TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SeaGlass: City-Wide IMSI-Catcher Detection (2017)

365 pointsby kogirabout 4 years ago

12 comments

jdcabout 4 years ago
BOM from the paper:<p>Telit GT-864 QUAD&#x2F;PY GSM modem $65<p>External antenna $25<p>Raspberry Pi 2B+2 $35<p>GPS (GlobalSat BU-353) $30<p>Bait Phone (Motorola Moto-G 4G LTE) $95<p>4G Hotspot (ZTE Z917) + 3 month plan $100<p>DC&#x2F;AC inverter $26<p>Powered USB Hub $17<p>Pi accessories $15<p>SD Card (32 GB) $17<p>Modem accessories $30<p>Cables $35<p>Box $12<p>Total $502<p><a href="https:&#x2F;&#x2F;seaglass-web.s3.amazonaws.com&#x2F;SeaGlass___PETS_2017.pdf" rel="nofollow">https:&#x2F;&#x2F;seaglass-web.s3.amazonaws.com&#x2F;SeaGlass___PETS_2017.p...</a>
评论 #27176892 未加载
4gotunameagainabout 4 years ago
Partnering with rideshare drivers to maximize coverage of the mobile units is quite clever.<p>Glad things like these are being done
评论 #27178527 未加载
baybal2about 4 years ago
There used to be a very handy Android app, now booted off the Google Market, called &quot;GSM Spy Finder&quot; which worked on MediaTek SoCs.<p><a href="https:&#x2F;&#x2F;apkplz.net&#x2F;app&#x2F;kz.galan.antispy" rel="nofollow">https:&#x2F;&#x2F;apkplz.net&#x2F;app&#x2F;kz.galan.antispy</a>
评论 #27174240 未加载
评论 #27176027 未加载
评论 #27175992 未加载
wcarssabout 4 years ago
In case anyone else is wondering what an IMSI-Catcher is, let me save you a google:<p>&quot;An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users.&quot;<p>1 - <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;IMSI-catcher" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;IMSI-catcher</a>
评论 #27175010 未加载
评论 #27176089 未加载
mnw21camabout 4 years ago
Is it just me that looks at the equipment photo, and thinks - you&#x27;re using an inverter to convert 12VDC to 120VAC, then a couple of wall plug transformers to convert that back down to low-voltage DC - why don&#x27;t you just use a DC regulator?
评论 #27174830 未加载
评论 #27174611 未加载
lykr0nabout 4 years ago
Ooh. New project for today. Deploy this locally and figure out how to make this a public service where people can run their devices and the data is uploaded to a central database in real-ish time so people can see suspect changes.<p>EDIT: This should have a 2017 tag, as the code is 4 years old and I assume the same is true for the website.
评论 #27178539 未加载
FreshFriesabout 4 years ago
It is much easier (and more often done) to implement a solution for a static position. Many embassies and other highly sensitive locations have these, commercially available, installations.<p>We used to build them for fun (no profit) many moons ago.<p>Basically what you do is place a couple of (1, 2 or whatever) sensors (we used to use these Motorola C123 with osmocom) and just keep taps on signal strength and antenna ID over time, and inspect changes.
nceqs3about 4 years ago
<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14474956" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14474956</a>
nceqs3about 4 years ago
Is this open source? Would love to run it in DC. Would imagine quite a few hits.
评论 #27174470 未加载
评论 #27174209 未加载
DyslexicAtheistabout 4 years ago
The German government has just published a paper on the requirement for telecom operators to ensure LEA continue to be able to _covertly_ intercept traffic in 5G: &quot;Ensuring Undetected use of the IMSI Catcher&quot;, the paper which is in German (<a href="https:&#x2F;&#x2F;posteo.de&#x2F;FormulierungshilfeBMI.pdf" rel="nofollow">https:&#x2F;&#x2F;posteo.de&#x2F;FormulierungshilfeBMI.pdf</a>) reads:<p><i>&quot; &gt; Mobile network operators must ensure security authorities can use IMSI Catchers without the end user becoming aware of this. According to the TKG-E, mobile operators must continue to allow IMSI catchers in accordance with statutory investigative measures. Until now, it&#x27;s unnecessary for operators to act so that members of the Security authorities can use IMSI-Catchers, as they &quot;simply&quot; pretend to be a base station. In new mobile networks, devices brought into the network must be actively &quot;accepted&quot; by the network and otherwise cannot be used. As a result, it will no longer be possible to insert IMSI catchers of &quot;previous design&quot; into the new networks. We acknowledge that in the future unauthorised persons, such as foreign intelligence services can no longer use them. At the same time, it will no longer be possible for German security authorities to use an IMSI catcher without the cooperation of the mobile operator. The necessary regulations for the participation of the mobile operator are already included in the draft TKG, but the necessary addition is missing that the introduction of an IMSI catcher by security authorities may not be known to the end user.&quot;</i><p>Most people will think this is a fringe scenario which will never affect them. But they are very common in international airports:<p><i>&gt; At Trudeau airport, Radio-Canada detected the catcher&#x27;s presence through the use of a CryptoPhone — a cellphone look-alike that emits red alerts when a fake antenna tries to catch its signal. Several red alerts were received, throughout the afternoon and early evening, in the section of the airport for U.S. departures.</i><p><a href="https:&#x2F;&#x2F;www.cbc.ca&#x2F;news&#x2F;canada&#x2F;montreal&#x2F;trudeau-airport-spying-1.4055803" rel="nofollow">https:&#x2F;&#x2F;www.cbc.ca&#x2F;news&#x2F;canada&#x2F;montreal&#x2F;trudeau-airport-spyi...</a><p><i>&gt; For two months last year, researchers at the University of Washington paid drivers of an unidentified ridesharing service to keep custom-made sensors in the trunks of their cars, converting those vehicles into mobile cellular data collectors. They used the results to map out practically every cell tower in the cities of Seattle and Milwaukee—along with at least two anomalous transmitters they believe were likely stingrays, located at the Seattle office of the US Customs and Immigration Service, and the Seattle-Tacoma Airport.</i><p><a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;06&#x2F;researchers-use-rideshares-sniff-stingray-locations&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;06&#x2F;researchers-use-rideshares-sni...</a><p><i>&gt; The devices are operated out of at least five U.S. airports, &quot;covering most of the U.S. population&quot;. It is unclear whether the U.S. Marshals Service requests court orders to use the devices.</i><p>source: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Dirtbox_(cell_phone)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Dirtbox_(cell_phone)</a><p>For a &quot;modern&quot; take on this subject (info relevant to 3G is outdated unless they do a downgrade attack on you first), see this article and the linked videos that go into the issues LEO face with 4G&#x2F;5G and the &quot;crocodile hunter&quot; software that is an EFF project to identify them: <a href="https:&#x2F;&#x2F;www.pcmag.com&#x2F;news&#x2F;police-spying-on-your-phone-ask-crocodile-hunter" rel="nofollow">https:&#x2F;&#x2F;www.pcmag.com&#x2F;news&#x2F;police-spying-on-your-phone-ask-c...</a>
dweeklyabout 4 years ago
Now we just need a few of these on coordinating drones to triangulate in real-time and snap some pictures of the transmission source.
评论 #27174360 未加载
ChrisMarshallNYabout 4 years ago
This is cool!<p>Of course, it will only be a matter of time before the stingray-users figure out how to fool them...
评论 #27174339 未加载
评论 #27174191 未加载
评论 #27174284 未加载