• By Alex David
  • Sun, 29 Jun 2025 10:58 PM (IST)
  • Source:JND

With the release of Android 16, Google is significantly advancing safeguards on user privacy and sophisticated cellular spying techniques like Stingray or fake cell tower attacks. These cell towers impersonating legitimate ones can currently intercept calls and text messages containing sensitive data, such as IMEI numbers or unencrypted texts.

What Is a Stingray Attack?

Stingray attackers, also known as cell-site simulators, are used for both law enforcement operations and malicious purposes. Once an individual's device has been connected:

 

 

  • IMEI and IMSI numbers can be harvested
  • Victims can be downgraded to insecure 2G networks
  • Encrypted communications may be bypassed 
  • Calls and texts may be intercepted in real time

 

 

 

 

 

Such attacks largely occur unnoticed, because devices do not posses methods to detect phony towers. However Google chose to address this threat with Android 16.

ALSO READ: Meta Ramps Up AI Talent War, Poaches 8 Researchers From OpenAI

Android’s Security Evolution Against Network Snooping

Here’s how Android has gradually built up its defences:

Android Version

Feature

Purpose

Android 12

Disable 2G networks

Prevent downgrades to insecure 2G

Android 14

Null cypher blocking

Stop unencrypted traffic

Android 15

Identifier/cypher notifications

Notify users when a network requests sensitive information

Now, Android 16 goes a step further with a new “Mobile Network Security” settings page and network surveillance alerts.

New Security Features in Android 16

Mobile Network Security Page (Settings > Security & Privacy > Safety Center)

This section only appears on devices that support:

 

 

  • Android IRadio HAL v3.0 (modem requirement)
  • 2G toggle and
  • Network notification alerts

 

 

Network Notifications

 

 

  • Alerts when:
    • Your device connects to unencrypted networks
    • A network requests your IMEI or IMSI
  • Logged in the notification panel and the Safety Centre
  • Disabled by default

 

 

2G Network Protection

 

 

  • Prevents your phone from falling back to vulnerable 2G networks
  • Previously available in SIM settings; now also accessible here
  • Also disabled by default

 

 

 

 

 

Why You Might Not See These Features Yet

Due to modem restrictions, older phones like the Pixel 9a will not support these features even after updating to Android 16. Specifically: Devices missing support for Android IRadio HAL v3.0 lack receiving the mobile network unified security page, along with hardware dependent components like surveillance alerts.

Only upcoming Android 16 devices (e.g., Pixel 10) are likely to include:

 

 

  • Network surveillance alerts
  • Unified mobile network security page

 

 

Should You Be Concerned?

Reconnections during normal phone operation do request identifiers, but unusual behaviour can indicate red flag activity worth investigating.

Note: Android does not possess the capability to identify a spoofed cell tower. Rather, it alerts users to possible dangerous activities, allowing them to make decisions based on the notifications they receive.

Conclusion

With the release of new features in Google’s Android 16 update, users are empowered with technologies that help prevent and detect mobile surveillance attempts involving unauthorised cell towers. However, not all safeguards will be operational on previous devices. Newer phones running Android 16 will provide critical protections that may greatly facilitate detection and potentially assist evasion of stingray surveillance.