• Jerry on PieFed@feddit.online
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 day ago

    It’s worse than you think. An IMSI catcher is not even needed to find out what phones are in an area:

    Section 3.4.1: Presence Testing in LTE
    https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks

    Passive Presence Testing

    The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).

    RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area . In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.

    There are descriptions in the article of other ways to find phones without using an IMSI Catcher or fake tower.

    • NuXCOM_90Percent@lemmy.zip
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      1 day ago

      What is combat? It is a system dependent on “passive” signals from phones.

      The best one can hope for is a way to sign up for broadcasts telling people to turn off their phones when the jackboots show up but that is arguably even worse for many reasons. First it involves signing up for said broadcasts (“So. Mr Anderson. Why would you sign up for ICE Alerts if you aren’t an illegal immigrant?”).

      But second it takes away all way to coordinate a resistance. It is why so many of the big fat white guys in loose fitting hawaian shirts at protests are ready to give out free faraday bags to “protect people from the cops”. We outnumber the cops and the soldiers often ten or even twenty to one. But without the ability to coordinate, we all get picked off one group at a time or driven into a wall of shields and vans to be disappeared in if nobody is recording (which works a lot better if said recording is streaming to The Cloud). Take away phones and you turn The Many into The Few.

      A couple decades back I lived in a… not great part of town. And it was pretty much common knowledge that when all our cell phones (still flip phones) would lose all signal that there was a police raid about to go down. Ridiculously illegal but… who you gonna call? So if you had someone you needed to call (let a loved one know where you were… or let a buddy know to start flushing) you needed a payphone or to borrow a landline.


      I’ve been privy to some talks where we assessed things like Meshtastic as tools for the folk organizing protests and the like. In theory they are nice. In practice they are an even bigger red flag that can be easily sniffed out and used to trump up charges of premeditation and the like.

      • Chozo@fedia.io
        link
        fedilink
        arrow-up
        1
        ·
        23 hours ago

        What is combat? It is a system dependent on “passive” signals from phones.

        I’m sure if the device or operator is struck hard enough with a hammer, it stops working.

  • NaibofTabr@infosec.pub
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 day ago

    This is what it looked like a decade ago:

    https://abc7.com/post/investigation-law-enforcement-use-secret-devices-to-track-cell-phone-signals/421190/

    This is what’s available today:

    https://x-surveillance.com/pbic-stingray-device/

    X-Surveillance offers a Managed Service to remotely configure the Stingray Devices. Of course, remote operators who have been trained by X-Surveillance can also easily configure the PBICs from a distance.

    The PBICs are equipped with smart fully-automatic configuration and semi-automatic calibration capabilities to detect close proximity or long-range mobile devices within minutes within any spectrum.

    To detect as many mobile devices as possible, it is possible to detect 5G-Ready, 4G LTE, GSM, Bluetooth and WiFi devices with the PBIC as a Stingray Device.

    “detect”… right

  • IninewCrow@lemmy.ca
    link
    fedilink
    English
    arrow-up
    26
    ·
    2 days ago

    Government and security forces have been known to do this for years. Here in Canada and the US.

    This is one of the main reasons why it is suggested not to use your main phone at protest events … and instead use a secondary phone or a burner phone. Police and security forces set up fake towers at big public events to make it easier to monitor people.