IMSI Catchers and Mobile Security
EAS499Honors-IMSICatchersandMobileSecurity-V18F-1
EAS499Honors-IMSICatchersandMobileSecurity-V18F-1
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
[30] "A5/1 Decryption," [Online]. Available: https://opensource.srlabs.de/projects/a51-<br />
decrypt/files. [Accessed 28 April 2015].<br />
[31] 3GPP, [Online]. Available:<br />
http://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_37/Docs/SP-070671.zip.<br />
[32] J. Valentino-Devries, "'Stingray' Phone Tracker Fuels Constitutional Clash," The Wall<br />
Street Journal, 22 September 2011. [Online]. Available:<br />
http://www.wsj.com/articles/SB10001424053111904194604576583112723197574.<br />
[Accessed 28 April 2015].<br />
[33] S. K. Pell <strong>and</strong> C. Soghoian, "A Lot More Than A Pen Register, <strong>and</strong> Less than A Wiretap:<br />
What the StingRay Teaches Us About How Congress Should Approach the Reform of<br />
Law Enforcement Surveillance Authorities," 2014.<br />
[34] R. Gallagher, "Meet the machines that steal your phone's data," Ars Technica, 25<br />
September 2013. [Online]. Available: http://arstechnica.com/techpolicy/2013/09/25/meet-the-machines-that-steal-your-phones-data/.<br />
[Accessed 28 April<br />
2015].<br />
[35] D. Barrett, "Americans’ Cellphones Targeted in Secret U.S. Spy Program," The Wall<br />
Street Journal, 13 November 2014. [Online]. Available:<br />
http://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-<br />
1415917533. [Accessed 28 April 2015].<br />
[36] D. Priest, "NSA growth fueled by need to target terrorists," The Washington Post, 21<br />
July 2013. [Online]. Available: http://www.washingtonpost.com/world/national-<br />
security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-<br />
bed3-b9b6fe264871_story.html. [Accessed 28 April 2015].<br />
[37] CNN Money, "How the NSA can 'turn on' your phone remotely," CNN, 6 June 2014.<br />
[Online]. Available: http://money.cnn.com/2014/06/06/technology/security/nsa-turn-onphone/.<br />
[Accessed 28 April 2015].<br />
[38] R. Gallagher, "Criminals May Be Using Covert <strong>Mobile</strong> Phone Surveillance Tech for<br />
Extortion," Slate, 22 August 2012. [Online]. Available:<br />
http://www.slate.com/blogs/future_tense/2012/08/22/imsi_catchers_criminals_law_enfor<br />
cement_using_high_tech_portable_devices_to_intercept_communications_.html.<br />
[Accessed 28 April 2015].<br />
[39] M. Keys, "FCC FOIA: StingRay, KingFish User Manual (2010)," TheBlot Magazine, 25<br />
March 2015. [Online]. Available: http://www.scribd.com/doc/259987684/FCC-FOIA-<br />
StingRay-KingFish-User-Manual-2010. [Accessed 28 April 2015].<br />
[40] Digital Receiver Technologies, Inc., "DRT Company History," [Online]. Available:<br />
http://www.drti.com/about_print.htm. [Accessed 28 April 2015].<br />
[41] Meganet Corporation, "Meganet Products - Cell Phone Interceptors," [Online].<br />
Available: http://www.meganet.com/meganet-products-cellphoneinterceptors.html.<br />
[Accessed 27 April 2015].<br />
[42] Gamma Group, "Gamma Group," [Online]. Available: https://www.gammagroup.com/.<br />
[Accessed 28 April 2015].<br />
[43] D. Goodin, "The body-worn “<strong>IMSI</strong> catcher” for all your covert phone snooping needs,"<br />
ArsTechnica, 1 September 2013. [Online]. Available:<br />
40