For 3G/4G networks there is strong mutual authentication between the device and the network, for 2G(GSM) networks only the device is authenticated so these interception devices work by jamming the 3G/4G bands forcing the device onto the (fake) 2G network.
mmagin|9 years ago
vog|9 years ago
As a rule of thumb, any security protocol that contains lots of "MAY" parts (options) in its specification is suspicious. Even more so if the security layer itself is optional. Ideally, a security protocol contains no "MAY" parts, not even "SHOULD" parts, but only "MUST" parts.
(Not sure where I read this, or who wrote that. So I'm paraphrasing it here. Maybe it's common sense without a single attributable source.)
leeoniya|9 years ago
http://www.jmeds.eu/index.php/jmeds/article/view/Enabling_th...
https://github.com/PrivacyCollective/Android-CipheringIndica...
leeoniya|9 years ago
DasIch|9 years ago
unknown|9 years ago
[deleted]
guelo|9 years ago
digi_owl|9 years ago
It just use a directional antenna to listen for the "keepalive" exchange between cell tower and device, focusing on a specific IMSI.
Also, even if your device is currently using LTE or similar, the GSM (or whatever 2G radio it has) will still be on and talking to the relevant network (unless you specifically tell the device otherwise, and the OEM allowed you to). This to provide a smoother handover should the LTE signal drop too low.
Hailstorm on the other hand is basically a jammer tuned to 3G and 4G frequencies, thus forcing any devices in range to drop down to 2G. For the general public a jammer would be a big nono, but law enforcement is a different matter.
unknown|9 years ago
[deleted]
digi_owl|9 years ago
Depending on the device you may be able to tell it to use newer network only though (my somewhat aging Android device can opt for UMTS only for example).
Tharkun|9 years ago
ac29|9 years ago
MrRadar|9 years ago