Tactical GSM Interception: Difference between revisions
From Buggedplanet.info
Jump to navigationJump to search
(→2009) |
|||
| (12 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
= Articles = | = Articles = | ||
== 2014 == | |||
{|border=1 | {|border=1 | ||
| Line 7: | Line 9: | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
|- | |- | ||
|20140917||golem.de||[http://www.golem.de/news/imsi-catcher-catch-me-if-you-can-1409-109276.html IMSI-CATCHER: Catch me if you can]||[[Tactical GSM | |20140917||golem.de||[http://www.golem.de/news/imsi-catcher-catch-me-if-you-can-1409-109276.html IMSI-CATCHER: Catch me if you can]||[[Tactical GSM Interception]] | ||
|- | |- | ||
|20140904||netzpolitik.org||[https://netzpolitik.org/2014/bericht-schweizer-firma-neosoft-soll-imsi-catcher-an-todesschwadronen-aus-bangladesch-verkaufen/ Bericht: Schweizer Firma NeoSoft soll IMSI-Catcher an Todesschwadronen aus Bangladesch verkaufen (Updates)]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM | |20140904||netzpolitik.org||[https://netzpolitik.org/2014/bericht-schweizer-firma-neosoft-soll-imsi-catcher-an-todesschwadronen-aus-bangladesch-verkaufen/ Bericht: Schweizer Firma NeoSoft soll IMSI-Catcher an Todesschwadronen aus Bangladesch verkaufen (Updates)]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | ||
|- | |- | ||
|20140904||woz.ch||[https://www.woz.ch/1436/ueberwachungsexporte/die-bangladesch-connection ÜBERWACHUNGSEXPORTE: Die Bangladesch-Connection - Eine Todesschwadron aus Bangladesch will Überwachungstechnologie von einer Zürcher Firma kaufen. Das bestätigt ein Geschäftspartner. Die Behörden verschärfen aufgrund von Nachforschungen der WOZ die Exportkontrollen.]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM | |20140904||woz.ch||[https://www.woz.ch/1436/ueberwachungsexporte/die-bangladesch-connection ÜBERWACHUNGSEXPORTE: Die Bangladesch-Connection - Eine Todesschwadron aus Bangladesch will Überwachungstechnologie von einer Zürcher Firma kaufen. Das bestätigt ein Geschäftspartner. Die Behörden verschärfen aufgrund von Nachforschungen der WOZ die Exportkontrollen.]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | ||
|- | |- | ||
| | |20140903||wired.com||[http://www.wired.com/2014/09/cryptophone-firewall-identifies-rogue-cell-towers/Phone Firewall Identifies Rogue Cell Towers Trying to Intercept Your Calls]||[[Tactical GSM Interception]] | ||
|- | |- | ||
|20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM | |20140811||washingtonpost.com||[http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/ Feds to study illegal use of spy gear]||[[Tactical GSM Interception]] / [[US]] | ||
|- | |||
|20140720||spiegel.de||[http://www.spiegel.de/spiegel/vorab/handy-funkmasten-im-bundestag-sollen-spionage-verhindern-a-981906.html Handy-Funkmasten im Bundestag sollen Spionage verhindern]||[[Tactical GSM Interception]] / [[DE]] | |||
|- | |||
|20140408||heise.de||[http://www.heise.de/ct/heft/2014-9-Wie-IMSI-Catcher-unauffaellig-legalisiert-wurden-2166054.html Solange keiner meckert … Wie IMSI-Catcher unauffällig legalisiert wurden]||[[Tactical GSM Interception]] / [[DE]] | |||
|- | |||
|} | |||
== 2011 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20111030||theguardian.com||[http://www.theguardian.com/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance Met police using surveillance system to monitor mobile phones: Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area]||[[Tactical GSM Interception]] / [[GB]] / [[DATONG]] | |||
|- | |||
|} | |||
== 2010 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20100810||heise.de||[http://m.heise.de/newsticker/meldung/IMSI-Catcher-fuer-1500-Euro-im-Eigenbau-1048919.html IMSI-Catcher für 1500 Euro im Eigenbau]||[[Tactical GSM Interception]] | |||
|- | |||
|} | |||
== 2009 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | |||
|- | |||
|} | |||
== 2008 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20081117||arstechnica.com||[http://arstechnica.com/tech-policy/2008/11/foia-docs-show-feds-can-lojack-mobiles-without-telco-help/ FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell …]||[[Tactical GSM Interception]] | |||
|- | |- | ||
|} | |} | ||
| Line 21: | Line 67: | ||
= Resources = | = Resources = | ||
* http://www.cs.stevens.edu/~swetzel/publications/mim.pdf A Man-in-the-Middle Attack on UMTS | * [http://www.cs.stevens.edu/~swetzel/publications/mim.pdf (stevens.edu): A Man-in-the-Middle Attack on UMTS] | ||
* [https://secupwn.github.io/Android-IMSI-Catcher-Detector/ (github.io): Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks!] | |||
* [https://github.com/jtwarren/spidey (github.io): SPIDEY is an app that helps you identify whether someone is attempting to monitor your cell phone location or activity. The app detects fake cell phone towers (called IMSI-catchers) and informs you if there’s a potential threat to your cell phone privacy.] | |||
* [https://data.epo.org/publication-server/pdf-document?pn=1924117&ki=B1&cc=EP (epo.org): Verfahren und Simulator zur Ausführung erfassender und manipulativer Zugriffe auf ein mobiles Endgerät] | |||
= Pictures = | |||
* http://www.pgsup.com/wp-content/uploads/2010/06/P4230059.jpg | |||
Latest revision as of 10:26, 19 September 2014
Vendors see Category:Tactical_GSM_Interception
Articles
2014
2011
| Date | Source | Title | Tags |
| 20111030 | theguardian.com | Met police using surveillance system to monitor mobile phones: Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area | Tactical GSM Interception / GB / DATONG |
2010
| Date | Source | Title | Tags |
| 20100810 | heise.de | IMSI-Catcher für 1500 Euro im Eigenbau | Tactical GSM Interception |
2009
| Date | Source | Title | Tags |
| 20091229 | cryptome.org | Tactical Interception of GSM Cellphones | Tactical GSM Interception |
2008
| Date | Source | Title | Tags |
| 20081117 | arstechnica.com | FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell … | Tactical GSM Interception |
Resources
- (stevens.edu): A Man-in-the-Middle Attack on UMTS
- (github.io): Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks!
- (github.io): SPIDEY is an app that helps you identify whether someone is attempting to monitor your cell phone location or activity. The app detects fake cell phone towers (called IMSI-catchers) and informs you if there’s a potential threat to your cell phone privacy.
- (epo.org): Verfahren und Simulator zur Ausführung erfassender und manipulativer Zugriffe auf ein mobiles Endgerät