{"id":123,"date":"2015-06-16T15:32:06","date_gmt":"2015-06-16T20:32:06","guid":{"rendered":"http:\/\/www.thisgeekiknow.com\/?p=123"},"modified":"2024-08-12T18:38:15","modified_gmt":"2024-08-12T18:38:15","slug":"somethings-fishy-with-your-cellphone","status":"publish","type":"post","link":"https:\/\/oakwoodexperience.com\/staging\/2633\/somethings-fishy-with-your-cellphone\/","title":{"rendered":"Something&#8217;s Fishy With Your Cellphone"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"\/wp-content\/uploads\/2015\/06\/_d_improd_\/2680257100_69b12c6e7d_q_f_improf_377x377.jpg\" alt=\"\" width=\"377\" height=\"377\" data-mce-width=\"40\" data-mce-height=\"40\" \/><\/p>\n<p style=\"text-align: right;\">image courtesy of <a href=\"https:\/\/www.flickr.com\/photos\/seattlemunicipalarchives\/2680257100\/in\/photolist-55R24j-9zxT76-9yMWGo-i82tpq-9uNQfa-57gjm3-69KEhx-7mmujZ-c6dR8j-i6yPvN-68MrFn-65Mqqi-6j9KJ5-9dJZ9n-9uMwMX-fhqNsN-2Y7w5-rvC7bG-9uNR56-9uRS6E-dwHFiv-7nkBSM-9djc1S-fp5sj-a9WcZv-NUaU9-hTCjMg-oksT8q-5fp9zV-abavKw-abavwf-a1C62U-8caf8k-pkJSdK-ad3ak2-d3EEJC-a1Pcua-mej9WX-2Bm57-frFrqi-5TcbyP-79io-9uNU5t-5g8iNR-9d3LHi-KD539-cZcLeW-8kwccV-djKVDF-P4qQF\" target=\"_blank\" rel=\"noopener\">Seattle Municipal Archives<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>In the United States, there are somewhere in the neighborhood of 325 million cellular devices in use (15), comprising phones, tablets, notebooks, hotspots, and, most recently, vehicles. We are generating a lot of data on these devices, and these devices are generating a lot of data\u2014about us. At any given point in time and geography, there is a chance that that data generated by your devices is being captured and analyzed. How much of a chance? We don\u2019t know.<\/p>\n<p>&nbsp;<\/p>\n<p>THE BASICS<\/p>\n<p>The process is made possible using a device most commonly called a StingRay, sold by Harris Corporation headquarted in Melbourne, Florida. (Some names of the company\u2019s similar devices are AmberJack, KingFish, Harpoon, and RayFish; for simplicity, I\u2019ll refer to all of them as StingRay, because the purpose of each device is the same: to capture data about mobile device and their users.) The StingRay is a mobile device that presents itself to cellular devices as a cell tower. Today most of these devices are used in a police surveillance vehicle, but that\u2019s starting to change, as you\u2019ll see later. The device inside the vehicle communicates with antennas on the police vehicle, which determine the distance and direction of the targeted device in relation to the StingRay and in relation to other cell towers. (1)<\/p>\n<p><a href=\"https:\/\/www.thisgeekiknow.com\/wp-content\/uploads\/2015\/06\/4757257615_b19c5b18f7_z.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-128 aligncenter\" src=\"\/wp-content\/uploads\/2015\/06\/_d_improd_\/4757257615_b19c5b18f7_z-199x300_f_improf_199x300.jpg\" alt=\"Cell Tower\" width=\"199\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: right;\">image courtesy of <a href=\"https:\/\/www.flickr.com\/photos\/pug50\/4757257615\/in\/photolist-8fobX2-9yBmH4-8ABAT1-cDn7RN-6CzQa1-8ABARq-8vDmm2-ak7nkz-8u2MTD-nWTM9w-kWGfhg-8oZ5DA-dRpX7T-q9C9YP-4vHH1S-4oh2fS-7Kgdug-cwBTDm-7ShrxY-9kUyso-nTtnX2-owrpfv-coT8gd-8YUbo8-fyMuZR-aDDjdb-9TiRCS-9FBY1m-7YrFUx-nf3LQP-5o1R3p-nRxR3Y-7YuVTW-7Jfquh-bVYGMr-9KyQpS-dPSgxV-q8fDZe-btrp7J-8jTeHf-dRSVBq-9AAS7c-9qXhJQ-7Jbumg-cdkTZs-casNF-nXHUMp-8fVbwU-aDMzrc-iaX8Lz\" target=\"_blank\" rel=\"noopener\">Pug50<\/a><\/p>\n<p>You would expect that when a call is active on your phone, it would be constantly seeking out the nearest tower. However, in anticipation of activity, mobile devices are doing that constantly. Because the StingRay presents itself as a cell tower, your phone will connect to it when it is nearby, and certain data will be routed through the StingRay just as it would a cell tower. The device and its associated software collect data from all the cellular devices that connect to it. The data is then relayed to a connected computer, which displays the collected data and translates it for the operators of the device. At that point, the traffic is passed on to the cell tower, and the user of the phone never knows. (1)<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.thisgeekiknow.com\/wp-content\/uploads\/2015\/06\/273942446_d5acc05c84_z.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-125 alignnone\" src=\"\/wp-content\/uploads\/2015\/06\/_d_improd_\/273942446_d5acc05c84_z-291x300_f_improf_291x300.jpg\" alt=\"disguised cell tower\" width=\"291\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: right;\">image courtesy of<a href=\"https:\/\/www.flickr.com\/photos\/miheco\/273942446\/in\/photolist-eiNtQ5-f89cg-qd2xC-vktSb-F27NS-nMxmaS-nMxmds-nvmvNr-ne9z2g-4xJRoq-5ZskyG-ypWAo-9euboB-kXyWyt-kXzzgK-5Msngx-xoY1s-7raXUh-5UGYhc-4MSaZc-ne9MQ4-4Ch8y1-7ugJe-aHLbVv\" target=\"_blank\" rel=\"noopener\"> miheco<\/a><\/p>\n<p>When I spoke of the data collected, what exactly would that be? Specifically, your phone has an identifier, but I was not able to find out if that would be the phone\u2019s serial number or its MAC address; both of those are unique identifiers. Whichever it is, it is collected, along with the telephone number for all connecting devices, and all telephone numbers dialed out to other devices, including those for text messages. The approximate location of the phone as determined using the antennas on the vehicle is also captured. At this time, law enforcement sources have said that the StingRay device as sold to law enforcement (police departments) is not configured to intercept the contents of calls and text messages.<\/p>\n<p>&nbsp;<\/p>\n<p>THE TECHNOLOGY<\/p>\n<p>At the Black Hat conference in 2011, Mike Tassey and Richard Perkins demonstrated their Wireless Areal Surveillance Platform (WASP). As far as we know, it was a proof-of-concept exercise that has not been mass-replicated. It was a prototype of a device that is capable of quite a bit of data mining. It is very significant that a device that cost no more to build than $6,200 was proven capable of wireless network sniffing and cracking, cell tower spoofing, cell phone tracking and call interception, data exfiltration (taking data out of its intended environment), and video surveillance. (10)<\/p>\n<p>Harris\u2019s StingRay costs considerably more than that, so it is reasonable to assume that the device build by Tassey and Perkins lacked some important capability or durability that exists in the StingRay. Some of Harris\u2019s other devices can be used to conduct Denial-of-Service attacks on cell phones, monitor voice traffic, and amplify the range and power of the activity of the StingRays (7).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-129 aligncenter\" src=\"\/wp-content\/uploads\/2015\/06\/_d_improd_\/15139301887_548f61aeab_q_f_improf_288x288.jpg\" alt=\"StingRay\" width=\"288\" height=\"288\" \/><\/p>\n<p style=\"text-align: right;\">image courtesy of <a href=\"https:\/\/www.flickr.com\/photos\/29801588@N08\/15139301887\/in\/photolist-nt1FUe-sfxF63-qd2yLX-nf2i45-bLfqdk-8Zj8rr-rUziak-sdD9yS-sbEams-sfBMoV-p4MP9M-qYc7By-p4Nv21-6qjTun-fEdEsr-n8LVuR-p4NT1\" target=\"_blank\" rel=\"noopener\">olympiacopwatch<\/a><\/p>\n<p>Your cell phone will communicate with the tower using the latest and best protocol of which it is capable. Most current phones sold in the United States use at least 3G signals, and of course the newest ones use 4G. 3G and 4G communications are much more secure than the older 2G (EDGE network and networks that emerged around the same timeframe). When you are traveling and your phone can\u2019t find a 3G or 4G network, if there is a 2G signal available, it will drop to the 2G network signal. On that signal, your handset or device will readily accept communication from some other device that is calling itself a cell tower (4). Carrier cell towers have certain names that your phone or other mobile devices recognize; rogue towers don\u2019t have names in the range of recognizeability (14). The StingRay jams 3G and 4G signals, forcing nearby phones to use the less-secure 2G signal. Law enforcement agencies are beginning to get a little nervous because mobile carriers are planning shutdowns of the 2G network; AT&amp;T is planning to shut its 2G network down in 2017 (4). I was unable to find out how exactly this will affect StingRay devices. Unless the phone receives some firmware update, it may still accept the 2G drop if the 3G and 4G signals are jammed, but as the agencies are scrambling to acquire updated hardware to replace the existing StingRay devices, there must be something that will stop working as these networks get shut down. Newer networks are still susceptible to location tracking, but not to the other forms of interception and data collection (4).<\/p>\n<p>Harris isn\u2019t the only company in this space. Other firms producing devices of this type include Verint, View Systems, Altron, Neo Soft, MMI, Ability, and Meganet (23). Meganet\u2019s VME Dominator\u2014available for sale only to government agencies\u2014can capture calls and texts, can send text messages, and can even control the phone (14).<\/p>\n<p>However, these companies\u2019 offerings can only trace GSM\/UMTS-based communications. The Harris devices can track CDMA2000, GSM, iDEN, and UMTS-based signals. Harris\u2019s StingRay and KingFish can support up to three different signal types without requiring reconfiguration. (23)<\/p>\n<p>If land-based collection isn\u2019t getting the job done, Boeing\u2019s Digital Receiver Technology (DRT for short) division is putting similar capability in the air. They\u2019re called DiRTboxes, and they are very similar to the StingRay devices, mounted in Cessna planes. However, because planes move faster, the signal strength is greater and more data from untargeted phones as well as targeted phones can be collected. (24) A single flight might provide data and general location information on tens of thousands of phones. Unlike StingRays, DiRTboxes can interrupt calls, and the newer versions of the devices can even also jam signals and even scrape rich data like text messages and photos. (1)<\/p>\n<p>All of these boxes work by exploiting the fundamental structure shared by all cell networks, and, most disturbing of all, no level of encryption is able to prevent collection at the 2G level. (1)<\/p>\n<p>&nbsp;<\/p>\n<p>WHO USES THESE DEVICES?<\/p>\n<p>There is no shortage of agencies interested in gaining this type of information. We know the FBI is using it, and sources suspect all of the three-letter federal-level investigative agencies are as well. Documentation confirms that at least 25 different local and state police departments from Florida to Alaska are using it. Many of these purchases have been made with federal grants from the Department of Homeland Security aimed at protecting cities from terror attacks, but we are finding that they are being used for far broader police work. (1)<\/p>\n<p>The ACLU has produced a map showing which states have agencies using StingRay devices. <a href=\"https:\/\/www.aclu.org\/map\/stingray-tracking-devices-whos-got-them?redirect=maps\/stingray-tracking-devices-whos-got-them\" target=\"_blank\" rel=\"noopener\">Right-click on this link and select \u201cOpen in a new tab<\/a>.\u201d (18)<\/p>\n<p>The city of Tacoma, Washington is seeking to upgrade its StingRay device to Harris\u2019s newer and more capable HailStorm, which will be combined with data analysis software from various vendors. The HailStorm enables 4G LTE phone tracking (12). It also reportedly has the capability to capture cellphone conversations, but Harris says it does not include that functionality in the units it sells to local law enforcement agencies. Tacoma\u2019s purchase and use seems to have had both positives and negatives. City Council members were not really aware of the technology they were approving. However, it does appear that the city is taking care to follow the rules of engagement when deploying the device. The police department was asked to produce documentation showing how the device has been used. Since 2009, they showed 168 cases where police sought judicial permission for surveillance using StingRays. In that same period of time, it was used 10 times under Emergency Orders, which do not require a court order or a search warrant. In those cases, StingRays were used to find people involved in the killing of four police officers, kidnappings, and people suspected of child prostitution (12).<\/p>\n<p>Chesterfield, Virginia, has units that were purchased through grants to law enforcement agencies that were made possible by a multi-million-dollar settlement with Abbot Labs for Medicaid fraud. City officials say that their devices are only ever used with judicial oversight\u2014that is, search warrants or court orders. They also state that they never record, keep, or share the information regarding non-targeted devices. The city was warned previously about possible repercussions for using license plate readers carelessly, so it appears they are following the letter of the law on this technology (6).<\/p>\n<p>Baltimore, Maryland has used HailStorm devices 4,300 times since 2007. 4,300 times!! However, unlike Tacoma and Chesterfield, the Baltimore PD has been encouraged to dismiss charges rather than divulge details about the program. (5)<\/p>\n<p>In Harris\u2019s home state, the American Civil Liberties Union has suspected for a long while that Harris has been loaning its products to police departments for promotion and testing. Court documents in a 2008 case show that \u201cthe Tallahassee Police Department is not the owner of the equipment.\u201d<\/p>\n<p>Pontiac, Oakland County, Michigan has the only device in Michigan, and it was purchased with Homeland Security money (11).<\/p>\n<p>The DRT planes are operated by the US Marshals Service, which often loans them out to local law enforcement and other agencies (19).<\/p>\n<p>&nbsp;<\/p>\n<p>WHY IS IT BEING USED\/HOW IS IT JUSTIFIED?<\/p>\n<p>It\u2019s not difficult to understand why law enforcement and other agencies would want these devices, and how they could be very useful in solving crimes, tracking fugitives or abducted children, and possibly foil terror attacks (the most common reason for DHS grants to local police agencies). (1) As reporter Joel Hruska described it, \u201cSay a murder occurs on a particular street with an estimated time of death between 2 and 4 am. Local law enforcement would have an obvious interest in compelling cell phone companies to turn over the records of every cell phone that moved in and out of the area between those two time periods. [Author\u2019s note: this is called a \u201ccell tower dump, and it\u2019s quite common, but requires a court order or a search warrant.] At rush hour, this kind of information would be useless \u2013 but if the cell phone network data shows a device in the same approximate area as the murder suddenly leaving the area at a high rate of speed, that cell phone owner is a potential suspect.\u201d (7) I can see, certainly how that would be true; but in order for the device to be useful in this case, the StingRay would already need to be in place.<\/p>\n<p>When Miami-Dade Police bought their StingRay, they told the City Council they needed it to monitor protestors at an upcoming World Trade conference (6), and that purpose is in itself problematic.<\/p>\n<p>When Tacoma made its purchase, it was mostly funded with a Homeland Security grant. The police department indicated that the technology would be useful to its Explosive Ordinance detail. But the department\u2019s records offer no indication as to how many explosive devices were disarmed, or even detected, using it. (3)<\/p>\n<p>&nbsp;<\/p>\n<p>THE THORNS<\/p>\n<p>If you\u2019ve never heard of StingRays or HailStorms or KingFish, that\u2019s by design. These devices were originally developed for use by the military and by spy agencies. Harris Corp. itself does not answer any questions about the devices, but refers reporters to police agencies. That is not very useful, as Harris requires its customers to sign a non-disclosure agreement. (1) Agreements of that type are not uncommon, but they are usually required when a product is placed for testing or during the development process.<\/p>\n<p><a href=\"https:\/\/www.thisgeekiknow.com\/wp-content\/uploads\/2015\/06\/03.27.2014-FDLE-Stingray-Records-Non-Disclosure-Agreement-with-Harris-Corp.pdf\" target=\"_blank\" rel=\"noopener\">You can read one example of this agreement by clicking on this link and selecting \u201cOpen link in new tab.\u201d<\/a><\/p>\n<p>Law enforcement agencies have fought hard to keep from talking about the devices, and it was almost by accident that word is starting to get out. In a case of sexual battery and petit theft, the victim\u2019s purse was stolen. Her purse contained her cell phone. Using a StingRay, and without a warrant, investigators were able to track the phone to a particular apartment. They forced their way inside, searched, and found the purse\u2014and the phone. The device was not mentioned during discovery, and when pressed by the defendant\u2019s attorney during the trial, the investigators refused to disclose the method used to track the defendant to the apartment. The judge finally forced the disclosure of the surveillance technique, but only after the law enforcement agency insisted that the court be closed, and that the proceedings of the case be closed as well. The defendant appealed his conviction based on the legality of the surveillance and the search. The appellate case and the resulting opinion were not sealed, and that\u2019s how we finally found out about StingRays. (22)<\/p>\n<p>Freedom of Information Act requests on these devices and activities surrounding them has proved mostly fruitless. Much of the useful information gets redacted prior to release. The ACLU has been digging into a particular set of uses in Sarasota, Florida and found itself brickwalled by the US Marshalls Service. The ACLU had set up a meeting with the Sarasota Police Department to view its StingRay files, as is required by Florida law. An assistant city attorney sent an email to the ACLU cancelling the meeting. He stated that the USMS had deputized the local officer; therefore, the records generated by that officer were the property of the federal government, and the Sarasota PD had not the authority to release them (2).<\/p>\n<p>At issue is not whether the devices should exist, or even whether they should be used, but under what conditions, and how they should be used. The largest question that needs addressed is one of Due Process. In a case in Arizona, the legality of a search was questioned because civil liberties advocates say that the government was not honest in its explanation to the judge regarding the StingRay\u2019s true capabilities.(17) The Justice Department contends that the tracking warrant was nothing out of the ordinary (17), and that argument gets a lot of mileage. But that argument is based on a comparison of StingRay and similar devices to pen-register and trap-and-trace devices (23), and to see the differences, I\u2019m going to quote directly from legal dictionaries for the definitions of those two technologies:<\/p>\n<p><em>Pen register \u2013 a device that decodes or records electronic impulses, allowing outgoing numbers from a telephone to be identified.<\/em><\/p>\n<p><em>Trap device \u2013 used to identify originating number from which the wire or electronic communications were transmitted.<\/em><\/p>\n<p><em>Neither device enables recording or listening of actual communication. (13)<\/em><\/p>\n<p>You\u2019ve seen these technologies used in the movies, where they\u2019re trying to find out who the mobster is calling, or when they\u2019re tracing a kidnapper\u2019s incoming call. Case law \u2013 Smith v. Maryland \u2013 holds that it is not unconstitutional to install a pen register without a warrant. However, federal law now requires a court order for it, based on an investigating offer\u2019s declaration that the information is relevant to an ongoing investigation (13).<\/p>\n<p>The FBI says a warrant is not required for the use of StingRay and similar devices, because they don\u2019t collect the content of phone calls and text messages and operate like pen-registers and trap-and traces, collecting the equivalent of header information. Additionally, the US government and other law enforcement agency spokesmen have asserted that the use of StingRay devices does not violate Fourth Amendment rights, and Americans don\u2019t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower. (21) \u201cWe\u2019re not infringing on their rights, \u201c[Richland, SC Sheriff Leon] Lott said, \u201cWhen they use that phone, they understand that information is going to a tower.\u201d (1) What we understand, though, is that the information is going to a tower <em>owned and operated by a carrier with whom we have a contract for service.<\/em> That information is not going out onto public airwaves to be picked up by the general population. An appropriate comparison is an agency setting up a blue box with the Postal Service logo on it, and a lot of people drop their mail into it. By monitoring the box and its contents over time they can determine if their target is in the immediate area during a given point in time. The agency looks at all the senders and recipients on each piece of mail, hoping to find one sent by their target. The agency\u2019s fake box is also collecting pieces of mail being sent by people other than their target, and the agency has the capability to record or note non-targets sending mail to other recipients. Senders are not tossing their mail up into the air or leaving it out in the open for anyone to look at, they are depositing it into a receptacle that is trusted and chartered to deliver mail, and we all understand that tampering with the mail is a punishable offense.<\/p>\n<p>It seems, also, that the city officers in Tacoma do not see the need for oversight of the police department\u2019s actions. City Manger TC Broadnax told reporters, \u201cI\u2019m not in law enforcement, but it\u2019s my impression that it assists them in doing their job more effectively, and that\u2019s to protect the public.\u201d Mayor Marilyn Strickland said, \u201cIf our law enforcement needs access to information to prevent crime or keep us safe, that\u2019s a legitimate use of the technology. We are more focused on preventing crime and keeping our community safe than getting in people\u2019s business.\u201d The problem with that position is that these devices do not have the capacity to prevent crime or keep the community safe. They can catch the bad guys after the fact, but only well-known, widespread, real-time surveillance would have the effect the Mayor is hoping for. It also appears full disclosure of the equipment purchase was not part of Tacoma\u2019s purchasing process. As Councilman David Boe put it, \u201cI\u2019ve got to find out what I voted on before I comment.\u201d (3)<\/p>\n<p>In the wake of the Snowden\/Prism revelations, those whom we trust to protect us from overzealous intrusion appear to be taking this pretty seriously. In 2012 a magistrate judge in Texas refused to grant the federal Drug Enforcement Agency permission to use a StingRay, partly because the agency did not explain what the government would do with the cell phone numbers of innocent people and other information recorded on the equipment (12). In an affidavit submitted to court, the FBI disclosed that its policy requires agents to purge all data stored in the surveillance tool at the conclusion of an operation, so that the FBI is not collecting information about individuals who are not the subject of criminal or national security investigations. Government is telling a court for the first time that spoofing a legitimate wireless tower in order to conduct surveillance could be considered a search under the Fourth Amendment in the Arizona case, and that its use was legal, thanks to a court order and warrant that investigators used to get similar location data from Verizon\u2019s own towers. (21) The unsettling part of the FBI policy covering StingRay use is that in addition to regular carve outs\u2014immediate danger or tracking a fugitive\u2014agency policy does not require judicial oversight in cases in which the technology is used in public places or other locations at which the FBI deems that there is no reasonable expectation of privacy (16).<\/p>\n<p>The State Supreme Courts of Florida and Massachusetts have ruled that warrants are necessary for real-time cell phone tracking, and laws for the same have been passed in Colorado, Illinois, Indiana, Maryland, Tennessee, Utah, Virginia, and Wisconsin (9). It\u2019s a start.<\/p>\n<p>&nbsp;<\/p>\n<p>HOW CAN I KNOW IF IT\u2019S BEING USED AROUND ME?<\/p>\n<p>How would you know if this is occurring in your vicinity? ESD America develops and produces a phone called CryptoPhone500. It\u2019s a pricey device (the developer wouldn\u2019t divulge the price, but a third party site indicated around $3,500) and it detects and alerts when the phone\u2019s encryption has been turned off by someone other than the user. According to ESD\u2019s Les Goldsmith, \u201cIf you\u2019ve been intercepted, in some cases it might show at the top that you\u2019ve been forced from 4G down to 2G.\u201d As an alternative to his CryptoPhone, he suggests \u201cburner phones\u201d if you absolutely must not be tracked. (14)<\/p>\n<p><a href=\"https:\/\/www.thisgeekiknow.com\/wp-content\/uploads\/2015\/06\/2585181312_8af858825c_q.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-126 aligncenter\" src=\"\/wp-content\/uploads\/2015\/06\/_d_improd_\/2585181312_8af858825c_q_f_improf_463x463.jpg\" alt=\"Uncle Sam Wants Your Data\" width=\"463\" height=\"463\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\">image courtesy of <a href=\"https:\/\/www.flickr.com\/photos\/jeffschuler\/2585181312\/in\/photolist-4WrJkA-hX97k-fZX33s-48tGJ2-6mwTLP-nqhfGk-nGKf4G-nqhqmS-bED5kc-e9M1iR-eaNTFu-eaCfdj-ebfsgT-7FVAXa-8JwiFV-8Jwor8-cj8j77-iwqYR7-m8eiV-m8ej5-m8ehw-8FHfAw-6HGoRf-NWmio-awYzb-t3HWk-f1L9PV-hb7QxY-4vNCSQ-hb7HoM-hb7RGQ-rD7k7L-62fuz6-7T7Hqx-7T7Hqz-nPnb3J-5EzpKC-9KboVH-egfUB-egfUv-62oHVT-9z7h3H-MS9q-ajPv2a-cHgQ5G-8TWx33-337NQd-4taLbS-6HxJ7Q-4t6FnK\" target=\"_blank\" rel=\"noopener\">Jeff Schuler<\/a><\/p>\n<p>MY TAKEAWAY<\/p>\n<p>Several times I have looked down at my phone and noticed that where the 4G LTE should have been, it indicated EDGE. This tells me that I can probably, if I\u2019m diligent, know when my data is being passed to a phony tower. I\u2019m not in the market for a very expensive phone. It is important to pay attention to judicial decisions regarding surveillance. The next generation of these devices is capable of not only capturing the phone\u2019s identifying data, but the contents of those devices. The due process concept so carefully articulated in the Constitution of the United States is to protect us against fishing expeditions of the type made possible by these fish-named technologies. It\u2019s up to us to make sure the people in decision-making capacities know what they\u2019re deciding.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>WORKS CITED<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>Campbell, Mikey. \u201cDOJ reportedly spies on mobile phone owners using fake airplane-mounted cell towers.\u201d Apple Insider. 23 November 2014. 9 June 2014.&lt;http:\/\/appleinsider.com\/articles\/14\/11\/13\/doj-reportedly-spies-on-mobile-phone-owners-using-fake-airplane-mounted-cell-towers&gt;<\/li>\n<li>Cushing, Tim. \u201cUS Marshals Step In to Keep Florida Police Department\u2019s StingRay Documents Out of the Hands of the ACLU.\u201d TechDirt. 4 June 2014. 4 June 2015. &lt;https:\/\/www.techdirt.com\/articles\/20140604\/08245927455\/us-marshals-step-to-keep-florida-police-departments-stingray-documents-out-hands-aclu.shtml&gt;<\/li>\n<li>Cushing, Tim. \u201cWashington Law Enforcement Hides StingRay Purchase and Use From Everyone, But It\u2019s Okay Because They\u2019re Fighting Crime.\u201d Tech Dirt. 28 August 2014. 9 June 2014. &lt;https:\/\/www.techdirt.com\/articles\/20140828\/09564828349\/washington-law-enforcement-hides-stingray-purchase-use-everyone-its-ok-because-theyre-fighting-crime.shtml&gt;<\/li>\n<li>Farivar, Cyrus. \u201cCities scramble to upgrade \u201cStingRay\u201d tracking as end of 2G network looms.\u201d Ars technica. 1 Sept 2014. 4 June 2014. &lt;http:\/\/arstechnica.com\/tech-policy\/2014\/09\/cities-scramble-to-upgrade-stingray-tracking-as-end-of-2g-network-looms\/&gt;<\/li>\n<li>Gillum, Jack, and Linderman, Juliet. \u201cBaltimore police often surveil cellphones amid US secrecy.\u201d The Washington Times. 8 April 2015. 8 June 2015. &lt;http:\/\/www.washingtontimes.com\/news\/2015\/apr\/8\/baltimore-police-often-surveil-cellphones-amid-us-\/?page=all#pagebreak&gt;<\/li>\n<li>Hinkle, A. Barton. \u201cCellphone Tracking Means They <em>Can<\/em> Hear You Now.\u201d Reason.com. 18 August 2014. 4 June 2014. &lt;http:\/\/reason.com\/archives\/2014\/08\/18\/cellphone-tracking-means-they-can-hear-y&gt;<\/li>\n<li>Hruska, Josh. \u201cStingray, the fake cell phone tower cops and carriers use to track your every move.\u201d Extreme Tech. 17 June 2014. 6 June 2015. &lt;http:\/\/www.extremetech.com\/mobile\/184597-stingray-the-fake-cell-phone-tower-cops-and-providers-use-to-track-your-every-move&gt;<\/li>\n<li>Kelly, John. \u201cCellphone data spying: It\u2019s not just the NSA.\u201d USAToday.com 13 June 2014. 11 May 2015. &lt;http:\/\/www.usatoday.com\/story\/news\/nation\/2013\/12\/08\/cellphone-data-spying-nsa-police\/3902809\/&gt;<\/li>\n<li>Kravets, David. \u201cFBI says search warrants not needed to use \u2018StingRays\u2019 in public places.\u201d Ars technica. 5 January 2015. 8 June 2015. &lt;http:\/\/arstechnica.com\/tech-policy\/2015\/01\/fbi-says-search-warrants-not-needed-to-use-stringrays-in-public-places\/&gt;<\/li>\n<li>Kumar, Sunny. \u201cWi-Fi, Phone Hacking Plane is Terrifying, Inspiring, and Wardriving Evolves Into Warflying.\u201d H4XORIN\u2019 T3H WORLD. 2011. 11 May 2015. &lt;http:\/\/kingofdkingz99.blogspot.com\/2011\/08\/wi-fi-phone-hacking-plane-is-terrifying.html&gt;<\/li>\n<li>Kurth, Joel. \u201cSecret military device lets Oakland deputies track cell phones.\u201d The Detroit News. 4 April 2014. 9 June 2015. &lt;http:\/\/www.detroitnews.com\/article\/20140404\/SPECIAL\/304040043&gt;<\/li>\n<li>Martin, Kate. \u201cDocuments: Tacoma Police using surveillance device to sweep up cellphone data.\u201d The News Tribune. 26 Aug 2014. 4 June 2014. &lt;http:\/\/www.thenewstribune.com\/2014\/08\/26\/3347665_documents-tacoma-police-using.html?rh=1&gt;<\/li>\n<li>\u201cPen Register.\u201d West\u2019s Encyclopedia of American Law, edition 2. 2008. The Gale Group. 11 January 2005. 11 June 2015. &lt;http:\/\/legal-dictionary.thefreedictionary.com\/Pen+Register&gt;<\/li>\n<li>Rosenblum, Andrew. \u201cMysterious Phony Cell Towers Could be Intercepting Your Calls.\u201d Popular Science. 27 August 2014. 6 June 2015. &lt;http:\/\/www.popsci.com\/article\/technology\/mysterious-phony-cell-towers-could-be-intercepting-your-calls&gt;<\/li>\n<li>Russia Today, youtube channel: <a href=\"https:\/\/www.youtube.com\/watch?t=47&amp;v=X84gRGgFBxk\">https:\/\/www.youtube.com\/watch?t=47&amp;v=X84gRGgFBxk<\/a><\/li>\n<li>Scola, Nancy. \u201cSenators question FBI\u2019s legal reasoning behind cell-tower spoofing.\u201d The Washington Post. 2 Jan 2015. 8 June 2015. &lt;http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2015\/01\/02\/senators-question-fbis-legal-reasoning-behind-cell-tower-spoofing\/&gt;<\/li>\n<li>Sledge, Matt. \u201cJudge in StingRay Cell Tower Spoofing Case Puts Government on Notice.\u201d Huffington Post, HuffPost Politics. 19 March 2013. 30 March 2015. &lt;http:\/\/www.huffingtonpost.com\/matt-sledge\/judge-in-stingray-cell-to_b_2910635.html&gt;<\/li>\n<li>\u201cStingray Tracking Devices: Who\u2019s Got Them?\u201d American Civil Liberties Union. 9 June 2015. &lt;https:\/\/www.aclu.org\/map\/stingray-tracking-devices-whos-got-them?redirect=maps\/stingray-tracking-devices-whos-got-them&gt;<\/li>\n<li>Swanner, Nate. \u201cUS DOJ accused of stealing cellphone data via \u201cdirtyboxes.\u201d Slash Gear. 13 November 2014. 9 June 2015. &lt;http:\/\/www.slashgear.com\/us-doj-accused-of-stealing-cellphone-data-via-dirtyboxes-13355476\/&gt;<\/li>\n<li>\u201cTrap and Trace Device Law and Legal Definition.\u201d US Legal.com. 11 June 2015. &lt;http:\/\/definitions.uslegal.com\/t\/trap-and-trace-device\/&gt;<\/li>\n<li>Zetter, Kim. \u201cFeds\u2019 Use of Fake Cell Tower \u2013 Did It Constitute a Search?\u201d Wired. 30 March 2015. 3 June 2015. &lt;http:\/\/www.wired.com\/2011\/11\/feds-fake-cell-phone-tower\/&gt;<\/li>\n<li>Zetter, Kim. \u201cFlorida Cops\u2019 Secret Weapon: Warrantless Cellphone Tracking.\u201d Wired. 3 March 2014. 8 June 2015. &lt;http:\/\/www.wired.com\/2014\/03\/stingray\/&gt;<\/li>\n<li>Zetter, Kim. \u201cSecrets of FBI Smart Phone Surveillance Tool Revealed in Court Fight.\u201d Wired. 9 April 2013. 8 June 2015. &lt;http:\/\/www.wired.com\/2013\/04\/verizon-rigmaiden-aircard\/all\/&gt;<\/li>\n<li>Zetter, Kim. \u201cThe Feds are Now Using \u2018StingRays\u2019 in Planes to Spy on our Phone Calls.\u201d Wired. 11 November 2014. 9 June 2015. &lt;http:\/\/www.wired.com\/2014\/11\/feds-motherfng-stingrays-motherfng-planes\/&gt;<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>image courtesy of Seattle Municipal Archives &nbsp; In the United States, there are somewhere in the neighborhood of 325 million cellular devices in use (15), comprising phones, tablets, notebooks, hotspots, and, most recently, vehicles. We are generating a lot of data on these devices, and these devices are generating a lot of data\u2014about us. At&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11,10],"tags":[62,67,77,78,79,80,83,84,87,91,92,93,100,107,109,110,118,119,120,125,126,132,135,138,150,151,152,153,155,170,185,186,198,208,221,228,232,236,237,246,250,252],"class_list":["post-123","post","type-post","status-publish","format-standard","hentry","category-deep-dives","category-commentary-and-consideration","tag-aclu","tag-amberjack","tag-baltimore","tag-board-of-directors","tag-boeing","tag-boston","tag-bus","tag-business-insider","tag-cdma","tag-cellphone","tag-cellular","tag-chesterfield","tag-computer-program","tag-daily-record-scotland","tag-data","tag-dhs","tag-drt","tag-due-process","tag-eavesdropping","tag-emma-nutt","tag-english-language","tag-fbi","tag-federal-government","tag-florida","tag-gsm","tag-hailstorm","tag-harpoon","tag-harris","tag-iden","tag-kingfish","tag-miami","tag-michigan","tag-nsa","tag-privacy","tag-security","tag-spying","tag-stingray","tag-switchboard-operator","tag-tacoma","tag-united-states","tag-us-marshals-service","tag-washington"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Something&#039;s Fishy With Your Cellphone - Oakwood Experience<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Something&#039;s Fishy With Your Cellphone - Oakwood Experience\" \/>\n<meta property=\"og:description\" content=\"image courtesy of Seattle Municipal Archives &nbsp; In the United States, there are somewhere in the neighborhood of 325 million cellular devices in use (15), comprising phones, tablets, notebooks, hotspots, and, most recently, vehicles. We are generating a lot of data on these devices, and these devices are generating a lot of data\u2014about us. At...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakwood Experience\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563885192881\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-16T20:32:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:38:15+00:00\" \/>\n<meta name=\"author\" content=\"Nancy Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/oakwood92297\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/\"},\"author\":{\"name\":\"Nancy Jones\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\"},\"headline\":\"Something&#8217;s Fishy With Your Cellphone\",\"datePublished\":\"2015-06-16T20:32:06+00:00\",\"dateModified\":\"2024-08-12T18:38:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/\"},\"wordCount\":4282,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"keywords\":[\"ACLU\",\"AmberJack\",\"Baltimore\",\"Board of directors\",\"Boeing\",\"Boston\",\"Bus\",\"Business Insider\",\"CDMA\",\"cellphone\",\"cellular\",\"Chesterfield\",\"Computer program\",\"Daily Record (Scotland)\",\"data\",\"DHS\",\"DRT\",\"due process\",\"eavesdropping\",\"Emma Nutt\",\"English language\",\"FBI\",\"federal government\",\"Florida\",\"GSM\",\"HailStorm\",\"Harpoon\",\"Harris\",\"iDEN\",\"KingFish\",\"Miami\",\"Michigan\",\"NSA\",\"Privacy\",\"security\",\"spying\",\"StingRay\",\"Switchboard operator\",\"Tacoma\",\"United States\",\"US Marshals Service\",\"Washington\"],\"articleSection\":[\"Deep Dives\",\"Tech Commentary and Consideration\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/\",\"name\":\"Something's Fishy With Your Cellphone - Oakwood Experience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\"},\"datePublished\":\"2015-06-16T20:32:06+00:00\",\"dateModified\":\"2024-08-12T18:38:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/somethings-fishy-with-your-cellphone\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oakwoodexperience.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Something&#8217;s Fishy With Your Cellphone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"name\":\"Oakwood Experience\",\"description\":\"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.\",\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oakwoodexperience.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\",\"name\":\"Oakwood Experience\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"width\":1000,\"height\":885,\"caption\":\"Oakwood Experience\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\",\"name\":\"Nancy Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"caption\":\"Nancy Jones\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61563885192881\",\"https:\\\/\\\/www.instagram.com\\\/southernfriedyanqui\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/feed\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/x.com\\\/oakwood92297\",\"https:\\\/\\\/www.youtube.com\\\/@nancyjones6235\"],\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/author\\\/nancyjones36507\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Something's Fishy With Your Cellphone - Oakwood Experience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/","og_locale":"en_US","og_type":"article","og_title":"Something's Fishy With Your Cellphone - Oakwood Experience","og_description":"image courtesy of Seattle Municipal Archives &nbsp; In the United States, there are somewhere in the neighborhood of 325 million cellular devices in use (15), comprising phones, tablets, notebooks, hotspots, and, most recently, vehicles. We are generating a lot of data on these devices, and these devices are generating a lot of data\u2014about us. At...","og_url":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/","og_site_name":"Oakwood Experience","article_author":"https:\/\/www.facebook.com\/profile.php?id=61563885192881","article_published_time":"2015-06-16T20:32:06+00:00","article_modified_time":"2024-08-12T18:38:15+00:00","author":"Nancy Jones","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/oakwood92297","twitter_misc":{"Written by":"Nancy Jones","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/#article","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/"},"author":{"name":"Nancy Jones","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3"},"headline":"Something&#8217;s Fishy With Your Cellphone","datePublished":"2015-06-16T20:32:06+00:00","dateModified":"2024-08-12T18:38:15+00:00","mainEntityOfPage":{"@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/"},"wordCount":4282,"commentCount":0,"publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"keywords":["ACLU","AmberJack","Baltimore","Board of directors","Boeing","Boston","Bus","Business Insider","CDMA","cellphone","cellular","Chesterfield","Computer program","Daily Record (Scotland)","data","DHS","DRT","due process","eavesdropping","Emma Nutt","English language","FBI","federal government","Florida","GSM","HailStorm","Harpoon","Harris","iDEN","KingFish","Miami","Michigan","NSA","Privacy","security","spying","StingRay","Switchboard operator","Tacoma","United States","US Marshals Service","Washington"],"articleSection":["Deep Dives","Tech Commentary and Consideration"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/","url":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/","name":"Something's Fishy With Your Cellphone - Oakwood Experience","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/#website"},"datePublished":"2015-06-16T20:32:06+00:00","dateModified":"2024-08-12T18:38:15+00:00","breadcrumb":{"@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/oakwoodexperience.com\/somethings-fishy-with-your-cellphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oakwoodexperience.com\/"},{"@type":"ListItem","position":2,"name":"Something&#8217;s Fishy With Your Cellphone"}]},{"@type":"WebSite","@id":"https:\/\/oakwoodexperience.com\/#website","url":"https:\/\/oakwoodexperience.com\/","name":"Oakwood Experience","description":"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.","publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oakwoodexperience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oakwoodexperience.com\/#organization","name":"Oakwood Experience","url":"https:\/\/oakwoodexperience.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","contentUrl":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","width":1000,"height":885,"caption":"Oakwood Experience"},"image":{"@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3","name":"Nancy Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","caption":"Nancy Jones"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563885192881","https:\/\/www.instagram.com\/southernfriedyanqui\/","https:\/\/www.linkedin.com\/feed\/","https:\/\/x.com\/https:\/\/x.com\/oakwood92297","https:\/\/www.youtube.com\/@nancyjones6235"],"url":"https:\/\/oakwoodexperience.com\/staging\/2633\/author\/nancyjones36507\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":1,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/123\/revisions"}],"predecessor-version":[{"id":1568,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/123\/revisions\/1568"}],"wp:attachment":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/media?parent=123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/categories?post=123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/tags?post=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}