Secret Service Dismantles Rogue Spy Telecom Network at UN Summit 

During the UN Assembly, federal agents dismantled a telecom threat, seizing SIM servers, 100,000 SIM cards, and a spy bug device.

On September 23, the US Secret Service dismantled a massive clandestine telecommunications network, neutralizing a giant ‘spy buy device,’ seizing over 300 SIM servers and 100,000 active SIM cards that can send 30 million messages per minute to cripple cell service during the UN General Assembly in New York. 

Located within a 35-mile radius of the UN headquarters, just as more than 150 world leaders convened to discuss AI governance, historic vote on the recognition of a Palestinian state, the brutal Israeli war on Palestinians, as well as the ongoing diplomatic efforts to end the Russia-Ukraine war.  

Authorities described the listening device spy network as a coalition of articulate overwhelming networks to interfere and disable emergency calls, as well as other network disruptions. 

“The potential for disruption to our country’s telecommunications posed by this network of devices cannot be overstated,” said Secret Service Director, Sean Curran

Matt McCool, head of the New York field office warned that “it can take down cell towers… You can’t text message, you can’t use your cell phone. And if you coupled that with some sort of other event associated with UNGA, it could be catastrophic.” 

Mobilizing the New York Police Department (NYPD), Homeland Security Investigations, the Justice Department, as well as international partners, the Advanced Threat Interdiction Unit’s investigation exposed nation-state involvement due to high levels of strategic execution and its multi-million-dollar cost.  

Officials confirmed no active cell site spy bug device simulator was uncovered but emphasized the scale of the system’s potential. 

Who Built Spy Bug Device 

Among the seized equipment, the federal agencies’ units discovered a cluster of spy devices listening as world leaders gather at the UN headquarters.

Forensic experts are now combing through the seized data, which included encrypted calls and texts, with findings suggesting the system enabled communication between nation-state actors and individuals already flagged by US law enforcement.  

Analysts told the New York Times the sophistication points to possible involvement by countries like Russia, China, or Israel, though no government has been officially named.  

Security specialists identified modified tools that can detect spy devices, along with at least one listening device designed to capture conversations. Some technology resembled discreet audio surveillance units typically employed by advanced intelligence networks. 

 On one hand the spy hearing device has been detected, while others matched the characteristics often used by advanced networks. 

Investigators also identified stimulators and multiple surveillance devices, both of which are typically deployed to intercept mobile communications. Alongside this, several eavesdropping devices and more advanced eavesdropping bugging devices were found hidden within ordinary electronics. 

“My instinct is this is espionage,” said Anthony J. Ferrante, a former FBI cybersecurity specialist. James A. Lewis, of the Center for European Policy Analysis, echoed that view, saying the technical complexity made simple criminal activity unlikely. 

Adding to the mystery, investigators also seized firearms, mobile devices, computers, and 80 grams of cocaine. Officials described the operation as a “well-funded, highly organized enterprise,” costing millions in equipment alone, and one that posed a serious telecom network security risk. 

Experts also revealed the presence of at least one bug and advanced iMIS catchers, both capable of silently intercepting data from mobile phones. IMIS catcher tools are used in mobile network surveillance. 

Audio Spy Tracking Devices Network 

Officials fear the seized network could have been used to spread disinformation on a scale. With its ability to push out messages nationwide in 12 minutes, experts warn that the spy audio bug could have amplified deepfakes or manipulated narratives during high-profile events like the UN Assembly.  

The discovery has exposed the blurred line between espionage, organized crime, information warfare, and the real meaning of operational high-level coordination. 

As McCool warned, the possibility of similar networks in other US cities “cannot be ruled out.” The spy bug device incident serves as a reminder that in the digital age, threats to national security are often invisible, embedded in the very systems that keep cities connected. 


Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecurity sections to stay informed and up-to-date with our daily articles.