top | item 8111089

Android IMSI-Catcher Detector

76 points| slashdotaccount | 11 years ago |secupwn.github.io

34 comments

order

slashdotaccount|11 years ago

Hello, everyone! Since Google does not seem to be interested in fixing the huge security hole of not showing a ciphering indicator on Android, it appears as if they get paid (or are forced to) not fix it. For all of you that are sick of getting spied on through IMSI-Catchers, Silent SMS and alike and want to do something about it, here's a great project you should check out: "The Android-IMSI-Catcher-Detector" (AIMSICD). It is an Android open-source based project to detect and (hopefully one day) avoid fake base stations (IMSI-Catchers) or other base-stations (mobile antennas) with poor/no encryption.

This project aims to warn users if the ciphering is turned off and also enables several other protection-mechanisms. Since it is under constant development, they are constantly searching for testers and security-enthusiastic developers with balls. Don't be shy, feel free to contribute, in any way you can on GitHub: https://github.com/SecUpwN/Android-IMSI-Catcher-Detector

telecuda|11 years ago

Thanks for working on this important project! Maybe I missed this in reading your site, but how do you know it detects fake base stations? Have you been able to test it against a Stingray, or are you basing the app on a set of assumptions derived from recently leaked product specs?

mike_hearn|11 years ago

> it appears as if they get paid (or are forced to) not fix it

Occam's Razor says ... perhaps they believe 99.9% of people do not care and are not capable of understanding which encryption standard is being used to communicate with their base station, and thus Google prefers to focus its efforts on things that 99.9% of people would consider when buying a phone?

tmosleyIII|11 years ago

It isn't an Android only thing, all devices will be found and you would not know.

nradov|11 years ago

Do you intend to add CDMA support?

TorKlingberg|11 years ago

You probably shouldn't put the EFF, Guardian Project and Privacy International logos so prominently on your website if you are not affiliated with or supported by those projects.

slashdotaccount|11 years ago

Sadly, this Project is not yet officially supported by them. But it is one of the GOALS to support FF, Guardian Project and Privacy International. Not necessarily the other way around. :)

noyesno|11 years ago

This reminds me of the early days of GSM where Nokia phones showed a broken lock icon if the air interface between the mobile phone and the base station did not use encryption. At the time at least France had disabled the encryption and the indicator caused some interesting discussions.

abritishguy|11 years ago

Display which cipher is being used?

2G is insecure regardless of whether encryption has been turned off or not, it can be decrypted on the fly with very modest hardware so the indicator telling you what connection you have is as good as telling you whether it is "secure" or not.

> Detect hidden SMS

Not really feasible - there are tons of different types of "hidden" sms that are routinely used by the network but can be spoofed by a third party.

> Detect SIM card app installations through public APIs

This won't work unless it is rooted and this messages have to be signed from the network anyway.

nerderloo|11 years ago

It seems only 2G connection is crackable. Are we safe as long as the device is on 3G/4G network? We should just disable cellular radio when you see the device is on 2G suspiciously in the middle of city(around demonstrations, I suppose)

slashdotaccount|11 years ago

I'm just going to quote the GitHub README here: "Although A5/3 withstands passive eavesdropping, it can be bypassed by deploying an IMSI-Catcher which can force a mobile device into 2G mode and downgrade then the encryption to A5/1 or disable it."

Here is the best hint I can give you: LEAVE YOUR PHOEN AT HOME when you really have to participate in demonstrations! The main reason why the use of IMSI-Catchers, Stingrays and alike is such a popular tactic for law enforcement agencies is because people are not SMART ENOUGH to think ahaed and leave their phones at home!

No solution for you? Well then, at the very least make yourself your own signal blocking pouch to fully block all Silent SMS: www.killyourphone.com

kalleboo|11 years ago

On Android phones you can disable 2G and set them to 3G only. I wish iOS had this option.

slashdotaccount|11 years ago

IMPORTANT: We're actively searching for skilled DEVELOPERS. Chime in!

programmernews|11 years ago

Great project! Will follow this and share the GitHub link.

cowbell|11 years ago

This sounds like such a good idea, I think the US government will outlaw it.

slashdotaccount|11 years ago

How will they outlaw an open-source project? They can "outlaw" all they want, they're already doing what they want, when they want it. It's time for the brave people out there to fight back! Have some balls and stand against the massive abuse of your most private data!

lallysingh|11 years ago

Probably not. They don't want to bring up their own tactics in court for challenge.

couchand|11 years ago

Any chance you could quiet the headline a bit? I recognize you have a good project but that title's awfully loud.

dang|11 years ago

We took "DEVELOPERS WANTED: " out of the headline. It broke more than one of the site guidelines.