BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
โ€ข
ยฉ 2026
โ€ข
blacktemple.net
  1. Privacy Threats
  2. /L3Harris
๐Ÿ‡บ๐Ÿ‡ธ

L3Harris

Also known as: L3Harris Technologies ยท L3 Technologies ยท Harris Corporation

government contractor70/100
HQ Country
๐Ÿ‡บ๐Ÿ‡ธ United States
Category
government contractor
Threat Score
70/100
Incidents
14
Known Clients
FBIU.S. Marshals ServiceDEAICENSAU.S. Department of Defense75+ local U.S. police departmentsUK Ministry of DefenceAustralian Defence ForceIsraeli Defense Forces
Deployment Countries
๐Ÿ‡บ๐Ÿ‡ธ US๐Ÿ‡ฌ๐Ÿ‡ง GB๐Ÿ‡ฆ๐Ÿ‡บ AU๐Ÿ‡จ๐Ÿ‡ฆ CA๐Ÿ‡ฎ๐Ÿ‡ฑ IL๐Ÿ‡ฆ๐Ÿ‡ช AE๐Ÿ‡ธ๐Ÿ‡ฆ SA๐Ÿ‡ฉ๐Ÿ‡ช DE
References
ACLU: Stingray Cell-Site Simulator TrackingThe Intercept: Secret Government Catalog of Cell Phone Surveillance DevicesL3Harris Technologies Defense Intelligence Overview

Threat Score Factor Analysis

70/ 100

Overall Threat Score

Overview

L3Harris Technologies is an American defense and intelligence contractor formed in June 2019 through the $15.6 billion merger of L3 Technologies and Harris Corporation. Headquartered in Melbourne, Florida, L3Harris is the sixth-largest defense contractor in the United States, reporting approximately $19.4 billion in annual revenue in 2023 and employing around 50,000 people.

L3Harris occupies a unique and troubling position in the privacy landscape: the company, through its Harris Corporation heritage, is the primary manufacturer of cell-site simulators (commonly known as "Stingrays"), devices that impersonate cellular towers to intercept mobile phone communications and track the location of every phone in their vicinity. These devices have been deployed by at least 75 federal, state, and local law enforcement agencies across the United States, often without warrants and under strict non-disclosure agreements (NDAs) that prevent courts from learning the technology was used against defendants.

Harris Corporation began manufacturing cell-site simulators in the early 2000s, originally for military and intelligence applications. The technology migrated to domestic law enforcement through the FBI, which served as an intermediary, and by 2015, Stingray devices were in use by police departments from New York City to small-town sheriff's offices. The merger with L3 Technologies added signals intelligence, electronic warfare, and ISR (intelligence, surveillance, and reconnaissance) capabilities, creating a company whose surveillance technology portfolio spans tactical interception to strategic SIGINT collection.

L3Harris also produces the Driftnet internet surveillance tool, tactical SIGINT systems for military operations, and a range of electronic warfare equipment. The company's Intelligence & Cyber division provides classified services to the NSA, CIA, and other intelligence agencies.

Data Collection Practices

L3Harris's surveillance products enable data collection across multiple vectors, from individual cell phones to entire telecommunications networks.

Cell-Site Simulators (Stingray/Hailstorm/Crossbow)

Harris Corporation's cell-site simulator product line represents the most widely deployed surveillance technology in U.S. domestic law enforcement. These devices operate by impersonating legitimate cellular base stations, forcing all mobile phones in the vicinity to connect to the device instead of the real tower.

The core product line includes:

  • StingRay: The original cell-site simulator, operating on 2G networks. Captures IMSI (International Mobile Subscriber Identity), IMEI (International Mobile Equipment Identity), and can intercept voice calls and text messages on 2G connections.
  • StingRay II: Enhanced version with improved range and capabilities, supporting 2G, 3G, and 4G LTE interception.
  • Hailstorm: Advanced cell-site simulator with 4G LTE capabilities, designed to overcome encryption and security improvements in newer cellular networks.
  • Crossbow: Man-portable variant for tactical field deployment.
  • KingFish: Compact, handheld direction-finding tool used to locate specific phones at close range after initial identification with a Stingray.

When deployed, a Stingray device intercepts data from every cell phone within its range, not just the target device. This means a single Stingray deployment at a protest, in a neighborhood, or near a courthouse captures identifying information from hundreds or thousands of people who are not targets of any investigation. The collected data includes:

  • IMSI and IMEI identifiers for every phone in range
  • Phone numbers
  • Location data (precise to within a few meters using signal strength measurements)
  • Call metadata (numbers dialed, call duration)
  • On 2G connections, voice call content and text message content
  • On 3G/4G, device identifiers and location data (content interception is more limited)

Driftnet Internet Surveillance

L3Harris produces Driftnet, a network surveillance tool designed for intelligence and law enforcement agencies. Driftnet enables the monitoring and analysis of internet traffic at scale, including:

  • Deep packet inspection of internet communications
  • Metadata collection and analysis
  • Content filtering and keyword alerting
  • Network traffic pattern analysis
  • Target identification based on online activity

Driftnet is marketed primarily to foreign intelligence services and military clients for overseas deployment, but its capabilities mirror those of domestic internet surveillance tools.

Tactical SIGINT Systems

L3Harris manufactures tactical signals intelligence systems deployed by military and intelligence forces in the field. These systems intercept radio communications, cellular traffic, and other electromagnetic emissions in operational environments.

Tactical SIGINT products include man-portable intercept systems, vehicle-mounted collection platforms, and airborne SIGINT payloads. These systems provide battlefield commanders with real-time intelligence on adversary communications, but the same technology can be (and has been) used for surveillance of civilian communications in non-combat contexts.

ISR Platforms

L3Harris provides intelligence, surveillance, and reconnaissance (ISR) sensor systems for manned and unmanned aircraft. These include electro-optical/infrared (EO/IR) cameras, synthetic aperture radar (SAR), and signals intelligence payloads integrated into platforms including the U-2 spy plane, Global Hawk UAV, and various tactical drones. The ISR payloads enable persistent aerial surveillance of geographic areas, tracking vehicle and personnel movements over extended periods.

Known Clients & Government Contracts

L3Harris's surveillance technology is deployed across an unusually broad range of clients, from federal intelligence agencies to small-town police departments.

FBI

The FBI served as the primary conduit for distributing Harris Corporation's Stingray technology to state and local law enforcement. The bureau negotiated with Harris Corporation to establish a distribution framework in which the FBI purchased Stingray devices and then provided them to local police departments through Memoranda of Understanding (MOUs). These MOUs contained strict non-disclosure requirements that prohibited local agencies from revealing the use of Stingray technology, even to judges and defense attorneys.

The FBI's own use of Stingray devices spans counterterrorism, counterintelligence, organized crime, and other investigative domains. The bureau has deployed cell-site simulators tens of thousands of times, according to estimates by the ACLU based on partial records obtained through FOIA litigation.

U.S. Marshals Service

The U.S. Marshals Service operates a fleet of Cessna aircraft equipped with Harris Corporation's cell-site simulator technology, known as "dirtboxes" (a nickname derived from the DRT, Digital Receiver Technology, brand name). These airborne Stingray systems fly over cities and suburbs, sweeping up identifying information from tens of thousands of cell phones per flight while searching for specific fugitives. The Wall Street Journal revealed the program in 2014.

Local Police Departments (75+ Agencies)

By 2016, the ACLU had identified at least 75 law enforcement agencies in 27 states using cell-site simulators, including:

  • New York Police Department (NYPD)
  • Los Angeles Police Department (LAPD)
  • Chicago Police Department
  • Baltimore Police Department
  • Miami-Dade Police Department
  • Numerous county sheriff's offices and smaller municipal departments

Many of these agencies acquired Stingray devices with federal grant funding from the Department of Homeland Security, enabling even small departments to deploy sophisticated cellular surveillance technology. The ACLU documented that most agencies used the devices without obtaining warrants, instead relying on lower-standard "pen register" orders or no court authorization at all.

NSA and Intelligence Community

L3Harris's Intelligence & Cyber division holds classified contracts with the NSA and other intelligence agencies for SIGINT processing, cyber operations, and intelligence analytics. The merger of L3 Technologies and Harris Corporation combined two established intelligence contractors, creating a company with deep penetration across the U.S. intelligence community.

International Clients

L3Harris provides defense and intelligence systems to allied nations including the United Kingdom, Australia, Canada, Israel, Germany, Saudi Arabia, and the UAE. International sales include tactical SIGINT systems, electronic warfare equipment, and ISR sensor payloads. The export of cell-site simulator technology to foreign governments is subject to ITAR (International Traffic in Arms Regulations) controls, but the extent of international Stingray deployments is not publicly known.

Privacy Incidents & Litigation

Warrantless Stingray Surveillance

The most significant privacy issue surrounding L3Harris is the systematic warrantless use of Stingray devices by U.S. law enforcement.

For over a decade, police departments across the country used cell-site simulators without obtaining probable cause warrants, instead relying on pen register orders (which require only a showing of "relevance" to an investigation) or no court authorization whatsoever. The ACLU documented numerous cases in which prosecutors dropped charges rather than disclose Stingray use to defense attorneys, indicating that law enforcement prioritized the secrecy of the technology over criminal convictions.

Key cases include:

  • United States v. Rigmaiden (2013): Daniel Rigmaiden, accused of tax fraud, discovered the government used a Stingray to locate him and challenged the warrantless search. The case was one of the first to bring public attention to cell-site simulator technology.
  • State of Maryland v. Andrews (2016): The Maryland Court of Special Appeals ruled that the warrantless use of a Stingray device to locate a suspect violated the Fourth Amendment, establishing one of the first appellate-level constraints on the technology.
  • ACLU v. Department of Justice (ongoing FOIA litigation): The ACLU has conducted extensive FOIA litigation to obtain records about Stingray deployment, revealing the scope of the technology's use and the NDA requirements that prevented judicial oversight.

Non-Disclosure Agreements Subverting Due Process

Harris Corporation required all law enforcement agencies purchasing Stingray devices to sign NDAs prohibiting disclosure of the technology's capabilities or use. The FBI reinforced these requirements through its MOUs with local agencies. These secrecy requirements directly undermined defendants' due process rights:

  • Prosecutors instructed police officers to describe Stingray-obtained evidence as coming from "confidential sources" or "good police work" rather than electronic surveillance
  • Judges issued orders without understanding the technology being used
  • Defense attorneys could not challenge the legality of evidence collection methods they were not allowed to know about
  • Cases were dropped when disclosure was required, allowing potentially dangerous individuals to go free rather than expose the technology

The ACLU described this practice as creating a "parallel construction" system in which the true source of evidence was systematically concealed from the judicial system.

Mass Surveillance at Protests

Cell-site simulators have been documented or suspected in use at political protests, including Black Lives Matter demonstrations. Because Stingray devices capture data from every phone in range, deployment at a protest captures identifying information for all attendees, creating a surveillance record of individuals exercising First Amendment rights.

In 2015, reporters documented the use of Stingray-equipped aircraft over Baltimore during protests following the death of Freddie Gray. The surveillance captured cell phone data from thousands of protesters, bystanders, and residents of surrounding neighborhoods.

Driftnet Export Concerns

L3Harris's Driftnet internet surveillance tool has been sold to foreign intelligence services whose use of the technology cannot be monitored by the selling company. The export of network surveillance capabilities to governments in the Middle East and other regions raises concerns similar to those surrounding BAE Systems' Evident and Sandvine's DPI technology, tools designed for lawful surveillance that are deployed in contexts where the rule of law does not protect political expression or journalistic activity.

Threat Score Analysis

L3Harris Technologies receives a composite threat score of 70/100, reflecting its role as the primary manufacturer of cell-site simulators used for warrantless domestic surveillance:

  • Data Collection (72/100): L3Harris's Stingray devices collect identifying information and location data from every cell phone within range, not just targeted devices. This indiscriminate collection, capturing data from hundreds or thousands of non-targets per deployment, represents a qualitatively different privacy threat than targeted surveillance. The company's tactical SIGINT systems and Driftnet internet surveillance tool extend collection capabilities to military and intelligence contexts. The Stingray technology's migration from military to domestic law enforcement, where it was used without warrants for over a decade, represents one of the most significant domestic surveillance deployments in U.S. history.

  • Third-Party Sharing (70/100): L3Harris distributed cell-site simulator technology to over 75 law enforcement agencies through FBI intermediation, creating a nationwide surveillance capability without public awareness or democratic debate. The transfer of surveillance technology to foreign intelligence services through defense sales extends the company's privacy impact internationally. The NDA requirements imposed on law enforcement clients represent an unusual form of third-party sharing in which the manufacturer controls how government clients disclose their surveillance activities to courts.

  • Breach History (38/100): L3Harris has not experienced widely documented breaches of its own systems. However, the proliferation of Stingray devices across dozens of law enforcement agencies, many with limited cybersecurity resources, creates distributed security risks. Each deployed Stingray device represents a point of vulnerability where intercepted cell phone data could be exposed. The sensitivity of the military SIGINT and intelligence programs L3Harris supports adds to the potential impact of any breach.

  • Government Contracts (85/100): L3Harris is deeply embedded in both the intelligence community (NSA, CIA, military SIGINT) and domestic law enforcement (FBI, Marshals Service, 75+ local agencies). The company's unique position as the primary supplier of cell-site simulators to U.S. law enforcement gives it outsized influence over domestic surveillance practices. The $19.4 billion in annual revenue and contracts spanning tactical to strategic intelligence make L3Harris a major node in the surveillance infrastructure.

  • Transparency (20/100): L3Harris operates with exceptionally low transparency regarding its surveillance products. The company imposed NDAs on law enforcement clients that prevented courts and the public from learning about Stingray technology for over a decade. There is no transparency report, no disclosure of human rights impact assessments, and no public accounting of the number of devices sold or countries where they are deployed. The systematic concealment of surveillance capabilities from the judicial system represents an active strategy of avoiding accountability, not merely a failure of transparency.

Weighted calculation: (72 * 0.25) + (70 * 0.25) + (38 * 0.20) + (85 * 0.15) + (20 * 0.15) = 18 + 17.5 + 7.6 + 12.75 + 3 = 58.85, adjusted to 70 due to the systematic warrantless deployment of cell-site simulators across U.S. law enforcement, the NDA regime that subverted judicial oversight, and the indiscriminate collection of data from non-targets at every deployment.

Transparency & Accountability

L3Harris Technologies maintains one of the lowest transparency profiles of any major U.S. defense contractor regarding its surveillance products.

NDA Regime as Accountability Avoidance

The non-disclosure agreements imposed on Stingray purchasers were not merely confidentiality measures, they constituted a deliberate system for preventing legal and democratic accountability for surveillance practices. By contractually prohibiting law enforcement agencies from disclosing Stingray use to courts, Harris Corporation ensured that:

  • No judicial precedent could develop regarding the legality of cell-site simulators
  • Defendants could not challenge Fourth Amendment violations they did not know occurred
  • Legislators could not debate policies they were not informed about
  • The public could not assess the scope of domestic surveillance being conducted in their name

This NDA regime persisted for over a decade before investigative journalism and ACLU FOIA litigation forced partial disclosure. The systematic subversion of judicial oversight represents a uniquely egregious form of corporate accountability avoidance in the surveillance technology sector.

DOJ Policy Changes (2015)

In September 2015, the Department of Justice issued a policy requiring federal agents to obtain warrants before using cell-site simulators, except in emergency circumstances. This policy change came only after sustained public pressure following media exposures and ACLU litigation. However, the policy applies only to federal agencies, state and local law enforcement are governed by varying state laws, many of which do not require warrants for cell-site simulator use.

Furthermore, the DOJ policy contains exceptions for "exigent circumstances" and "exceptional circumstances" that provide significant latitude for warrantless deployment. The policy is an internal guideline, not a statutory requirement, and can be revised or revoked without Congressional action.

Absence of Corporate Accountability Mechanisms

L3Harris publishes no transparency report regarding its surveillance technology sales. The company has no public human rights policy governing the sale of surveillance technology. There is no known independent oversight of Stingray deployment practices or end-use monitoring of surveillance technology sold to foreign governments.

The company's public communications about Stingray technology are limited to brief corporate statements acknowledging the products' existence while declining to discuss capabilities, sales volumes, or deployment practices.

Legislative Response

Several states have passed laws requiring warrants for cell-site simulator use following public disclosure of the technology. However, this patchwork of state laws leaves significant gaps, and there is no federal statute specifically governing cell-site simulator technology. The Stingray experience illustrates a recurring pattern in surveillance technology: deployment proceeds for years without democratic authorization, and legislative responses arrive only after the technology is already entrenched in law enforcement practice.

All Companies