With a hammer, of course!
Slashdot videos: Now with more Slashdot!
The primary methods of detecting IMSI-Catchers and Fake BTS's is described here (pdf), and due to the variety of manufacturers' baseband interfaces, there wasn't an easy way to uniformly detect these devices.
IMSI-Catcher doesn't seem to work on my old, non-GSM Android, but I've also found OsmocomBB to be interesting; it's an open source GSM broadband implementation that seems to work on some older, cheap phones, like some motorola candy bars; check out Catcher Catcher for more info.
In terms of the IMSI Catcher devices themselves, I've seen estimations of $20 to $1500 to make one, from using cheap RTL-SDR devices to a full SDR (~$400-1500) to run a full fake GSM BTS.
The legal usage of IMSI-Catchers doesn't seem clear to me. It is essentially a MiTM attack, which at least android devices seem to go out of their way to ignore. The law enforcement usage seems worded in ways that would just confuse 50+ year old judges. And they have to go far out of the way to make sure that you don't notice an interruption in service, by forwarding any on-going communications to their intended recipients and tunneling them back, if they go are run over time and don't disassociate.
I haven't seen any estimation on how often these things are used. Besides, hacked femtocell's are probably also responsible for a lot of these rogue BTS's; I wonder if that would be discovered with such detection methods?
The teachers might not know about 'Talk Pages', 'Revisions', and 'What Links Here':
things that make wikipedia much more advanced than traditional encyclopedias.
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio frequencies - https://cdn.anonfiles.com/1414...
But now theres an app for that
Modern IOS versions randomize the MAC used for passive wifi scans. I'd imagine android is also doing the same.
Its been said that this is how they have changed IOS 8, however
I've only noticed that they have decreased the number of beacons it sends greatly;
the same MAC is used for the probes; and given the ability to profile devices passivly [pdf],
the MAC may not be the only thing to worry about.
If you have a wireless card that can go into monitor (radio promisc) mode,
you can see all of the probes constantly travelling around us:
tshark -i mon0 -R 'wlan.fc.type_subtype eq 4' -T fields -e wlan.sa -e wlan_mgt.ssid -e radiotap.dbm_antsignal -e frame.time -E separator=, -E quote=d
Thing is the penetration of these monitoring techniques is difficult to
ascertain, I've been looking for them when I visit big retailers, but
according to people like Glenn Wilkinson and Brendan O'Connar,
these may be fairly easy to setup and in wide use surreptitiously.
(Authors of Snoopy and CreepyDOL)
But also sounds like the bridge that connects one of the major avenues of exploitation from the movie Dragon Day
You realise that it is unscientific to prove or disprove a god right? You simply cannot have a scientific concensus on the matter outside of a god isn't needed to explain the world. If it is more then that, it simply isn't scientific because you cannot test supernatural beings or events.
The snowden leaks almost seem like a false flag type situation.
Obvious troll. Snowden is infallable. We must believe in him.
Totally sent me on a tangent to study Ecclesasties.
Or scientific address and reason?
You stare at your Iphone.
I'll stare at the fire.
I'd say getting to see my grand kids would be the ultimate.
Telling them a few of the things I had seen first hand.
Beyond that, immortality seems silly, some come here
to learn lessons, but want to stay in school, apparently.
Health and longevity have been simple, good thoughts,
good diet, good exersize, and good company.
".. it was revealed that Android Apps can copy photos without explicit user permission, iphone and now google android phones give access to users photo libraries when given access to the locational services. ", "The reasoning behind Android’s ability to let app developers access personal smartphone photos without permission is understandable, but it actually goes against a core Android design principle." says a blog addressing the problem."
Link to Original Source
Keeping the opposition about 5,000 leaps of faith ahead.
New Expletive: IS