IMSI Catchers and Mobile Security
EAS499Honors-IMSICatchersandMobileSecurity-V18F-1
EAS499Honors-IMSICatchersandMobileSecurity-V18F-1
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
[68] C. Timberg, "Feds to study illegal use of spy gear," The Washington Post, 11 August<br />
2014. [Online]. Available: http://www.washingtonpost.com/blogs/theswitch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear/.<br />
[Accessed 28 April 2015].<br />
[69] Federal Communications Commission, "CDBS Public Access," Federal Communications<br />
Commission, [Online]. Available:<br />
http://licensing.fcc.gov/prod/cdbs/pubacc/prod/cdbs_pa.htm. [Accessed 27 April 2015].<br />
[70] Ability Computers <strong>and</strong> Software Industries Ltd., "3G Interception," [Online]. Available:<br />
https://wikileaks.org/spyfiles/files/0/80_ABILITY-GSM_3G_Intercept.pdf. [Accessed<br />
27 April 2015].<br />
[71] Gamma Group, "3G-GSM Interception & Target Location," [Online]. Available:<br />
https://info.publicintelligence.net/Gamma-GSM.pdf. [Accessed 27 April 2015].<br />
[72] SecUpwN, "Changing LAC on same CID #91," [Online]. Available:<br />
https://github.com/SecUpwN/Android-<strong>IMSI</strong>-Catcher-Detector/issues/91. [Accessed 28<br />
April 2015].<br />
[73] GSMK, "GSMK CryptoPhone," [Online]. Available: http://www.cryptophone.de/en/.<br />
[Accessed 28 April 2015].<br />
[74] A. Boxall, "Paranoid much? Dem<strong>and</strong> for secure CryptoPhone is so high, company can’t<br />
keep up," Digital Trends, 20 March 2014. [Online]. Available:<br />
http://www.digitaltrends.com/mobile/cryptophone-dem<strong>and</strong>-exceeds-supply/. [Accessed<br />
28 April 2015].<br />
[75] K. Zetter, "Phone Firewall Identifies Rogue Cell Towers Trying to Intercept Your Calls,"<br />
3 September 2014. [Online]. Available: http://www.wired.com/2014/09/cryptophonefirewall-identifies-rogue-cell-towers/.<br />
[Accessed 28 April 2015].<br />
[76] XCell Technologies, "XCell Technologies," [Online]. Available: http://xcellular.com/index.html.<br />
[Accessed 27 April 2015].<br />
[77] SGP Technologies, "Blackphone," [Online]. Available: https://blackphone.ch/.<br />
[Accessed 28 April 2015].<br />
[78] S. Knight, "Privacy-centric Blackphone now shipping to pre-order customers," Techspot,<br />
30 June 2014. [Online]. Available: http://www.techspot.com/news/57266-privacycentric-blackphone-now-shipping-to-pre-order-customers.html.<br />
[Accessed 28 April<br />
2015].<br />
[79] T. Maytom, "Shipping Starts on Blackphone, World’s First Privacy-Optimised<br />
Smartphone," <strong>Mobile</strong> Marketing, 30 June 2014. [Online]. Available:<br />
http://mobilemarketingmagazine.com/shipping-starts-on-blackphone-first-privacyoptimised-smartphone.<br />
[Accessed 28 April 2015].<br />
[80] J. Kopstein, "A Phone for the Age of Snowden," New Yorker, 30 January 2014.<br />
[Online]. Available: http://www.newyorker.com/tech/elements/a-phone-for-the-age-ofsnowden.<br />
[Accessed 28 April 2015].<br />
[81] L. Armasu, "Fake Cell Towers Could Be Attacking Your Cellphone Up To 80-90 Times<br />
Per Hour," Tom's Hardware, 2 September 2014. [Online]. Available:<br />
http://www.tomshardware.com/news/cryptophone-gsmk-esd-baseb<strong>and</strong>firewall,27585.html.<br />
[Accessed 28 April 2015].<br />
43