AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
AIMSICD
is a Mobile app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike. Find out more in our Wiki on GitHub.
AIMSICD
attempts to detect IMSI-Catchers through [detection methods] such as these:
- Check [Tower Information Consistency]
- Check [LAC/Cell ID Consistency]
- Check [Neighboring Cell Info]
- Prevent [silent app installations]
- Monitor [Signal Strength]
- Detect [silent SMS]
- Detect [FemtoCells]
Security Organisations or local police regularly deploy IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood - notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy!
If you like my work, consider buying me a coffee:
Component | Licensing |
---|---|
GNU General Public License v2.0 |