Difference between revisions of "Tactical GSM Interception"
From Buggedplanet.info
Jump to navigationJump to search (→2009) |
|||
Line 42: | Line 42: | ||
|- | |- | ||
|20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | |20091229||cryptome.org||[http://cryptome.org/gsm-spy.htm Tactical Interception of GSM Cellphones]||[[Tactical GSM Interception]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2008 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20081117||arstechnica.com||[http://arstechnica.com/tech-policy/2008/11/foia-docs-show-feds-can-lojack-mobiles-without-telco-help/ FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell …]||[[Tactical GSM Interception]] | ||
|- | |- | ||
|} | |} |
Revision as of 10:25, 19 September 2014
Vendors see Category:Tactical_GSM_Interception
Articles
2014
2011
Date | Source | Title | Tags |
20111030 | theguardian.com | Met police using surveillance system to monitor mobile phones: Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area | Tactical GSM Interception / GB / DATONG |
2009
Date | Source | Title | Tags |
20091229 | cryptome.org | Tactical Interception of GSM Cellphones | Tactical GSM Interception |
2008
Date | Source | Title | Tags |
20081117 | arstechnica.com | FOIA docs show feds can lojack mobiles without telco help: Documents obtained by civil liberties groups suggest the feds can track cell … | Tactical GSM Interception |
Resources
- (stevens.edu): A Man-in-the-Middle Attack on UMTS
- (github.io): Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks!
- (github.io): SPIDEY is an app that helps you identify whether someone is attempting to monitor your cell phone location or activity. The app detects fake cell phone towers (called IMSI-catchers) and informs you if there’s a potential threat to your cell phone privacy.
- (epo.org): Verfahren und Simulator zur Ausführung erfassender und manipulativer Zugriffe auf ein mobiles Endgerät