- By Alex David
- Sun, 29 Jun 2025 10:58 PM (IST)
- Source:JND
With the release of Android 16, Google is significantly advancing safeguards on user privacy and sophisticated cellular spying techniques like Stingray or fake cell tower attacks. These cell towers impersonating legitimate ones can currently intercept calls and text messages containing sensitive data, such as IMEI numbers or unencrypted texts.
What Is a Stingray Attack?
Stingray attackers, also known as cell-site simulators, are used for both law enforcement operations and malicious purposes. Once an individual's device has been connected:
- IMEI and IMSI numbers can be harvested
- Victims can be downgraded to insecure 2G networks
- Encrypted communications may be bypassed
- Calls and texts may be intercepted in real time
Such attacks largely occur unnoticed, because devices do not posses methods to detect phony towers. However Google chose to address this threat with Android 16.
ALSO READ: Meta Ramps Up AI Talent War, Poaches 8 Researchers From OpenAI
Android’s Security Evolution Against Network Snooping
Here’s how Android has gradually built up its defences:
Android Version | Feature | Purpose |
Android 12 | Disable 2G networks | Prevent downgrades to insecure 2G |
Android 14 | Null cypher blocking | Stop unencrypted traffic |
Android 15 | Identifier/cypher notifications | Notify users when a network requests sensitive information |
Now, Android 16 goes a step further with a new “Mobile Network Security” settings page and network surveillance alerts.
New Security Features in Android 16
Mobile Network Security Page (Settings > Security & Privacy > Safety Center)
This section only appears on devices that support:
- Android IRadio HAL v3.0 (modem requirement)
- 2G toggle and
- Network notification alerts
Network Notifications
- Alerts when:
- Your device connects to unencrypted networks
- A network requests your IMEI or IMSI
- Logged in the notification panel and the Safety Centre
- Disabled by default
2G Network Protection
- Prevents your phone from falling back to vulnerable 2G networks
- Previously available in SIM settings; now also accessible here
- Also disabled by default
Why You Might Not See These Features Yet
Due to modem restrictions, older phones like the Pixel 9a will not support these features even after updating to Android 16. Specifically: Devices missing support for Android IRadio HAL v3.0 lack receiving the mobile network unified security page, along with hardware dependent components like surveillance alerts.
Only upcoming Android 16 devices (e.g., Pixel 10) are likely to include:
- Network surveillance alerts
- Unified mobile network security page
Should You Be Concerned?
Reconnections during normal phone operation do request identifiers, but unusual behaviour can indicate red flag activity worth investigating.
Note: Android does not possess the capability to identify a spoofed cell tower. Rather, it alerts users to possible dangerous activities, allowing them to make decisions based on the notifications they receive.
Conclusion
With the release of new features in Google’s Android 16 update, users are empowered with technologies that help prevent and detect mobile surveillance attempts involving unauthorised cell towers. However, not all safeguards will be operational on previous devices. Newer phones running Android 16 will provide critical protections that may greatly facilitate detection and potentially assist evasion of stingray surveillance.