Stingray (IMSI Catcher) - Who's Spying on Your Phone - Part 2

preview_player
Показать описание
This video is part 2 of the Who's Spying on Your Phone Series. This contribution
specifically addresses the Stingray device, otherwise generally classified as an
IMSI catcher, and discusses how it works, what kinds of attacks are done with it.
And who can wield features similar to Stingray. There are other versions of Stingray
like Kingfish and other seemily innocuous ocean creatures. But this term is used
to generally classify this type of device. The original device was made for 2G and
later 3G and there certainly has to be 4G models.

Hacking using an IMSI Catcher device is also discussed using radio transmitters like BladeRF, USRP, and Hacker one.

Download AIMSICD APK

  -------
Sources:

Stingray (IMSI Catcher) - Who's Spying on Your Phone Part 2

-------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Рекомендации по теме
Комментарии
Автор

Thanks for all your efforts Rob. I don't know of anyone on YouTube that is doing the job that you are to thoroughly cover all the ways our cell phones compromise our security.

drummerboyj
Автор

Kudos to you mate. Please don't give up and stop your knowledge from helping people. Thank you for the uploads.

kennedy
Автор

I personally want to thank you for spreading this information. I have known vaguely that my Android are others activity are being recorded. But you showed us how deep the rabbit hole goes. You have my subscription

erick-gdwo
Автор

Rob Braxman Tech Nice work! You have surely have done extensive research in the field of signal interception techniques! As you probably already know, we have already exceeded the capabilities of Harris Stingray devices! 1000 thumbs up from me! :D

CellularInterceptor
Автор

Man the world appreciates you love from Australia

alexcpten
Автор

Good job-now the new intercepts carrier services and backhual.

PlanetFrosty
Автор

Thanks for your effort and greetings from Germany. Liked and subscribed.

thing
Автор

This is very interesting. I hope the bad guys and gals do not get hold of this.

nicolettaciccone
Автор

If this is the one video you see this year, make it count and watch Rob Braxman Tech. Great video I have it bookmarked

nopoliticalparties
Автор

please last part, this is really good !

Bboyduck
Автор

On the pinephone's implemination of the killswitch for the gsm modem it would be safer to shut the device completely off then flip the switch or running a linux command in to tell the modem to shut down safely then flipping the switch but if you really are in danger what's wrong with killing the modem for good. I'm still going to get the pinephone and I wonder if the various modems in the librem 5 might be more built for this on off usage.

skatcat
Автор

Thank you for this video, I know about stingray becayse that is what they were using in me to screw me over, I tried to dowbload that stingray detector app but it is not working. Is there another ine?

kana
Автор

In reality there is a new tech-scanners used to track Bluetooth, WiFi and Cellular where the traffic patterns are analyzed and recorded and handheld.

PlanetFrosty
Автор

All of this makes so much sense now Ty so much

jennmanea
Автор

What if the entity that is surveilling your device is then live streaming the surveillance?

everscorpiolove
Автор

Interesting topic! Thanks! Can you cover more on this topic?

georgeenescu
Автор

The AIMCISD latest version is from 2016 and doesn't look like much is working on this app atm.

Michael-itgb
Автор

How can I stop someone from interfering with my video recording

Courtney-vvii
Автор

Use VPN over LTE to connect to SIP server maintain encryption so calls are not tracked or listened to.

PlanetFrosty
Автор

Good presentation. Your advice to remove the SIM cards is appropriate. It might be interesting to visit a public political event without a cellphone ( car, trunk or person and NEVER anything that looks dangerous ). A person can use any decent SDR (not the cheapo RTL's) that cover UHF through 2.5 GHz. No FCC license is required for receivers. Copy your data collection from the live moving spectrogram showing time, amplitude, frequency and modulation directly to a computer SSD. One person is best. Keep your mouth shut and try to look bored. Never stare or Gawk at anything. Wash the exterior of your car, polish the wheel covers etc. You are now a legal remote receive station. You are not listening or monitoring calls just the ELINT and SIGINT from "potentially" illegally used IMSI catchers and their little sisters ( no warrant? unlicensed transmissions?) Once you capture enough "pre-event" data you can drive around at normal ( not slow) speed and identify another location to "wash your windows", read a book or pick your nose. You could bring along an "old" 10 X pair of binoculars ( used only inside the vehicle). Dark cloth the same color as the head liner and interior can be easily and quickly pasted up to assure that NO light direct or indirect falls on the observer. You can do this for hours in a typical vehicle that matches its surroundings. Not new, but not too old and nothing flashy, bumper tags etc. Many times these deployed devices are not owned by the local establishment but are rented or leased to them along with a technician. This is important since if you do numerous RF surveys in different areas you might attract the attention of a technician. Never make it obvious that you found a "command post" ( one name for them) and do not take obvious photos since there will always be a nearby back up unit or anti or counter surveillance unit. Many uses of the "Fake cell base stations" require use that is NOT LICENSED AND ILLEGAL to use by the FCC or the IRAC, FAA, US Coast Guard, or their leased engineering staff. In some areas, military services may also be collecting data on civilian targets. When a US agency does this and transmits without legal authorization they will not be prosecuted. Any device that emits more than maximum allowable Part 15 type emissions is violating the civilian law. Conspiracy to violate us laws is an 18 USC felony. Why have there been no prosecutions of illegal IMSI catcher use? These are violating the FCC licenses of the carriers ie intentional interference and possible jamming) There are federal exemptions. The FCC does not have jurisdiction over federal and military agencies services. These are under IRAC and DISA-WHCA. Later collect RF data from the same locations as well as after and at different times. Something to think about. Have you ever wondered how IMSI catchers can follow a target without someone noticing? A "van" may not be following the target. Look up and observe. Check the ADS-B emissions and keep a record with your own SDR or free sites such as planefinder website. You may see correlations. Later you can compare ADS-B tracks with your SDR monitor charts. Many times no "owner" or bogus information is presented. Altitude MUST BE accurate! Do not despair since you will most likely see correlations that are relevant. Rumor has it that "utility" vehicles, light aircraft, and drones may be used. The drones ( over 400 ft) must carry ADS-B to prevent injuries. Look for unusual ADS-B activity near local airports. Aircraft and drones need "logistic support and there are no toilets at 2, 000 feet.

crimestoppers