Unauthorized stingrays
John Newman
jnn at synfin.org
Thu Apr 5 16:50:51 PDT 2018
> On Apr 3, 2018, at 8:11 PM, jim bell <jdb10987 at yahoo.com> wrote:
>
> DHS may have found unauthorized Stingray devices in Washington DC
> https://www.yahoo.com/newsroom/vibes/politics/v-dbb2094c-7d9a-37c0-96b9-7f844af62e78_c-5e1985d9-69f4-3395-bb5e-2882e0523f41_a-5e1985d9-69f4-3395-bb5e-2882e0523f41
>
>
Crazy link man.
Anyway, anybody with the right radio hardware
and a little Linux box with OpenBTS and maybe
asterisks (or other software setup depending)
can roll something like this out...
Last i checked it didn’t support 3G but the phones can
be tricked into switching down to 2G unencrypted
if you blast a strong enough signal. Newer phones maybe
more resilient?
I don’t know how much more advanced the commercial
stingrays are over the best roll-your-own...
There are android apps that do IMSI catcher detection,
but they have some issues.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1764 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180405/297cb7fb/attachment.txt>
More information about the cypherpunks
mailing list