CellularPrivacy / Android-IMSI-Catcher-Detector

AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/
GNU General Public License v3.0
4.74k stars 948 forks source link

Man in the middle attack, umts. Base station's #875

Open swampii opened 8 years ago

swampii commented 8 years ago

Thank you for your feedback! Please add below details so that we can help you a bit faster.


Agreements

Please check these boxes to ensure you've actually read and understood these important rules!

  • [x] I have reviewed and accepted the guidelines for contributing to this project.
  • [x] I have searched the open Issues and made sure I am not filing a duplicate.
  • [x] I have read the notes on debugging and will properly maintain this Issue.

Overview

Please add a short and easy to understand description of the Issue you've experienced here.

  • AIMSICD version (see the About screen):
  • Phone and ROM running current release:
  • Link to logfile without identifyable data:

Reproduction

Please tell us the detailed steps on how to reproduce your Issue here.


References

If your Issue is related to any other existing Issues or pull requests, please link them here.


Screenshots

If you experienced visual glitches, please add a screenshot without metadata here.

Mass surveillance are documented whit our cell phones. Thousands of volunteers have with their mobile phone uploaded their results to different cell tower (base station) databases.

The hack that is picked up whit our mobilphones is, "man in the middel attack, umts" The explanation is that GSM base stations is pretending to be an official GSM station and emits a Cell ID.

In the EU it is a human right to have telecommunications secrecy, it means that your phone calls must be encrypted. (it is very likely also human rights in many other countries)

You will need to compar whit official database for your area.

voluntarily collect databases.: Opencellid.org cellmapper.net wigle.net (blue dots) opensignal.com http://www.cellumap.com/ Mozilla location services. there are many other databases.

Official cell tower database.: Denmark.: Mastedatabasen.dk Norway.: finnsenderen.no Schweiz.: Funksender.ch Great Britain.: http://www.sitefinder.ofcom.org.uk/search France.: http://www.cartoradio.fr/cartoradio/web/ Belgium.: http://zendmasten.be/ Brussel.: http://geoportal.ibgebim.be/webgis/a...?langtype=2060 Austria.: http://www.senderkataster.at/ Germany http://emf3.bundesnetzagentur.de/karte/Default.aspx Netherlands.: http://www.antenneregister.nl/Html5V...ntenneregister USA.: http://www.antennasearch.com/

Pleas. Provide permalinks is there are things you don't understand, and the official database for your area and I will have a look. Or ask a questions.

eksampel when comparing databases.: how to compare, openopencellid.org and the official database for thr area you want to check, you will see it straight away, there is a huge difference. or for the USA opencellid.org, wiggle.net, opensignal.com, etc.. in conjunction whit http://www.antennasearch.com/

A few newspaper articles on the subject.: http://www.ibtimes.co.uk/fake-stingr...doners-1505368 http://www.theguardian.com/uk/2011/o...e-surveillance http://www.thelocal.no/20150309/norw...bile-receivers http://www.aftenposten.no/nyheter/ir...d-7825278.html http://www.networkworld.com/article/...s-iphones.html

A bit info about the hack.: https://en.wikipedia.org/wiki/IMSI-catcher https://www.sba-research.org/wp-cont...-ACSAC2014.pdf https://cosec.bit.uni-bonn.de/filead...ks/dammann.pdf https://media.blackhat.com/bh-dc-11/...Attacks-wp.pdf https://www.twelvesec.com/using-gsm-...calls-sms-pt1/ http://www.wired.com/2010/07/interce...l-phone-calls/ (stupid tracking algorithms makes that point less.) http://www.theregister.co.uk/2014/03...mpdown_police/ http://mobilesociety.typepad.com/mob...ly-switch.html (stupid you can't protect your phone against mitm, umts) http://www.theregister.co.uk/2010/08/02/gsm_cracking/ http://www.fiercewireless.com/tech/s...ing/2014-03-16

Radiation.: http://www.psrast.org/mobileng/hylandbasestation.pdf http://www.tetrawatch.net/papers/hyland_2005.pdf http://www.iss.it/binary/elet/cont/3.1203942327.pdf

more to come.

it is a cut from an article I'm writing.

Thanks swampii

SecUpwN commented 8 years ago

Good morning @swampii, welcome to our project. Sadly, I do not get what you want from us with filing this Issue. It does not seem to be related to our app in any way. Our app also does not spit out

"man in the middel attack, umts"

Result: This Issue is currently invalid. Please clarify which app you use and what you want us to do.