In October 2025, Cape's CEO John Doyle testified in Congress on the threats posed to Department of Defense (DoD) personnel by adversarial access to public data.
"Today’s military relies on the same commercial cell networks that are regularly and repeatedly hacked and exploited... making it easy for determined actors to track the activity of military personnel based solely on the phones they carry in their pockets."
Watch his testimony here (from 28:10 - 33:05).
In Related Security News: Mass Surveillance Risks
- Secret Phone Tracking Exposed: An investigation exposed a clandestine surveillance system, Altamides, that exploits a fundamental flaw in the global telecom network (SS7) to pinpoint a phone's real-time location. The system targeted world leaders, journalists, and high-profile US figures, including US military-affiliated individuals, tracking them thousands of times.
- Satellites Leak Sensitive Data: New research revealed that geostationary (GEO) satellites are leaking a "shockingly large amount" of unencrypted data. Researchers intercepted military data (including the names of US sea vessels), unencrypted voice calls, and sensitive corporate communications using less than $800 in commercial equipment.
ICE & Cell Site Simulators (Stingrays)
- ICE Spends $825K on Fake Cell Towers: ICE recently purchased $825,000 worth of vehicles equipped with fake cell towers (a.k.a. Cell Site Simulators (CSS) or Stingrays). These devices track target phones by forcing all nearby devices to connect, meaning the data of innocent bystanders is also swept up.
- Stingray deployed to surveil protesters: A report suggests that a stingray may have been deployed to surveil protesters at the Portland ICE facility. The lack of warrants for this mass-surveillance tool raises civil liberties concerns.
As Cape CEO John Doyle commented in the above report,
"Most people think they’re safe if they’ve restricted their location sharing settings on their phone, or if they’re on a VPN. None of these application-level solutions prevent your phone from leaking network information to nearby cell towers, including fake ones."

