The Electronic Frontier Foundation has developed an open-source toolkit that, when installed in a very inexpensive portable hot spot, the device will report whether it sees any cell-site simulators (CSS) in your area.
CSS devices, also known as Stingrays, allow law enforcement to capture all identifying information in an area with great precision. It is blanket surveillance. The problem is that while they may have a warrant to surveil Suspect X, they don't have warrants to surveil and capture information on me, you, and everyone around us. Stingrays capture everyone's location information in their effective operating range and logs it. Also, we know very little about how these devices operate: this info is kept under very tight lockdown by the manufacturers and by the law enforcement agencies. There has been very little success in law suits filed to pry this information into direct sunlight.
Some CSS units can go beyond locating the suspect's phones and actually intercept communications. Whether they can intercept everyone's comms who it has sucked into connecting to it isn't known.
The concern is whether CSS is being used to surveil protests and religious gatherings, things that are protected by the First Amendment. There is some evidence that points to this, it is not known how widespread such surveillance may be.
This new toolkit by the EFF is called Rayhunter, i.e. hunting for stingrays. It requires the purchase of an Orbic WiFi hotspot, links in the article to Amazon and eBay show them available for $10-20. The software to turn the Orbic into a Rayhunter is available on the EFF site, but you must be running Linux or Mac OS to install it - no package for Windows at this time. I suppose you could probably run a Linux VM on Windows to install it that way. Once installed and running, in the presence of CSS a red line will appear on the top of the display and the event will be logged, otherwise a green line will show. Connecting to the device's browser will let you review the log file.
The device is not a counter-surveillance tool, it does nothing to interfere with CSS which would be against many FCC rules and probably against local and Federal law. The EFF believes that the Rayhunter is legal under U.S. law, but if you're not in the USA then you should talk to an attorney in your area to see what kind of risk that you might be taking.
Myself, I'd look into rehousing it into something else, like, say, a Gameboy box that also works as a Gameboy, as eventually The Powers That Be will be looking for people carrying this particular model of Orbic devices and plausible deniability might begin running thin. For the paranoids amongst us, perhaps having a tamper switch on the Gameboy that would fry the memory if it's opened incorrectly.
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
CSS devices, also known as Stingrays, allow law enforcement to capture all identifying information in an area with great precision. It is blanket surveillance. The problem is that while they may have a warrant to surveil Suspect X, they don't have warrants to surveil and capture information on me, you, and everyone around us. Stingrays capture everyone's location information in their effective operating range and logs it. Also, we know very little about how these devices operate: this info is kept under very tight lockdown by the manufacturers and by the law enforcement agencies. There has been very little success in law suits filed to pry this information into direct sunlight.
Some CSS units can go beyond locating the suspect's phones and actually intercept communications. Whether they can intercept everyone's comms who it has sucked into connecting to it isn't known.
The concern is whether CSS is being used to surveil protests and religious gatherings, things that are protected by the First Amendment. There is some evidence that points to this, it is not known how widespread such surveillance may be.
This new toolkit by the EFF is called Rayhunter, i.e. hunting for stingrays. It requires the purchase of an Orbic WiFi hotspot, links in the article to Amazon and eBay show them available for $10-20. The software to turn the Orbic into a Rayhunter is available on the EFF site, but you must be running Linux or Mac OS to install it - no package for Windows at this time. I suppose you could probably run a Linux VM on Windows to install it that way. Once installed and running, in the presence of CSS a red line will appear on the top of the display and the event will be logged, otherwise a green line will show. Connecting to the device's browser will let you review the log file.
The device is not a counter-surveillance tool, it does nothing to interfere with CSS which would be against many FCC rules and probably against local and Federal law. The EFF believes that the Rayhunter is legal under U.S. law, but if you're not in the USA then you should talk to an attorney in your area to see what kind of risk that you might be taking.
Myself, I'd look into rehousing it into something else, like, say, a Gameboy box that also works as a Gameboy, as eventually The Powers That Be will be looking for people carrying this particular model of Orbic devices and plausible deniability might begin running thin. For the paranoids amongst us, perhaps having a tamper switch on the Gameboy that would fry the memory if it's opened incorrectly.
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying