Difference between revisions of "Tactical GSM Interception"
From Buggedplanet.info
Jump to navigationJump to searchLine 2: | Line 2: | ||
= Articles = | = Articles = | ||
+ | |||
+ | == 2014 == | ||
{|border=1 | {|border=1 | ||
Line 16: | Line 18: | ||
|- | |- | ||
|20140811||washingtonpost.com||[http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/ Feds to study illegal use of spy gear]||[[Tactical GSM Interception]] / [[US]] | |20140811||washingtonpost.com||[http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/ Feds to study illegal use of spy gear]||[[Tactical GSM Interception]] / [[US]] | ||
+ | |- | ||
+ | |20140720||spiegel.de||[http://www.spiegel.de/spiegel/vorab/handy-funkmasten-im-bundestag-sollen-spionage-verhindern-a-981906.html Handy-Funkmasten im Bundestag sollen Spionage verhindern]||[[Tactical GSM Interception]] / [[DE]] | ||
|- | |- | ||
|20140408||heise.de||[http://www.heise.de/ct/heft/2014-9-Wie-IMSI-Catcher-unauffaellig-legalisiert-wurden-2166054.html Solange keiner meckert … Wie IMSI-Catcher unauffällig legalisiert wurden]||[[Tactical GSM Interception]] / [[DE]] | |20140408||heise.de||[http://www.heise.de/ct/heft/2014-9-Wie-IMSI-Catcher-unauffaellig-legalisiert-wurden-2166054.html Solange keiner meckert … Wie IMSI-Catcher unauffällig legalisiert wurden]||[[Tactical GSM Interception]] / [[DE]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2009 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | |20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] |
Revision as of 10:08, 19 September 2014
Vendors see Category:Tactical_GSM_Interception
Articles
2014
2009
Date | Source | Title | Tags |
20091229 | cryptome.org | Tactical Interception of GSM Cellphones | Tactical GSM Interception |
Resources
- http://www.cs.stevens.edu/~swetzel/publications/mim.pdf A Man-in-the-Middle Attack on UMTS