Difference between revisions of "Tactical GSM Interception"
From Buggedplanet.info
Jump to navigationJump to search (→2009) |
|||
(13 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
= Articles = | = Articles = | ||
+ | |||
+ | == 2014 == | ||
{|border=1 | {|border=1 | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20140917||golem.de||[http://www.golem.de/news/imsi-catcher-catch-me-if-you-can-1409-109276.html IMSI-CATCHER: Catch me if you can]||[[Tactical GSM Interception]] | ||
|- | |- | ||
|20140904||netzpolitik.org||[https://netzpolitik.org/2014/bericht-schweizer-firma-neosoft-soll-imsi-catcher-an-todesschwadronen-aus-bangladesch-verkaufen/ Bericht: Schweizer Firma NeoSoft soll IMSI-Catcher an Todesschwadronen aus Bangladesch verkaufen (Updates)]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | |20140904||netzpolitik.org||[https://netzpolitik.org/2014/bericht-schweizer-firma-neosoft-soll-imsi-catcher-an-todesschwadronen-aus-bangladesch-verkaufen/ Bericht: Schweizer Firma NeoSoft soll IMSI-Catcher an Todesschwadronen aus Bangladesch verkaufen (Updates)]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | ||
|- | |- | ||
|20140904||woz.ch||[https://www.woz.ch/1436/ueberwachungsexporte/die-bangladesch-connection ÜBERWACHUNGSEXPORTE: Die Bangladesch-Connection - Eine Todesschwadron aus Bangladesch will Überwachungstechnologie von einer Zürcher Firma kaufen. Das bestätigt ein Geschäftspartner. Die Behörden verschärfen aufgrund von Nachforschungen der WOZ die Exportkontrollen.]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | |20140904||woz.ch||[https://www.woz.ch/1436/ueberwachungsexporte/die-bangladesch-connection ÜBERWACHUNGSEXPORTE: Die Bangladesch-Connection - Eine Todesschwadron aus Bangladesch will Überwachungstechnologie von einer Zürcher Firma kaufen. Das bestätigt ein Geschäftspartner. Die Behörden verschärfen aufgrund von Nachforschungen der WOZ die Exportkontrollen.]||[[BD]] / [[NEOSOFT]] / [[CH]] / [[Tactical GSM Interception]] | ||
+ | |- | ||
+ | |20140903||wired.com||[http://www.wired.com/2014/09/cryptophone-firewall-identifies-rogue-cell-towers/Phone Firewall Identifies Rogue Cell Towers Trying to Intercept Your Calls]||[[Tactical GSM Interception]] | ||
+ | |- | ||
+ | |20140811||washingtonpost.com||[http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/ Feds to study illegal use of spy gear]||[[Tactical GSM Interception]] / [[US]] | ||
+ | |- | ||
+ | |20140720||spiegel.de||[http://www.spiegel.de/spiegel/vorab/handy-funkmasten-im-bundestag-sollen-spionage-verhindern-a-981906.html Handy-Funkmasten im Bundestag sollen Spionage verhindern]||[[Tactical GSM Interception]] / [[DE]] | ||
|- | |- | ||
|20140408||heise.de||[http://www.heise.de/ct/heft/2014-9-Wie-IMSI-Catcher-unauffaellig-legalisiert-wurden-2166054.html Solange keiner meckert … Wie IMSI-Catcher unauffällig legalisiert wurden]||[[Tactical GSM Interception]] / [[DE]] | |20140408||heise.de||[http://www.heise.de/ct/heft/2014-9-Wie-IMSI-Catcher-unauffaellig-legalisiert-wurden-2166054.html Solange keiner meckert … Wie IMSI-Catcher unauffällig legalisiert wurden]||[[Tactical GSM Interception]] / [[DE]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2011 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20111030||theguardian.com||[http://www.theguardian.com/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance Met police using surveillance system to monitor mobile phones: Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area]||[[Tactical GSM Interception]] / [[GB]] / [[DATONG]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2010 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20100810||heise.de||[http://m.heise.de/newsticker/meldung/IMSI-Catcher-fuer-1500-Euro-im-Eigenbau-1048919.html IMSI-Catcher für 1500 Euro im Eigenbau]||[[Tactical GSM Interception]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2009 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | |20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2008 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20081117||arstechnica.com||[http://arstechnica.com/tech-policy/2008/11/foia-docs-show-feds-can-lojack-mobiles-without-telco-help/ FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell …]||[[Tactical GSM Interception]] | ||
|- | |- | ||
|} | |} | ||
Line 19: | Line 67: | ||
= Resources = | = Resources = | ||
− | * http://www.cs.stevens.edu/~swetzel/publications/mim.pdf A Man-in-the-Middle Attack on UMTS | + | * [http://www.cs.stevens.edu/~swetzel/publications/mim.pdf (stevens.edu): A Man-in-the-Middle Attack on UMTS] |
+ | * [https://secupwn.github.io/Android-IMSI-Catcher-Detector/ (github.io): Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks!] | ||
+ | * [https://github.com/jtwarren/spidey (github.io): SPIDEY is an app that helps you identify whether someone is attempting to monitor your cell phone location or activity. The app detects fake cell phone towers (called IMSI-catchers) and informs you if there’s a potential threat to your cell phone privacy.] | ||
+ | * [https://data.epo.org/publication-server/pdf-document?pn=1924117&ki=B1&cc=EP (epo.org): Verfahren und Simulator zur Ausführung erfassender und manipulativer Zugriffe auf ein mobiles Endgerät] | ||
+ | |||
+ | = Pictures = | ||
+ | |||
+ | * http://www.pgsup.com/wp-content/uploads/2010/06/P4230059.jpg |
Latest revision as of 10:26, 19 September 2014
Vendors see Category:Tactical_GSM_Interception
Articles
2014
2011
Date | Source | Title | Tags |
20111030 | theguardian.com | Met police using surveillance system to monitor mobile phones: Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area | Tactical GSM Interception / GB / DATONG |
2010
Date | Source | Title | Tags |
20100810 | heise.de | IMSI-Catcher für 1500 Euro im Eigenbau | Tactical GSM Interception |
2009
Date | Source | Title | Tags |
20091229 | cryptome.org | Tactical Interception of GSM Cellphones | Tactical GSM Interception |
2008
Date | Source | Title | Tags |
20081117 | arstechnica.com | FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell … | Tactical GSM Interception |
Resources
- (stevens.edu): A Man-in-the-Middle Attack on UMTS
- (github.io): Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks!
- (github.io): SPIDEY is an app that helps you identify whether someone is attempting to monitor your cell phone location or activity. The app detects fake cell phone towers (called IMSI-catchers) and informs you if there’s a potential threat to your cell phone privacy.
- (epo.org): Verfahren und Simulator zur Ausführung erfassender und manipulativer Zugriffe auf ein mobiles Endgerät