Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • A Android-IMSI-Catcher-Detector
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 162
    • Issues 162
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 5
    • Merge requests 5
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • CellularPrivacy
  • Android-IMSI-Catcher-Detector
  • Issues
  • #751
Closed
Open
Issue created Jan 14, 2016 by Administrator@rootContributor

Support for importing Wigle Wifi GSM databases

Created by: ProGamerGov

I am sure you already know about Wigle Wifi as the developers originally closed another "feature request/suggestion" from another user here for Wifi integration (this post is purely about the cellular applications of the app), that was related to it here: https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/issues/545

This particular issue/feature that my post is about, is similar to issue: https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/issues/71

So first off whenever I have GPS issues with AIMSICD, the Wigle WIfi Android app always seems to fix the GPS. I like to run it alongside AIMSICD in order to capture the nearby wifi networks, in an attempt to find rogue/evil access points. I have caught rogue access points, seems "ShawGo Wifi" fakes are popular as a fake access point that devices will auto-connect to. I have also noticed what appear to be targeted attacks with rogue wifi access points deployed nearby major transit related routes (targeting train and bus passengers) exploiting auto-connect features. On my Wigle Wifi app database, I have hundreds of cell towers recorded multiple times, and some cell towers with thousands of data entries.

The Wigle Wifi app records a massive amount of GSM data in addition to Wifi access points. The app allows you to export KML and CSV files for the entire data base, or just the current "run/session". The CSV file contains multiple different columns:

"MAC", "SSID", "AuthMode", "FirstSeen", "Channel", "RSSI", "CurrentLatitude", "CurrentLongitude", "AltitudeMeters", "AccuracyMeters", "Type".

Under "Type", the cell tower or wifi access point is labled as "Wifi" or "GSM". In Microsoft Excel, I am able to remove all the "wifi" data entries, so that I am left with the cell tower related entries.

"SSID": The name of the cell company/ carrier. Bell, Telus, Orange F, F-Bouygues Telecom, etc...

"MAC" : The number that contains country code, carrier, etc... AIMSICD displays it on the phone/SIM details page as the Operator ID, LAC, and CID.

"Authmode": Shows the type of connection used, like "HSPA;fr", "UMTS;fr", "EDGE;fr", "HSPA;ca", "UMTS:de", "GPRS;fr", etc...

"FirstSeen": example: "2016-08-20 9:18:00 AM".

"Channel": Has no use with cell tower data, the value is zero on any data entry with "Type" set to "GSM".

"RSSI": The signal strength.

The rest are self explanatory.

So basically the Wigle Wifi App is constantly collecting a lot of the same data that AIMSICD collects for cell towers. It would be nice to utilize this information collected by Wigle Wifi, in AIMSICD as an alternative data base, or even as part of the main database.

For importing the data from the Wigle Wifi CSV file, you would first have to remove the Wifi data via only copying the GSM type. The location, time, etc.. values can then been pulled and organized into AIMSICD's database.

The Wigle Wifi app for Android can be found here: https://play.google.com/store/apps/details?id=net.wigle.wigleandroid&hl=en

And can also be found on F-Droid, here: https://f-droid.org/repository/browse/?fdid=net.wigle.wigleandroid

The Wigle Wifi site can be found here: https://wigle.net/

I can provide farther insight into this if needed, but I am still learning the basics of coding, so I sadly cannot really help code an app designed to protect people.

Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.

Assignee
Assign to
Time tracking