I've seen some posts on here referencing the intercepting stingray towers but no one has posted the solution to this problem on here so I thought I'd lend a hand - https://secupwn.github.io/Android-IMSI-Catcher-Detector/
(opsec) fight stingray with AIMSICD
I've seen some posts on here referencing the intercepting stingray towers but no one has posted the solution to this problem on here so I thought I'd lend a hand - https://secupwn.github.io/Android-IMSI-Catcher-Detector/
[9 Points] everybodygetweird:
[5 Points] 1ugly:
This is awesome, learned so much and something I will look more into, Thank you for this.
[6 Points] scatfinger:
4G LTE and above do not authenticate to Stingray towers. Base LTE and lower do, such as 3G, EDGE etc.. etc..
If you're sending or talking about stupid things on a phone and you're fortunate enough to have a phone that supports the latest revision of 4G LTE+ then you don't really need to look for fake towers. It still helps though to know if somebody is trying to watch.
I would not rely on this specification for very long however. This "hiccup" for LE has been known publicly since around Christmas 2013 and internally for I'm guessing around another 6 months before that. I'm willing to bet money that an exploit to get around this exists and is currently only circulating amongst blackhats.
Secure your shit.
[4 Points] crackwidow:
Dumb question but how do I install this? Assuming I need to root my Android phone or something? Never really looked into it :l
[4 Points] AlexSosa1KG:
Or you could just not be all fucking hot on the phone either like "yo i need gram of cocaine". If you know the dealer and what he got, "I got 100 that i owe you" is a little less obvious. And if you're a dealer and you got clients that talk like that, then you deserve to go down. I done switched numbers on ppl that talk crazy thru text on my burner smh
[2 Points] None:
Oarsum
[1 Points] al_eberia:
Get textsecure. If you are sending messages in the clear expect people to be reading them.
Everyone here should read up on Stingray and adjust their OPSEC if necessary. There's a reason they've tried so hard to hide this for so long.
http://www.wikipedia.org/wiki/Stingray_phone_tracker
Stingray basically allows federal AND LOCAL law enforcement agencies to conduct man-in-the-middle attacks on a targets cell phone to monitor their activities- calls, texts, data, location, movements, phones they come in close proximity with, etc- all silently, in real time, and without a warrant. The whole process on their end is quick and easy thanks to very powerful software- entire networks of people can easily be investigated using minimal resources. Basically we're talking about local LE using NSA-type technology to spy on anyone they feel like. They put them in using terrorism as an excuse but have mainly used them to investigate drug dealers. They've been using them for years while being instructed to never mention it in court.
Gotta know what you're up against. Our cell phones are the police's new confidential informants.