Man in the middle attack, umts. Base station's
Created by: swampii
Thank you for your feedback! Please add below details so that we can help you a bit faster.
Agreements
Please check these boxes to ensure you've actually read and understood these important rules!
-
I have reviewed and accepted the guidelines for contributing to this project. -
I have searched the open Issues and made sure I am not filing a duplicate. -
I have read the notes on debugging and will properly maintain this Issue.
Overview
Please add a short and easy to understand description of the Issue you've experienced here.
-
AIMSICD
version (see theAbout
screen): - Phone and ROM running current release:
- Link to logfile without identifyable data:
Reproduction
Please tell us the detailed steps on how to reproduce your Issue here.
References
If your Issue is related to any other existing Issues or pull requests, please link them here.
Screenshots
If you experienced visual glitches, please add a screenshot without metadata here.
Mass surveillance are documented whit our cell phones. Thousands of volunteers have with their mobile phone uploaded their results to different cell tower (base station) databases.
The hack that is picked up whit our mobilphones is, "man in the middel attack, umts" The explanation is that GSM base stations is pretending to be an official GSM station and emits a Cell ID.
In the EU it is a human right to have telecommunications secrecy, it means that your phone calls must be encrypted. (it is very likely also human rights in many other countries)
You will need to compar whit official database for your area.
voluntarily collect databases.: Opencellid.org cellmapper.net wigle.net (blue dots) opensignal.com http://www.cellumap.com/ Mozilla location services. there are many other databases.
Official cell tower database.: Denmark.: Mastedatabasen.dk Norway.: finnsenderen.no Schweiz.: Funksender.ch Great Britain.: http://www.sitefinder.ofcom.org.uk/search France.: http://www.cartoradio.fr/cartoradio/web/ Belgium.: http://zendmasten.be/ Brussel.: http://geoportal.ibgebim.be/webgis/a...?langtype=2060 Austria.: http://www.senderkataster.at/ Germany http://emf3.bundesnetzagentur.de/karte/Default.aspx Netherlands.: http://www.antenneregister.nl/Html5V...ntenneregister USA.: http://www.antennasearch.com/
Pleas. Provide permalinks is there are things you don't understand, and the official database for your area and I will have a look. Or ask a questions.
eksampel when comparing databases.: how to compare, openopencellid.org and the official database for thr area you want to check, you will see it straight away, there is a huge difference. or for the USA opencellid.org, wiggle.net, opensignal.com, etc.. in conjunction whit http://www.antennasearch.com/
A few newspaper articles on the subject.: http://www.ibtimes.co.uk/fake-stingr...doners-1505368 http://www.theguardian.com/uk/2011/o...e-surveillance http://www.thelocal.no/20150309/norw...bile-receivers http://www.aftenposten.no/nyheter/ir...d-7825278.html http://www.networkworld.com/article/...s-iphones.html
A bit info about the hack.: https://en.wikipedia.org/wiki/IMSI-catcher https://www.sba-research.org/wp-cont...-ACSAC2014.pdf https://cosec.bit.uni-bonn.de/filead...ks/dammann.pdf https://media.blackhat.com/bh-dc-11/...Attacks-wp.pdf https://www.twelvesec.com/using-gsm-...calls-sms-pt1/ http://www.wired.com/2010/07/interce...l-phone-calls/ (stupid tracking algorithms makes that point less.) http://www.theregister.co.uk/2014/03...mpdown_police/ http://mobilesociety.typepad.com/mob...ly-switch.html (stupid you can't protect your phone against mitm, umts) http://www.theregister.co.uk/2010/08/02/gsm_cracking/ http://www.fiercewireless.com/tech/s...ing/2014-03-16
Radiation.: http://www.psrast.org/mobileng/hylandbasestation.pdf http://www.tetrawatch.net/papers/hyland_2005.pdf http://www.iss.it/binary/elet/cont/3.1203942327.pdf
more to come.
it is a cut from an article I'm writing.
Thanks swampii