Berkeley CSUA MOTD:Entry 52025
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2017/09/25 [General] UID:1000 Activity:popular
9/25    

2008/11/17 [Science] UID:52025 Activity:kinda low
11/18   http://www.theregister.co.uk/2008/11/17/triggerfish
        The technology, known as Triggerfish, pretends to be a base station so
        that mobile handsets happily connect to it and identify themselves. A
        Triggerfish deployment can wait for a specific handset to pass by, or
        just grab nearby identities for later analysis.
        lulz.
        \_ Switch to Verizon.
2017/09/25 [General] UID:1000 Activity:popular
9/25    

You may also be interested in these entries...
2012/6/26-7/20 [Science/GlobalWarming] UID:54422 Activity:nil
6/26    WW2 brought us antibiotics, syringe, production capacity,
        excessive petroleum, radar, television, atomic energy,
        rocketry (HEIL VON BRAUN), synthetic rubber, microwave,
        computers (GAY TURING), jets.
        What did the Iraq war bring us?
        \_ HMMWV -> Hummer H1 the gas guzzler.
	...
2012/3/8-26 [Science/Space, Science/GlobalWarming] UID:54334 Activity:nil
3/8     "Invisible Mercedes brings James Bond technology to life"
        http://www.csua.org/u/vpc (autos.yahoo.com)
        How many years and dollars have our military spent on trying to achieve
        the same thing and yet still haven't gotten any result!?  Now a
        civilian company has done it, and they did it even merely for
        publicity.
	...
Cache (1601 bytes)
www.theregister.co.uk/2008/11/17/triggerfish -> www.theregister.co.uk/2008/11/17/triggerfish/
Webcast: Building Applications for the 21st Century The American Civil Liberties Union has revealed that the FBI no longer feels the need for judicial or operator oversight when deploying base station-faking technology to detect mobile phones. This capability is nothing new, but previously it was assumed that a warrant was needed before the FBI started tracking phones and that the network operator would need to be informed. Instead the FBI just gets a pen-trap order, granted under the Foreign Intelligence Surveillance Act, and Bob's your uncle. The technology, known as Triggerfish, pretends to be a base station so that mobile handsets happily connect to it and identify themselves. A Triggerfish deployment can wait for a specific handset to pass by, or just grab nearby identities for later analysis. When the GSM security model was created there was no attempt to confirm the identity of the base station - it never occurred to the designers that fake base stations would exist so all the authentication is one-way. Worse still, while the IMSI (unique to the subscriber) is not supposed to be sent over the network, the standard allows a base station to claim to have "lost" the corresponding TMSI (temporary equivalent) and thus ask the handset to resend the IMSI in the clear. Setting up fake base stations is pretty rare, but clearly the US authorities aren't alone in doing it, which is why the 3G GSM standard requires base stations to authenticate themselves too - making Triggerfish once again inoperable without network operator collusion, at least where 3G is being used by default.