The Department of Information and Communications Technology (DICT) has issued a stern warning to candidates in the upcoming May 12 midterm elections against the use of International Mobile Subscriber Identity (IMSI) catchers during their campaigns. DICT Secretary Ivan John Uy highlighted the illegality of these devices, which are often used in text scams but can also be employed for mass text messaging to gain an electoral advantage.
During a press conference at the Philippine National Police-Anti-Cybercrime Group (PNP-ACG) office in Camp Crame, Uy explained that IMSI catchers, which mimic cell towers to intercept mobile communications, have been used in past elections for text blasting. He noted a surge in demand for these devices among politicians during election periods.
The warning comes in the wake of the arrest of a 46-year-old Malaysian in Parañaque City, suspected of leading a syndicate that supplies IMSI catchers for illegal activities. Uy emphasized that possessing these unlicensed devices could lead to confiscation and criminal charges, as they are typically smuggled into the country.
The DICT is collaborating with the Bureau of Immigration, Malaysian authorities, and other governments to investigate the syndicate’s operations. Uy revealed that the confiscated equipment was previously used in scams impersonating telecom companies, banks, and job recruiters.
He urged the public to remain vigilant and report any suspicious behavior, such as individuals with backpacks acting nervously or vehicles repeatedly circling an area. Uy also warned that local accomplices might be involved and encouraged anyone with these devices to surrender them voluntarily, as the supplier has already been apprehended.
Cybercrime Investigation and Coordinating Center (CICC) Executive Director Alexander Ramos confirmed that the seized IMSI catcher was a complete, new model, not produced or assembled locally. PNP-ACG spokesperson Lt. Wallen Arancillo added that the Malaysian suspect had also sold the devices in Cambodia, China, and Thailand, promoting himself as the ‘best seller’ on a Facebook page.
The suspect faces multiple charges under the Cybercrime Prevention Act, Philippine Radio Station and Radio Communication Act, Subscriber Identity Module (SIM) Registration Act, and Data Privacy Act. The IMSI catcher, also known as a ‘stingray’ or ‘rogue cell tower,’ costs around PHP600,000 and can intercept text messages, calls, and data traffic without needing a database, SIM card, or WiFi.