You may not know it, but Imsi Catchers represent one of the most discreet and invasive surveillance technologies used today. The good news is that these false relay antennas that intercept your cellular communications are now detectable thanks to a new open-source tool launched by the eff and baptized Rayhunter.
It is thereforeAn open-source tool allowing to detect the simulators of cellular sites (CSS) such as stinggrays or Imsi catckers. These surveillance devices deceive the nearby phones that connect by taking them for legitimate relay antennas.
This allows in particular the police to locate precisely phones and to record unique identifiers (IMSI, IMEI) without going through operators. Some CSS can even intercept communications (calls, SMS, Internet traffic) and it sometimes happens that unfortunately, it is crooks and other cybercriminals that set up this trap.
Rayhunter is currently operating on an Orbic mobile Hotspot found in the United States for less than $ 20 and analyzes control traffic between this hotspot and cell antennas. It thus detects suspicious events such as forced demotion to 2G networks (vulnerable to interception) and alerts the user thanks to a simple color code system. Users can also access detailed newspapers via a web interface to have more details.
Technically, the tool is quite clever. He monitors several suspicious behaviors that Imsi Catchers often cause:
- Forced network changes (from 4G to 2G for example)
- Unusual requests for Imsi identifiers
- Sudden network configuration changes
- Abnormal signaling models between the phone and the “alleged” network
I find it really an essential tool to protect your digital life and escape arbitrary supervision. But is it complicated to set up?
Well not really & mldr; Just download the software package, connect the device and run an installation script on Mac or Linux and that’s it;
More specifically, here are the steps:
- Procure an orbic hotspot (the most complicated part for us in France)
- Download Rayhunter from Project github
- Connect the USB hotspot to your computer
- Launch the installation script (details on the GitHub)
- Connect to the web interface to see the results
The installation is easier than configuring a freebox, and unlike the latter, you will not need to call technical support every 5 minutes.
Note that in France, the use of IMSI catchers is strictly supervised by the 2015 Intelligence Act and its 2017 extension. Theoretically, only authorized intelligence services can use them, and only after authorization from the Prime Minister following an opinion from the National Commission for the Control of Intelligence Techniques (CNCTR).
But let’s be honest, who really check what’s going on on the field? We have already had Imsi Catchers reports detected during demonstrations, and even if it is supposed to be ultra-left, transparency is not exactly the strong point of these services. Not to mention the potential malware that could use this technology for criminal purposes.
Breff, the EFF hopes that Rayhunter will determine whether these technologies are used to monitor activities protected by the first American amendment such as manifestations, religious gatherings & mldr; etc and collect data on the exploits currently used to carry out this mass espionage.
Now, if you are the paranoid type (with reason), this tool clearly deserves its place in your digital protection arsenal. Like that, the next demonstration, if your phone begins to act strangely, to heat, to lose your battery faster & mldr; With Rayhunter, you will be able to know immediately if it’s just your old smartphone that makes the soul or if someone is siphoning your data without your knowledge.
I hope that the efflihood will extend compatibility to other devices that are easier to obtain in Europe.
Source link
Subscribe to our email newsletter to get the latest posts delivered right to your email.
Comments