Unauthorized stingrays

John Newman jnn at synfin.org
Thu Apr 5 16:50:51 PDT 2018



> On Apr 3, 2018, at 8:11 PM, jim bell <jdb10987 at yahoo.com> wrote:
> 
> DHS may have found unauthorized Stingray devices in Washington DC
> https://www.yahoo.com/newsroom/vibes/politics/v-dbb2094c-7d9a-37c0-96b9-7f844af62e78_c-5e1985d9-69f4-3395-bb5e-2882e0523f41_a-5e1985d9-69f4-3395-bb5e-2882e0523f41
> 
> 

Crazy link man.

Anyway, anybody with the right radio hardware 
and a little Linux box with OpenBTS and maybe
asterisks (or other software setup depending)
can roll something like this out...

Last i checked it didn’t support 3G but the phones can
be tricked into switching down to 2G unencrypted 
if you blast a strong enough signal. Newer phones maybe 
more resilient?

I don’t know how much more advanced the commercial 
stingrays are over the best roll-your-own...

There are android apps that do IMSI catcher detection, 
but they have some issues.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1764 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20180405/297cb7fb/attachment.txt>


More information about the cypherpunks mailing list