12.02.2016 Views

IMSI Catchers and Mobile Security

EAS499Honors-IMSICatchersandMobileSecurity-V18F-1

EAS499Honors-IMSICatchersandMobileSecurity-V18F-1

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[68] C. Timberg, "Feds to study illegal use of spy gear," The Washington Post, 11 August<br />

2014. [Online]. Available: http://www.washingtonpost.com/blogs/theswitch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/.<br />

[Accessed 28 April 2015].<br />

[69] Federal Communications Commission, "CDBS Public Access," Federal Communications<br />

Commission, [Online]. Available:<br />

http://licensing.fcc.gov/prod/cdbs/pubacc/prod/cdbs_pa.htm. [Accessed 27 April 2015].<br />

[70] Ability Computers <strong>and</strong> Software Industries Ltd., "3G Interception," [Online]. Available:<br />

https://wikileaks.org/spyfiles/files/0/80_ABILITY-GSM_3G_Intercept.pdf. [Accessed<br />

27 April 2015].<br />

[71] Gamma Group, "3G-GSM Interception & Target Location," [Online]. Available:<br />

https://info.publicintelligence.net/Gamma-GSM.pdf. [Accessed 27 April 2015].<br />

[72] SecUpwN, "Changing LAC on same CID #91," [Online]. Available:<br />

https://github.com/SecUpwN/Android-<strong>IMSI</strong>-Catcher-Detector/issues/91. [Accessed 28<br />

April 2015].<br />

[73] GSMK, "GSMK CryptoPhone," [Online]. Available: http://www.cryptophone.de/en/.<br />

[Accessed 28 April 2015].<br />

[74] A. Boxall, "Paranoid much? Dem<strong>and</strong> for secure CryptoPhone is so high, company can’t<br />

keep up," Digital Trends, 20 March 2014. [Online]. Available:<br />

http://www.digitaltrends.com/mobile/cryptophone-dem<strong>and</strong>-exceeds-supply/. [Accessed<br />

28 April 2015].<br />

[75] K. Zetter, "Phone Firewall Identifies Rogue Cell Towers Trying to Intercept Your Calls,"<br />

3 September 2014. [Online]. Available: http://www.wired.com/2014/09/cryptophonefirewall-identifies-rogue-cell-towers/.<br />

[Accessed 28 April 2015].<br />

[76] XCell Technologies, "XCell Technologies," [Online]. Available: http://xcellular.com/index.html.<br />

[Accessed 27 April 2015].<br />

[77] SGP Technologies, "Blackphone," [Online]. Available: https://blackphone.ch/.<br />

[Accessed 28 April 2015].<br />

[78] S. Knight, "Privacy-centric Blackphone now shipping to pre-order customers," Techspot,<br />

30 June 2014. [Online]. Available: http://www.techspot.com/news/57266-privacycentric-blackphone-now-shipping-to-pre-order-customers.html.<br />

[Accessed 28 April<br />

2015].<br />

[79] T. Maytom, "Shipping Starts on Blackphone, World’s First Privacy-Optimised<br />

Smartphone," <strong>Mobile</strong> Marketing, 30 June 2014. [Online]. Available:<br />

http://mobilemarketingmagazine.com/shipping-starts-on-blackphone-first-privacyoptimised-smartphone.<br />

[Accessed 28 April 2015].<br />

[80] J. Kopstein, "A Phone for the Age of Snowden," New Yorker, 30 January 2014.<br />

[Online]. Available: http://www.newyorker.com/tech/elements/a-phone-for-the-age-ofsnowden.<br />

[Accessed 28 April 2015].<br />

[81] L. Armasu, "Fake Cell Towers Could Be Attacking Your Cellphone Up To 80-90 Times<br />

Per Hour," Tom's Hardware, 2 September 2014. [Online]. Available:<br />

http://www.tomshardware.com/news/cryptophone-gsmk-esd-baseb<strong>and</strong>firewall,27585.html.<br />

[Accessed 28 April 2015].<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!