Categories: Intelligence

US Gov used airplanes to collect American cell phone data

The WSJ revealed that the US authorities coordinated by the Department of Justice has been using airplanes to collect Americans’ cell phone data.

A new secret U.S. surveillance program was disclosed in a Wall Street Journal’s report, the post published by the popular media agency reveals the use of bogus cell phone towers installed in airplanes to scan Americans’ cell phones and syphon their data.

The attack scheme is simple as effective, the tower signals are used to trick phones to automatically switch over to its signal. The technique is not new, law enforcement has already adopted this technology to spy on cellphoneStingRay is the name used to identify mobile units that are able to track users’ mobile devices.

“The boxes used by the program allow planes to pose as the nearest cell phone tower, which prompts cell phones under surveillance to disclose their location and identity information, even if a legitimate tower is closer than the plane overhead. The dirtboxes also have the ability to interrupt calls, though officials have reportedly tried to mitigate the harmful consequences of that function.” reported the Business Insider.

According to the Wall Street Journal, the technique was adopted by US law enforcement, the Justice Department used it to collect huge amount of data to use in its investigations.

Security and privacy experts are contrary to this “insanely broad airplane data dragnet” because it affects people all over the country.

The program started in 2007 and U.S. Marshals used different aircrafts equipped with the spying technology, also referred as dirtboxes, to spy data from individuals on the entire US soil.

“The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.”

The technology allows law enforcement to steal data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location.

The case is making a lot of noise in the public opinion, another secret surveillance program is threatening US citizens. Recently another news raised many concerns in the security communities about the discovery of a series of bogus cell phone towers in the US used by unknowns for surveillance purpose.

In time I’m writing, The Justice Department hasn’t commented the news.

Stay tuned!

Pierluigi Paganini

(Security Affairs –  surveillance, cell phone)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.