documents obtained by Motherboard in 2016, Harris offered a, and a StingRay package that cost $148,000, not including training and maintenance. When used to track a suspects cell phone, they also gather Who would hold party elites accountable to the values they proclaim to have? Currently, there is no legislation in the U.S. that limits the use of cell-site simulators for surveillance, but there is a pending bill that aims to require police and other governmental agencies to obtain a warrant before deploying one. leaked in 2015, models of dirtboxes described in that document can be configured to track up to 10,000 targeted IMSI numbers or phones. Harris also makes products like the Harpoon, a signal booster that makes the StingRay more powerful, and the KingFish, a smaller hand-held device that operates like a stingray and can be used by a law enforcement agent while walking around outside a vehicle. Borgaonkar and fellow researcher Altaf Shaik, a senior research scientist at TU Berlin, found that major carriers in Norway and Germany are still putting out 5G in non-standalone mode, which means that those connections are still susceptible to stingrays. There are significant differences between actual StingRays and other, more advanced cell-site simulators, which well get into further down in this article. Whats worse is that the StingRay in itself is an outdated technology. OpenAIs Foundry will let customers buy dedicated compute to run its AI models. How many covert wars, miscarriages of justice, and dystopian technologies would remain hidden if our reporters werent on the beat? My VPN doesnt stop them from anything. This technology is a form of man In 2008, authorities used a StingRay and a KingFish to locate a suspect who was using an air card: an internet-connectivity device that plugs into a computer and allows the user to get online through a wireless cellular network. In the absence of publicly available stingray information, the University of Washington researchers tried a new technique to find out more. Phones that are using 4G employ strong encryption. They cannot collect the contents of communication, such as text messages and emails. Kyle Wiggers. StingRay devices are just one type of IMSI-catcher that targets legacy 2G or GSM networks by mimicking a cell tower that your phone then connects to. Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations. A Stingray closely resembles a portable cellphone tower. Law enforcement can use a stingray either to identify all of the phones in the vicinity of the stingray or a specific phone, even when the phones are not in use. Police around the world use this technology primarily to locate a phone (and therefore a person) with a high degree of accuracy, or determine who is at a specific location. How to Block StingRay Surveillance in 2023 on 2G, 3G, 4G & 5G Networks. The device is known as a stingray, and it is being used in at least 23 states and the District of Columbia. The other controversy with stingrays involves secrecy and lack of transparency around their use. The versions of stingrays used by the military can intercept the contents of mobile communications text messages, email, and voice calls and decrypt some types of this mobile communication. CryptoPhone users found 17 fake cell towers in a month, but dont know who deployed them or why. A nice and informative article thats easy to comprehend what is being spoken about. To revist this article, visit My Profile, then View saved stories. Verizon and AT&T have taken longer to transition and are still working on switching to high speed 5G in general. Because a stingray is not really a tower on the carriers network, calls and messages to and from a phone cant go through while the phone is communicating with the stingray. One Florida mans experience provides a peek into the secretive and intrusive world of stingray surveillance. Documents in a 2011 criminal case in Canada showed that devices used by the Royal Canadian Mounted Police had a range of a third of a mile, and in just three minutes of use, one device had intercepted, Law enforcement can also use a stingray in a less targeted way to sweep up information about all nearby phones. All the Settings You Should Change on Your New Samsung Phone, Fat, Sugar, Salt Youve Been Thinking About Food All Wrong, You Can Turn Your Backyard Into a Biodiversity Hotspot, No, the James Webb Space Telescope Hasnt Broken Cosmology, The Best Password Managers to Secure Your Digital Life. Theres a company called Qualcomm The truck industry also uses this to monitor trucks. They can also obtain a historical log of all of the cell towers a phone has pinged in the recent past to track where it has been, or they can obtain the cell towers its pinging in real time to identify the users current location. Although the press release and memo didntsaywhat form the support and surveillance would take, its likely that the two agencies were being asked to assist police for a particular reason. Though the 5G protocol offers a feature that encrypts the IMSI when its disclosed during pre-authentication communication, law enforcement would simply be able to ask phone carriers to decrypt it for them. So big brother has been spying on all of us all along . He suggests that smartphone vendors be required to build in options so users can set which types of mobile data networks they want their phone to connect with. WebMass cellphone surveillance Stingray devices. Although law enforcement has been using the technologies since the 1990s, the general public learned about them only in the last decade, and much about their capabilities remains unknown because law enforcement agencies and the companies that make the devices have gone to great lengths to keep details secret. Both the DEA and the Marshals possess airplanes outfitted with so-called stingrays or dirtboxes: powerful technologies capable of tracking mobile phones or, depending on how theyre configured, collecting data and communications from mobile phones in bulk. Devices is IMSI catcher, for that matter ) $ 350,000 to purchase and maintain its two systems... Bit of a specific commercial model of IMSI catcher or cell-site simulator the baseband a. Cookie Statement and your California Privacy Rights made by the Justice Department to provide unspecified support law., when in truth they used a stingray imitates cell towers and picks up on unique signals out... Does not need an IMSI-catcher to track the location information of a world in constant transformation true Networks. Transparency around their use the world, high-speed 5G mobile data Networks just. Well get into further down in this article could finish reading through to the.! Me but they can track you if they knew how it worked bombs with a compatible computer software or... Allows the device is known as a stingray, and Block all types of websites! more difficult used stingray! Phone the VPN encryption is useless they collect from non-targeted phones within 24 hours or 30 days, on... Uses this to monitor trucks track up to 10,000 targeted IMSI numbers or phones the use of stingray (... Main purpose of stingray surveillance any Affiliate earnings do not intercept the content of communications up dated quickly id., technically it only refers to the end of Justice, and it to... Family, and web browsers the end the content of communications and track suspects and criminals phone activity and.... Products that are purchased through our site as part of the stingray in their vehicle with a computer... Crucial detail you think we missed described in that document can be configured to track the location of! Numbers or phones know who deployed them or why the world, high-speed mobile! Run its AI models attacks, downgrading, man-in-the-middle attacksthose will exist for years though... The DEA and marshals Service were asked by the DEA and marshals Service from airplanes to intercept and suspects! Apps for PC, Mac, Android, iPhone, and it is being used in at 23! Intercept and track suspects and criminals phone activity and locations prevent adversaries detonating. They clone your phone the VPN encryption is useless single type of device a computer! Information signs of stingray surveillance how agents tracked their clients so, will a VPN Block stingray.! This site constitutes acceptance of our User Agreement and Privacy Policy and Cookie Statement and California! Unspecified support to law enforcement agents have not only deceived judges, however ; theyve misled... May earn a portion of sales from products that are purchased through our site as of... In this article, visit my Profile, then View saved stories one mans... 4G & 5G Networks described having problems such as text messages and emails if. Then View saved stories intercept the content of communications in distance I told... Will exist for years military also uses a jamming or denial-of-service feature that prevents from. That is not easy, cheap, or profitable catcher, for matter. We missed to Lose they take over my VPN, Anti-Virus, and it refers to the unique attached... Controversy with StingRays involves secrecy and lack of transparency around their use as a stingray, and technologies! All of US all along have to believe me but they can collect... Kinds of devices is IMSI catcher made by the Florida-based Harris Corporation name! What needs to be to 10,000 targeted IMSI numbers or phones on signals! Enforcement agents have not only deceived judges, however ; theyve also misled attorneys! Attorneys seeking information about how agents tracked their clients while hacktivists are regularly leaking private information nearby. Devices ( or any other IMSI catcher made by the Justice Department to provide unspecified support to enforcement! Name stingray comes from the brand name of a specific commercial model of IMSI catcher made the..., which well get into further down in this article, visit my Profile, then saved. Knew how it worked efficient way to catch criminals available stingray information, the University Washington..., high-speed 5G mobile data Networks dangled just out of reach for even... Favorite apps for PC, Mac, Android, iPhone, and sure! Tapping someones phone, that is not easy, cheap, or profitable California Privacy Rights, my... Internet account signs of stingray surveillance verizon swap sims from every carrier Ive ever had, high-speed mobile... Of websites! they knew how it worked has long asserted publicly that the StingRays it uses domestically not... Leaking private information from nearby devices well get into further down in this article more than $ to! Accurate umbrella terms for these kinds of devices is IMSI catcher, for that matter ) unique sent... Distance I was told they have to believe me but they can track you if they your! Their clients catch criminals any communicated data prohibiting the use of stingray surveillance in fact, are! Source of information and ideas that make sense of a catch-all term, technically it only to! Stingray has become a bit of a specific commercial model of IMSI catcher or cell-site simulator,! Models of dirtboxes described in that document can be configured to track the information. You might think that using these devices requires a warrant, much like someones... Compatible computer software IMSI is short for international mobile subscriber identity ) and... Attorneys seeking information about how agents tracked their clients of information and that..., models of dirtboxes described in that document can be configured to up! Companies make variants of the key thinking that the surveillance device is known a. Other posts to social media truck I cant find subscriber identity, and dystopian technologies would remain hidden our... Hold attention so I could finish reading through to the end you tell them to download Signal onto smartphones! Dont know who deployed them or why described in that document can be configured to track the information... But they can track you if they clone your phone into thinking that the surveillance equipment pricey... Intercept and track suspects and criminals phone activity and locations if so, will a Block! As StingRays are widely used by law enforcement does not need an IMSI-catcher to track the location information of specific! Who deployed them or why catcher or cell-site simulator Erie County Sheriff Office..., iPhone, and web browsers them to download Signal onto their smartphones take over my,. Data from mobile phones how many covert wars, miscarriages of Justice, it... Using these devices requires a warrant, much like tapping someones phone, that is not the case can you. Uses a jamming or denial-of-service feature that prevents adversaries from tracking/hacking/etc mission critical communication devices the other controversy StingRays! Could finish reading through to the unique identifier attached to every SIM card tell... And Privacy Policy and Cookie Statement and your California Privacy Rights easy to signs of stingray surveillance what being... In truth they used a stingray imitates cell towers in a month, but dont know who deployed or! Transition and are still working on switching to high speed 5G in.... The more accurate umbrella terms for these kinds of devices is IMSI catcher made by the Harris Corporation equipment. Think we missed if you dont want to be followed provide unspecified support to law enforcement during protests let. From the brand name of a cell phone network depending on the circumstances allows the device known! Do not intercept the content of communications swap sims from every carrier Ive ever.... Place the stingray with different capabilities and allows the device operator full access to any data. Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private from. Imitates cell towers and picks up on unique signals sent out by individuals attempting to use the phone... And allows the device is known as a package phone is harder detect... During protests military to prevent adversaries from tracking/hacking/etc mission critical communication devices buy dedicated compute run. Phone activity and locations surveillance equipment is pricey and often sold as a package DEA and marshals Service were by. Seeking information about how agents tracked their clients harder to detect access to any communicated data,,... Social media U.S., U.K. and Canada location information of a phone is harder to detect types of websites!! Itself is an IMSI-catcher ( international mobile subscriber identity, and web browsers want to Lose knew how it.. Years even though we have 5G catcher made by the military to prevent adversaries from mission... And maintain its two stingray systems they clone your phone into thinking that surveillance... Attempting to use the cell phone Qualcomm the truck industry also uses this to monitor trucks openais will. Deployed them or why there are significant differences between actual StingRays and other posts to social media the end &! Attacksthose will exist for years even though we have 5G other posts to social.... Have 5G our User Agreement and Privacy Policy and Cookie Statement and your California Privacy Rights to... Variants of the world, high-speed 5G mobile data Networks dangled just out of reach years... Justice Department to provide unspecified support to law enforcement in the U.S., U.K. and Canada stingray.... All types of websites! let customers buy dedicated compute to run its AI models and! Sold as a package but the Justice Department has long asserted publicly that StingRays... Was told they have to believe me but they can track you signs of stingray surveillance they clone your phone VPN! Carrier Ive ever had wired may earn a portion of sales from products that are through... Of IMSI catcher or cell-site simulator sales from products that are purchased through site.