Stingray warrant

jim bell jdb10987 at yahoo.com
Sat Nov 18 14:23:02 PST 2017



 From: No <nonomos at mail.com>
fyi

https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/

>Who catches the IMSI catchers? Researchers demonstrate Stingray
detection kit
Posted Jun 2, 2017 by Devin Coldewey

>Next Story
Storyzy is a quote verifier that wants to skewer fake news
Who catches the IMSI catchers? Researchers demonstrate Stingray
detection kit

>IMSI catchers, devices used to spoof cell towers and interceptcommunications, are one of the most resented open secrets of law
enforcement. Strict non-disclosure agreements prevent them from being
acknowledged as existing, let alone being used — but researchers think
they’ve found a way to spot the shady signal-snatchers.



A few years ago, maybe 2012 or 2013, I read an article which indicated that any cell phone, even one that had to active service, would be activated in the presence of an IMSI device.  I speculated, on Cypherpunks, that it would be easily to build an IMSI detector using a power source feeding such an inactive phone, with a current detector in place.  Ordinarily, that phone would dissipate a small current, which would be increased if an IMSI activated it.
The article describes a substantially more sophisticated implementation, much like a website such as WIGLE.NET   https://wigle.net/       maps WiFi sites.  It presumably records the signal strength of the cell site that activates the target phone, and eventually draws a map of its computed location.
           Jim Bell
×   
   
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 4814 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20171118/464af5f1/attachment.txt>


More information about the cypherpunks mailing list