📜 ⬆️ ⬇️

Cellular interception FAQ: what are IMSI interceptors / SCATs, and is it possible to protect against them

Probably even housewives know that public Wi-Fi hotspots are insecure. What does not prevent ordinary users with might and main to use them - because if it is impossible, but it’s boring and very desirable, then you can! And without any VPN - although the VPN function is now being implemented even in complex anti-virus products. A healthy alternative to Wi-Fi has always been considered the usual mobile connection, especially since every year it becomes cheaper and faster and faster. But is it as safe as it seems to us?


- What is IMSI interceptor?
- When did the first IMSI interceptors appear?
- How do IMSI interceptors monopolize access to a mobile phone?
- Are there any handicraft crafts?
- Can I become a victim of "random interception"?
- How can the IMSI interceptor track my movements?
- Can they listen to my calls?
- Can they install software on my mobile phone?
- We all know about the danger of open (and not only) Wi-Fi points. Can I become a victim of interception if I sit everywhere strictly through LTE?
- And if I am a cool banker and they may very, very much want to snort?
- What data can I lose, given the fact that I have HTTPS everywhere and two-factor authentication?
- How are they protected from interception?
- Can ESD Overwatch provide 100% protection?
- Will IMSI interceptors continue to listen to me if I change the SIM card?
“And if I'm on CDMA, will I be safe from an IMSI interceptor?”
“Why do the bad guys use IMSI interceptors?”
- How common are IMSI interceptors today?
- In general, how promising is the IMSI interception technique? Maybe there are some more effective alternatives?
- What is the attitude to the special services interceptor pirates? What will happen if I pass with IMSI-suitcase past Lubyanka?



Note: Please note that among the hyperlinks listed in the article are references to US Department of Defense materials. It’s impossible to navigate through them from a regular browser — use a TOR browser, or its equivalent.


We are now on the eve of an era where almost everyone will be able to listen in on telephone conversations. Our time is similar to the dashing 90s, when with the help of cheap Soviet analog scanners it was possible to listen to mobile conversations in the US and Europe. Only today analog analog scanners rule the ball, but digital IMSI interceptors.



What is an IMSI interceptor?


This is such a device (the size of a suitcase or even just a mobile phone), which uses the design feature of mobile phones - to give preference to the cellular tower whose signal is strongest (to maximize signal quality and minimize its own power consumption). In addition, in GSM (2G) networks, only the mobile phone must be authenticated. From the cell tower is not required. Therefore, a mobile phone is easy to be mislead - including to disable data encryption on it. On the other hand, the universal UMTS (3G) mobile communication system requires two-way authentication; however, it can be circumvented using the GSM compatibility mode present in most networks. 2G networks are still widespread - network operators use GSM as a backup network in places where UMTS is not available. So, this is introductory information about IMSI interceptors. Deeper technical details of IMSI interception are available in the SBA Research research report . Another descriptive description, which is a desktop document of modern cybercontractors, is the article “Your Secret Skat is no longer a secret at all,” published in the fall of 2014 in the Harvard Journal of Law & Technology.



When did the first IMSI interceptors appear?


The first IMSI interceptors appeared in 1993, and were large, heavy, expensive. "Long live domestic chips - with fourteen legs ... and four handles." Manufacturers of such interceptors could be counted on the fingers, and their high cost limited the circle of users to exclusively state institutions. However, now they are becoming cheaper and less cumbersome. For example, Chris Page built his IMSI interceptor for only $ 1500, and presented it at the DEFCON conference, back in 2010. Its version consists of a programmable radio and free open source software: GNU Radio, OpenBTS, Asterisk. All the information the developer needs is publicly available. And in mid-2016, the hacker Evilsocket offered its version of the portable IMSI interceptor for only $ 600.


The heart of the modern IMSI interceptor



How do IMSI interceptors monopolize mobile phone access?




Are there any handicraft crafts?




Can I fall prey to “accidental interception”?


Without a doubt! Imitating a cell tower, IMSI interceptors listen to all local traffic — to which, among other things, conversations of innocent bystanders also fall (read “revelations of Big Brother's elder sister” ). And this fact is a favorite argument of “privacy lawyers” who oppose the use of IMSI interceptors by security forces who use this high-tech equipment to track down criminals.



How can an IMSI interceptor track my movements?




Can they listen to my calls?




Can they install software on my mobile phone?



Technical specifications of your SIM card



We all know about the danger of open (and not only) Wi-Fi points. Can I become a victim of interception if I sit everywhere strictly through LTE?




And if I am a cool banker and they may very, very much want to snort?




What data can I lose if you consider the fact that I have HTTPS everywhere and two-factor authentication?




How are they protected from interception?



What interceptors are available?



Can ESD Overwatch provide 100% protection?




Can IMSI interceptors continue to listen to me if I change the SIM card?




And if I'm on CDMA, will I be safe from an IMSI interceptor?


No, because the same manufacturers that manufacture GSM IMSI interceptors also make CDMA versions; and some even make versions for Iridium (a global satellite communications operator) and Thuraya (a regional satellite telephony operator that operates in Europe, Central Asia, Australia and Africa). Among them: the Israeli laboratory "Ability" and the Thai "Jackson Electronics" .



Why do bad guys use IMSI interceptors?




How common are IMSI interceptors today?




In general, how promising is the IMSI interception technique? Maybe there are some more effective alternatives?


Well, once you asked ... There is Wi-Fi radio mapping, which combines the old analogue school with modern digital power. This approach works at a lower level and is therefore more flexible. After all, with its help you can even monitor people who do not carry any equipment with them. Take for example WiSee , which recognizes human gestures; WiVe , which sees moving objects behind the wall; WiTrack , which tracks the three-dimensional movement of a person; and finally WiHear , which is able to read lips. But since these are already fundamentally different technologies - more about them another time.



What is the attitude to the special services interceptor pirates? What will happen if I pass with IMSI-suitcase past Lubyanka?




Tell me what targeted advertising shows you, and I'll tell you who you are!


PS Overly active radio frequency spectrum requires special authorization and licensing; ignoring this fact, you automatically fall into the category of "bad guys" details - here .


')

Source: https://habr.com/ru/post/455012/


All Articles