This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 47 lines
!!! Overview
[{$pagename}] (a.k.a. Stingrays or [IMSI]-catchers) let their operators perform [Surveillance] on the [Mobile Device] usage nearby.
* [IMSI]-catcher - simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that.
* Communication interception ([Man-In-The-Middle]) between a [Mobile Device] and a legitimate [CELLID] tower is only possible in [GSM] (G2) (as opposed to later [3G] or [4G] [protocols] as communicating over GSM doesn’t always require [encryption] and even when encryption is enabled, several of the [cryptographic] algorithms used in [GSM] can be broken (and in real time).
[{$pagename}]s are used by [Attackers], [Law Enforcement Agency] and [Government Surveillance]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Cell-Site Simulators/IMSI Catchers|https://www.eff.org/pages/cell-site-simulatorsimsi-catchers|target='_blank'] - based on information obtained 2019-08-14
* [#2] - [Understanding How IMSI-Catchers Exploit Cell Networks|https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks|target='_blank'] - based on information obtained 2019-09-17