SeaGlass: Enabling City-Wide IMSI-Catcher Detection

Author:

Ney Peter1,Smith Ian1,Cadamuro Gabriel1,Kohno Tadayoshi1

Affiliation:

1. University of Washington

Abstract

Abstract Cell-site simulators, also known as IMSI-catchers and stingrays, are used around the world by governments and criminals to track and eavesdrop on cell phones. Despite extensive public debate surrounding their use, few hard facts about them are available. For example, the richest sources of information on U.S. government cell-site simulator usage are from anonymous leaks, public records requests, and court proceedings. This lack of concrete information and the difficulty of independently obtaining such information hampers the public discussion. To address this deficiency, we build, deploy, and evaluate SeaGlass, a city-wide cellsite simulator detection network. SeaGlass consists of sensors that measure and upload data on the cellular environment to find the signatures of portable cell-site simulators. SeaGlass sensors are designed to be robust, low-maintenance, and deployable in vehicles for long durations. The data they generate is used to learn a city’s network properties to find anomalies consistent with cell-site simulators. We installed SeaGlass sensors into 15 ridesharing vehicles across two cities, collecting two months of data in each city. Using this data, we evaluate the system and show how SeaGlass can be used to detect signatures of portable cell-site simulators. Finally, we evaluate our signature detection methods and discuss anomalies discovered in the data.

Publisher

Walter de Gruyter GmbH

Subject

General Medicine

Reference37 articles.

1. [1] Android-imsi-catcher-detector. https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector. Accessed: 2017-03-14.

2. [2] Apple location services. https://support.apple.com/enus/HT203033. Accessed: 2017-03-14.

3. [3] D. Barrett. Americans’ cellphones targeted in secret u.s. spy program. http://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533, November 2014. Accessed: 2017-03-14.

4. [4] S. Biddle. Long-secret stingray manuals detail how police can spy on phones. The Intercept, September 2016.

5. [5] A. Dabrowski, G. Petzl, and E. R. Weippl. The messenger shoots back: Network operator based imsi catcher detection. In International Symposium on Research in Attacks, Intrusions, and Defenses, pages 279–302. Springer, 2016.

Cited by 20 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections;Proceedings of the 17th Cyber Security Experimentation and Test Workshop;2024-08-13

2. Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements;Lecture Notes in Computer Science;2024

3. LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations;Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services;2023-06-18

4. De-anonymising Individuals Through Unique Patterns in Movement Data;Lecture Notes in Networks and Systems;2023

5. A fine-grained telemetry stream for security services in 5G open radio access networks;Proceedings of the 1st International Workshop on Emerging Topics in Wireless;2022-12-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3