!!! Overview
[{$pagename}] (a.k.a. Stingrays or [IMSI]-catchers) let their operators perform [Surveillance] on the [Mobile Device] usage nearby.



* [IMSI]-catcher - simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. 
* Communication interception ([Man-In-The-Middle]) between a [Mobile Device] and a legitimate [CELLID] tower is only possible in [GSM] (G2) (as opposed to later [3G] or [4G] [protocols] as communicating over GSM doesn’t always require [encryption] and even when encryption is enabled, several of the [cryptographic] algorithms used in [GSM] can be broken (and in real time).


[{$pagename}]s are used by [Attackers], [Law Enforcement Agency] and [Government Surveillance]


!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Cell-Site Simulators/IMSI Catchers|https://www.eff.org/pages/cell-site-simulatorsimsi-catchers|target='_blank'] - based on information obtained 2019-08-14 
* [#2] - [Understanding How IMSI-Catchers Exploit Cell Networks|https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks|target='_blank'] - based on information obtained 2019-09-17