- Android 16 will include alarms for fake cell towers and suspicious networks
- Update detects ‘Stingray’ devices that make up cell towers
- Feature that is likely to arrive with devices that are launched on Android 16
Not every mobile network is what it seems. If your smartphone inadvertently connects to a false cell tower, it can expose your private data to eavesdropping. Fortunately, Google does something about it: A new security feature in Android 16 is designed to discover suspicious connections and warn you if someone tries to intercept your calls and texts.
Cell Mast Simulators, known as ‘StingRay’ devices, creates a Phoney (word game calculated) signal that can fool your mobile to reveal your location and communication. It is a difficult tactic that has previously been undetectable for smartphone users. Until now, users have had a very limited tool set to protect themselves.
To tackle the risk of silent espionage, Google has developed a warning system that detects these junk networks and flags when a connection is not what it seems. Expected to arrive with new Android 16 devices, it is a background function with major consequences for privacy.
No more phoney -towers
Stingrays work by mimicking cell towers. When a smartphone connects to the fake network, its operator can track the device and harvest data, including unique identifiers such as IMEI. It can also transfer the device to a less secure network to listen to calls and messages – all without any indication to the targeted user.
A kind of IMSI prisoner, Stingrays is known to be used by law enforcement authorities. While they are sometimes eligible in the name of national security, they also have the potential for abuse, especially if they fall into the hands of dishonest actors.
StingRay devices generally use 2G to target smartphones. Even if you are on 4G or 5G, most phones can fall back to 2g. This built-in vulnerability can be utilized by stingrays: By emitting a strong 2G signal, they can trick nearby devices into connecting. Because 2G networks lack modern encryption standards and do not authenticate towers, your phone cannot verify if they are real.
Right now, the best way to protect yourself from StingRay attacks to disable 2G network connection is completely.
The Android 16 update adds another layer of protection. According to developer notes on the Android Open Source project, it introduces the ‘Network Notation’ warnings. Compatible phones will be able to detect when a mobile network requests the device’s identifiers or tries to force it into a non -encrypted connection. Both of these events will be marked to the end user.
The feature can be configured under ‘Mobile Network Security’ in the Settings menu along with the option of activating 2G network protection. The problem is that no Android phones actually have the hardware required to unlock the feature -not even the best pixels. Therefore, the setting is currently hidden.
As a result, it is likely that the first Android phones with the ability to detect false cell towers will be launched later in the year. There is a good chance that it will debut on Google Pixel 10, which might just make it the most secure smartphone ever.



