!!! Overview [{$pagename}] (a.k.a. Stingrays or [IMSI]-catchers) let their operators perform [Surveillance] on the [Mobile Device] usage nearby. * [IMSI]-catcher - simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. * Communication interception ([Man-In-The-Middle]) between a [Mobile Device] and a legitimate [CELLID] tower is only possible in [GSM] (G2) (as opposed to later [3G] or [4G] [protocols] as communicating over GSM doesn’t always require [encryption] and even when encryption is enabled, several of the [cryptographic] algorithms used in [GSM] can be broken (and in real time). [{$pagename}]s are used by [Attackers], [Law Enforcement Agency] and [Government Surveillance] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Cell-Site Simulators/IMSI Catchers|https://www.eff.org/pages/cell-site-simulatorsimsi-catchers|target='_blank'] - based on information obtained 2019-08-14 * [#2] - [Understanding How IMSI-Catchers Exploit Cell Networks|https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks|target='_blank'] - based on information obtained 2019-09-17