Cellphone Surveillance Explained - Stingray/IMSI Catchers

Security Researcher
21 Nov 201526:09

Summary

TLDRThis video script by a security researcher delves into the world of cell phone tower simulators, also known as 'Stingrays', exploring their capabilities, how they operate, and their potential misuse. The script educates viewers on how these devices can intercept and manipulate data, posing privacy risks. It also discusses the legal and ethical implications, and offers practical advice on how individuals can protect themselves using signal isolation and alternative communication methods, emphasizing the importance of understanding and navigating the complexities of modern technology.

Takeaways

  • πŸ“‘ Stingrays, or cell phone tower simulators, are devices that mimic legitimate cell phone towers to intercept communications.
  • πŸ›‘οΈ These devices can be as small as a handheld device or as large as equipment installed in a vehicle, airplane, or building, requiring only power and a data connection.
  • πŸ”Ž They function by performing a man-in-the-middle attack, tricking phones into connecting with them and capturing data transmitted by the device.
  • πŸ“± All smartphones, regardless of their security features, are susceptible to attacks by cell phone tower simulators.
  • 🚨 The technology can be deployed without legal authorization, potentially bypassing traditional legal limitations and oversight.
  • πŸ’‘ Backdoors in technology can be exploited by anyone aware of their existence, not just authorized entities.
  • πŸ” Users can determine if a simulator is operating in their area by noticing unusual phone behavior, such as warmth, rapid battery drain, or degraded service.
  • πŸ›‘οΈ Signal isolation is a method to protect against these attacks, which involves encapsulating the phone to prevent signal transmission and reception.
  • πŸ“΅ Commercial signal-blocking hard cases have been lab-tested and verified for effectiveness, unlike many DIY or soft cases which may not provide reliable protection.
  • πŸ“Ÿ Maintaining connectivity while protecting privacy can be achieved by using a one-way alphanumeric pager for non-encrypted messages and notifications.
  • πŸ”‘ The script emphasizes the importance of understanding technology to make informed decisions and highlights the need for vigilance against privacy threats.

Q & A

  • What is the main topic of the video?

    -The main topic of the video is about cell phone tower simulators, also known as stingrays, discussing what they are, how they function, who uses them, and how one can protect themselves from them.

  • What is the purpose of using the term 'cell phone tower simulator' instead of 'stingray'?

    -The term 'cell phone tower simulator' is used as a safer term for the speaker, possibly to avoid any legal or ethical issues associated with the term 'stingray'.

  • What are the different forms that cell phone tower simulators can take?

    -Cell phone tower simulators can be installed in vehicles like surveillance vans or SUVs, airplanes, drones, or fixed positions like a building with an antenna nearby. They can also be small enough to fit in a backpack or be handheld.

  • What are the basic requirements for a cell phone tower simulator to function?

    -The basic requirements for a cell phone tower simulator to function include access to power, access to some sort of data connection, and a terminal like a laptop computer with associated software to translate the data.

  • How does a cell phone tower simulator trick a phone into connecting to it?

    -A cell phone tower simulator tricks a phone by sending commands to the phone, making it believe that the simulator is the strongest cell phone tower in the area, and potentially shutting off or downgrading session encryption to make it easier to intercept communications.

  • What is a man-in-the-middle attack as mentioned in the script?

    -A man-in-the-middle attack, as mentioned in the script, refers to the situation where an attacker intercepts communication between a device and a network node, in this case, a cell phone tower, to eavesdrop or relay the data being sent.

  • What information can be captured by a cell phone tower simulator in passive mode?

    -In passive mode, a cell phone tower simulator can capture live calls, text messages, emails, and any data traffic transmitted to or from the phone, even if it's encrypted, as the data can be recorded and decrypted later.

  • What are some of the potential privacy risks when a cell phone tower simulator operates in active mode?

    -In active mode, a cell phone tower simulator can interact directly with the phone, potentially accessing the microphone, camera, GPS, and other stored information like banking history, passwords, call logs, and phone book, which can be used for surveillance and tracking.

  • What are some symptoms that might indicate your phone is connected to a cell phone tower simulator?

    -Symptoms may include the phone getting warm without use, quicker battery drain, degraded data and voice service, and receiving text messages that display an odd number sequence instead of the sender's phone number.

  • What solutions does the speaker suggest to protect against cell phone tower simulators?

    -The speaker suggests using signal isolation methods, such as signal blocking hard cases with laboratory verification of effectiveness, and maintaining connectivity through one-way alphanumeric pagers.

  • Why does the speaker recommend avoiding DIY solutions and soft cases for signal isolation?

    -The speaker recommends avoiding DIY solutions and soft cases because they may not be reliable or thoroughly tested, with soft cases having an overall failure rate of about 53% according to Purdue University's cyber forensics lab.

  • How can one maintain connectivity while using a signal blocking product?

    -One can maintain connectivity by using a one-way alphanumeric pager to receive numeric messages, text messages, and emails, which provides a basic level of communication without the risks associated with a fully connected smartphone.

Outlines

00:00

πŸ“‘ Introduction to Cell Phone Tower Simulators

The video script introduces the topic of cell phone tower simulators, also known as stingrays, and sets the stage for a comprehensive discussion on these devices. The speaker, a security researcher, outlines the agenda for the video, which includes explaining what these simulators are, who uses them, their functionality, deployment methods, and their capabilities. The video aims to educate viewers on how to detect if a simulator is operating in their area and how to protect themselves from potential surveillance. The speaker emphasizes the importance of understanding technology to make informed decisions and pledges to provide a basic understanding of cell phone tower simulators in plain English.

05:00

πŸ” Understanding Cell Phone Tower Simulators and Their Functions

This paragraph delves into the specifics of cell phone tower simulators, discussing their appearance, the necessity of power and data connections for their operation, and the variety of forms they can take, from vehicle-installed equipment to handheld devices capable of affecting thousands of phones simultaneously. The script clarifies that these simulators function like legitimate cell towers, tricking devices into connecting with them and potentially intercepting communications. The speaker also touches on the legal aspects of these devices, noting that they are designed to operate without legal authorization, leaving no trace of their deployment.

10:01

πŸ•΅οΈβ€β™‚οΈ The Man-in-the-Middle Attack and Data Capture

The script explains the concept of a man-in-the-middle attack, which cell phone tower simulators exploit to intercept data between a device and the network. It details how these devices can capture various types of information, such as live calls, text messages, emails, and data traffic, even if encrypted, due to their ability to dictate the communication session, including disabling encryption. The paragraph also discusses the deployment process of these simulators, how they trick phones into connecting to them by mimicking legitimate cell towers, and the potential for widespread surveillance when multiple simulators are used in a community.

15:01

πŸ“± Active and Passive Modes of Simulators and Their Implications

This section differentiates between the active and passive modes of operation for cell phone tower simulators. In passive mode, the device listens and records information without interacting, similar to a car radio. In contrast, active mode allows the simulator to act as a relay, receiving all information directly from the phone and passing it on to another network. The script highlights the types of information that can be captured, such as IMEI and IMSI numbers, which can reveal the device's identity and the subscriber's information, potentially leading to privacy breaches and targeted surveillance.

20:03

πŸ”‘ Privacy Risks and Symptoms of Simulator Activity

The paragraph discusses the privacy risks associated with cell phone tower simulators, especially when operating in active mode, which can lead to unauthorized access to the phone's microphone, camera, GPS, and stored data. It outlines potential symptoms of simulator activity, such as unusual warmth or rapid battery drain, degraded voice or data service, and anomalies in text message delivery. The speaker also emphasizes the broader implications for all wireless devices, not just cell phones, and the need for a shift away from a flawed trust model in technology.

25:04

πŸ›‘οΈ Solutions for Protecting Against Simulators: Signal Isolation and Alternative Connectivity

The final paragraph focuses on potential solutions to protect against cell phone tower simulators. It suggests signal isolation as a method to prevent signal transmission and reception by the phone, highlighting the need for lab testing to ensure the effectiveness of such solutions. The script also addresses the issue of maintaining connectivity without compromising privacy, proposing the use of one-way alphanumeric pagers as an alternative means of communication. The speaker advises viewers to seek out signal-blocking products with laboratory verification and high decibel ratings for signal attenuation.

πŸ“’ Conclusion and Call to Action

In the concluding paragraph, the security researcher summarizes the video's content and emphasizes the importance of understanding and addressing the privacy risks posed by cell phone tower simulators. They encourage viewers to subscribe and share the video to raise awareness and continue the conversation on this critical issue. The speaker expresses gratitude for the viewers' time and reiterates their commitment to providing valuable information on navigating the complexities of modern technology and surveillance.

Mindmap

Keywords

πŸ’‘Stingrays

Stingrays, also known as cell phone tower simulators, are devices that mimic cell phone towers to intercept data and communications from mobile devices. They are central to the video's theme, illustrating the potential for privacy intrusion and surveillance. The script discusses various aspects of stingrays, including their function, deployment, and the risks they pose to individuals' privacy.

πŸ’‘Man-in-the-Middle Attack

A man-in-the-middle attack is a type of cyber attack where the attacker secretly relays and possibly alters communication between two parties, which can intercept sensitive information. In the context of the video, this term is used to describe how cell phone tower simulators can intercept data between a mobile device and a legitimate cell tower, compromising the security and privacy of the communication.

πŸ’‘IMEI

IMEI stands for International Mobile Equipment Identity, a unique serial number for identifying mobile devices. The script explains that attackers can use the IMEI to determine the make, model, and product variant of a phone, which relates to the theme of the video by showing how much personal information can be gleaned from a single piece of data.

πŸ’‘IMSI

IMSI, or International Mobile Subscriber Identity, is a unique identifier associated with a SIM card or mobile device. The video script mentions that IMSI can be used to track back to the person paying for the service or associate with the person using the SIM card, emphasizing the vulnerability of personal data to surveillance.

πŸ’‘Signal Isolation

Signal isolation is the process of encapsulating a device to prevent it from sending or receiving signals, thereby protecting it from unauthorized access or surveillance. The video discusses signal isolation as a method to protect against cell phone tower simulators, highlighting the importance of this concept in maintaining privacy.

πŸ’‘Active Mode

In the context of cell phone tower simulators, active mode refers to the state where the device is not only intercepting but also interacting with the mobile device, potentially allowing the attacker to access phone functions like the microphone, camera, or GPS. The video script uses this term to illustrate the invasive capabilities of these devices.

πŸ’‘Passive Mode

Passive mode, as explained in the video, is a state where the cell phone tower simulator is only listening to and recording data transmitted by the mobile device without interacting with it. This mode is likened to a car radio, where one can tune in and listen but not transmit, showing the video's focus on the different levels of surveillance capabilities.

πŸ’‘Signal Blocking Hard Cases

Signal blocking hard cases are commercial products designed to physically isolate a mobile device from all incoming and outgoing signals, effectively preventing surveillance. The script discusses these cases as a solution to protect against cell phone tower simulators, emphasizing the need for lab-verified effectiveness.

πŸ’‘One-Way Alphanumeric Pager

A one-way alphanumeric pager is a device that can receive numeric and text messages but does not have the capability to send them. The video suggests using such a pager to maintain basic connectivity without the risks associated with mobile phones, illustrating an alternative method for communication that avoids the vulnerabilities of cell phones.

πŸ’‘Trust Model

The trust model in the context of the video refers to the reliance on technology and corporations to protect privacy and security. The script criticizes this model as flawed, given the potential for surveillance and data interception by devices like cell phone tower simulators, highlighting the need for individuals to be aware and take protective measures.

πŸ’‘Legal Restrictions

Legal restrictions mentioned in the video script refer to the laws, warrants, and court orders that are theoretically required for the use of surveillance technologies like cell phone tower simulators. The video discusses how these devices can bypass such restrictions, emphasizing the potential for misuse and the importance of public awareness.

Highlights

The video discusses cell phone tower simulators, also known as Stingrays, and their capabilities.

The presenter emphasizes the importance of understanding technology to make informed decisions.

Different forms of cell phone tower simulators are described, including those that can fit in a backpack or handheld devices.

The video explains that these devices can function without legal authorization, leaving no paper trail.

It is revealed that anyone can potentially build a cell phone tower simulator for as little as twelve hundred dollars.

The technology operates on a man-in-the-middle attack, intercepting data between the device and the network.

Phones are described as 'slaves to the tower', being susceptible to commands from simulated towers.

The video outlines how attackers can configure a cell phone tower simulator to trick phones into connecting.

Two modes of operation are explained: passive (listening) and active (interacting directly with the phone).

Information such as IMEI numbers and IMSI can be captured, revealing the unique identity of a phone and its user.

Active mode capabilities allow for eavesdropping on phone calls, text messages, and even activating the phone's camera.

The video warns of the potential for these devices to be used for mass surveillance in a community.

Symptoms of a cell phone being under attack by a simulator, such as unusual warmth or rapid battery drain, are listed.

The presenter suggests that the technology is evolving, making it difficult to pin down specific symptoms.

Signal isolation is proposed as a method of protection against cell phone tower simulators.

Commercial signal blocking hard cases are recommended over DIY solutions and soft cases for reliability.

The use of one-way alphanumeric pagers is suggested to maintain connectivity without compromising privacy.

The video concludes by emphasizing the importance of education and taking action against privacy threats.

Transcripts

play00:06

hey security researcher here once again

play00:09

thanks for checking out my video today

play00:12

we're going to talk about stingrays I'm

play00:14

actually going to use the term cell

play00:15

phone tower simulator it's a much safer

play00:18

term for me to use we're going to

play00:21

discuss what these devices are who uses

play00:24

them how they function how they're

play00:27

deployed what they can do once they are

play00:30

deployed how you yourself can determine

play00:32

if one is operating in your area as well

play00:35

as what you can do to protect yourself

play00:37

from them now

play00:39

this is going to be a long video I'm

play00:41

recording the audio here for god knows

play00:43

how many times I'm going to try to

play00:46

include as much information as I can

play00:47

here I ask that you be patient and watch

play00:51

this thing all the way through by the

play00:53

time you're done hopefully not only do

play00:55

you know more about this stuff than just

play00:57

about anybody you know but you're pissed

play00:59

and you're willing to start to talk to

play01:02

others about this because this is a

play01:04

problem that all being said the

play01:07

information that I provide in these

play01:08

videos is not intended for the

play01:10

criminally minded this really truly is

play01:12

about education you cannot make informed

play01:15

decisions about things as complicated as

play01:17

technology if you don't have even the

play01:19

most basic understanding of what it is

play01:21

that you're talking about so let me take

play01:24

twenty years of research experience boil

play01:26

it down into plain English so that we

play01:28

can all better understand the risks that

play01:30

we face on a daily basis now let's get

play01:33

into this topic again cell phone tower

play01:35

simulators and the first point is what

play01:38

they are now I suppose the first thing

play01:41

that we need to do here is give you a

play01:44

visual reference of what it is that

play01:45

we're talking about some of this

play01:47

equipment is designed to be installed in

play01:51

a vehicle like a surveillance van or an

play01:54

SUV of some type maybe it's an airplane

play01:56

or a drone a lot of the stuff can be

play02:00

located in fixed positions so a building

play02:03

with an antenna nearby basically what

play02:06

the equipment needs is access to power

play02:09

access to some sort of data whether it's

play02:12

a high-speed data connection like the

play02:15

one that you have coming into your house

play02:16

or the ability to communicate wirelessly

play02:20

with some sort of a data connection but

play02:23

those things are required for it to

play02:24

function depending on how its operating

play02:27

it also needs some sort of a terminal

play02:31

like a laptop computer and whatever

play02:34

associated software to translate the

play02:36

data that the equipment is bringing in

play02:39

that said there's also smaller devices

play02:42

so when the media refers to it as one

play02:46

specific device that's big and bulky

play02:48

what they're concealing through

play02:50

obfuscation is things like this device

play02:53

that fits in a backpack or this device

play02:57

that's handheld so you could walk into

play03:00

maybe a tea party gathering or some sort

play03:04

of a labor protest or whatever and you

play03:07

know gather information about the

play03:09

devices that are present or this device

play03:11

right here that allows the attacker to

play03:14

attack up to sixty thousand phones at

play03:17

one time

play03:18

not exactly targeted surveillance in my

play03:21

mind and when you keep in mind the fact

play03:24

that these can be located in fixed

play03:25

positions you could sprinkle these

play03:27

around a community and monitor every

play03:30

single phone in town we'll cover all of

play03:34

this things that are at least publicly

play03:36

known about this technology because I'm

play03:38

really not interested in spending a lot

play03:40

of time here or meeting people like

play03:42

these guys so I'm going to try to only

play03:46

discuss what is publicly known and put

play03:49

it into context so that we can all

play03:50

understand the threat so now that you

play03:53

know what the things look like let's

play03:54

talk about what they actually are and

play03:56

how they function so what is a cell

play03:59

phone tower simulator just as the name

play04:02

implies it functions like a legitimate

play04:04

cell phone tower it communicates back

play04:07

and forth with your device on its normal

play04:09

communication channels so as far as your

play04:11

device is concerned it's on a legit cell

play04:14

phone tower it works on all of these

play04:17

smart and dumb phones that are out the

play04:19

market today and no I don't care how

play04:21

super cool or secure you think your

play04:24

phone is it is susceptible to attack by

play04:27

these types of devices I know that

play04:32

everyone likes to talk about the legal

play04:34

restrictions of the use of cell phone

play04:36

tower simulators warrants writs court

play04:39

orders trap-and-trace pen registers etc

play04:41

but this technology is designed to work

play04:44

without having to attain legal

play04:46

authorization it can be deployed without

play04:48

anyone knowing that it's being used

play04:50

there's no paper trail that the system

play04:52

is being deployed so there's no audit

play04:55

that can occur to find out whether it

play04:57

was used you have to realize that before

play05:00

they used to have to go through the

play05:01

cellular service providers to gather

play05:03

information but it was really messy and

play05:06

it left paper trails everywhere with the

play05:09

release of this technology all the way

play05:11

down to your local community now they

play05:15

don't have to worry about that now this

play05:17

would be a concern to you and I if we

play05:18

had a system that was displaying a

play05:20

disdain for traditional legal

play05:21

limitations on power and authority if we

play05:24

had organizations and agencies and

play05:27

individuals operating and secret hiding

play05:29

behind non-disclosure agreements lying

play05:31

to Congress or just general corruption

play05:34

running rampant throughout the system

play05:35

but since we know we don't have that

play05:38

happening here in the United States we

play05:40

know that we don't have anything to

play05:41

worry about right that is until you

play05:44

realize that it's already been proven

play05:46

that for as little as twelve hundred

play05:49

dollars or less just about anybody can

play05:52

build a device that has similar

play05:54

capabilities to this technology the fact

play05:56

that backdoors exist in any of our

play05:59

technology means that not only can the

play06:02

quote unquote good guys use it but

play06:04

anybody who's aware that those backdoors

play06:06

exist can also use them we are all

play06:10

operating under a very flawed trust

play06:12

model when it comes to technology we are

play06:15

putting our faith and trust in

play06:16

corporations and technology where it

play06:19

should never have been placed to begin

play06:21

with and it's been going on for so long

play06:23

that we become apathetic to the risks

play06:26

and it's really time to stop that so

play06:29

let's go on and talk more about this

play06:31

technology and I'll get off my soapbox

play06:33

so let's talk about how these devices

play06:36

function what's happening here is what

play06:38

the InfoSec community calls a

play06:40

man-in-the-middle attack just as the

play06:42

name implies the attacker slips within

play06:45

range of your device and the network

play06:46

node that it's try

play06:47

to communicate with in this case a

play06:49

cellphone tower and depending on its

play06:52

mode of operation can interact with the

play06:55

data that's being sent to and from your

play06:57

device it could be listening

play06:59

it could be acting as a relay and

play07:01

capturing all the information that's

play07:03

supposedly being sent directly to the

play07:05

cellular network you have to keep in

play07:09

mind that your phones are slaves to the

play07:10

tower so anytime your device is

play07:13

connected to any cell phone tower

play07:15

whether it's legitimate or simulated the

play07:18

tower dictates to the phone what's going

play07:20

to happen during that communication

play07:22

session including shutting off session

play07:24

encryption so now how are these devices

play07:27

deployed so if you have an attacker that

play07:30

has a cell phone tower simulator how is

play07:33

it that they can set this thing up so

play07:35

that your device will connect to it well

play07:37

as we covered in cell phone tracking

play07:39

explain in plain English part one your

play07:42

phone checks in with the cell phone

play07:43

network towers on a regular basis this

play07:46

is somewhere around every three to seven

play07:48

seconds your phone is always trying to

play07:51

connect to numerous towers at the same

play07:53

time to ensure you quality of service

play07:55

when a phone initially connects to a

play07:58

tower for the first time it gathers

play07:59

information about the surrounding

play08:01

network things like what carriers are

play08:04

operating towers in the network what

play08:06

channel's your phone can use to

play08:08

communicate with the antennas on those

play08:09

towers this information is temporarily

play08:12

stored on your phone so if your device

play08:15

moves loses signal etc it can quickly

play08:18

switch channels in order to maintain

play08:20

connectivity it's also why when you

play08:22

travel your phone may tell you that

play08:24

instead of using say AT&T your phone is

play08:27

connected to metro pcs it all goes back

play08:30

to billing for roaming and things like

play08:32

that so while this information has its

play08:35

legitimate uses this information is also

play08:37

useful to an attacker who comes into an

play08:39

area and wants to configure their cell

play08:42

phone tower simulator to work more

play08:44

efficiently they can query the towers

play08:47

themselves and get information about

play08:50

what cell phone towers are in the area

play08:52

what frequencies or channels the

play08:54

antennas on those towers are operating

play08:56

on what carriers your phone might be

play08:59

expecting to see in the area

play09:02

and then using that information they can

play09:04

configure their simulated cell phone

play09:05

tower now since the phones are really

play09:08

slave to the tower the towers send the

play09:12

phones all the commands is related to

play09:14

their operations so if you were running

play09:17

a simulated cell phone tower you could

play09:19

tell the phone that you're the strongest

play09:21

cell phone tower in the area in order to

play09:23

trick it to get it to attempt to connect

play09:26

to your device you can also shut off

play09:30

session encryptions so that what would

play09:32

normally be protecting either shut it

play09:35

off or downgrade it to make it easier to

play09:37

crack so what would normally protect the

play09:40

confidentiality of your communications

play09:42

is basically negated so first we need to

play09:45

understand that these devices operate in

play09:47

one of two modes one is a passive mode

play09:51

and the best way I can describe passive

play09:53

to you is it's like the radio in your

play09:56

car you can tune in to different

play09:58

frequencies or channels and you can hear

play10:00

information but you can't interact with

play10:03

that information all you can do is

play10:05

listen to it when it comes to cellular

play10:08

technology or maybe encrypted

play10:09

information you can listen to it record

play10:12

it and then D encrypt it but you're

play10:14

never really transmitting so you're not

play10:18

giving away the fact that you're there

play10:20

the other mode that these things operate

play10:23

in is it is an active mode and an active

play10:25

mode is where the device is now acting

play10:28

as a relay so instead of your traffic

play10:30

going directly to the cellular tower or

play10:33

being broadcast to the cellular tower

play10:35

where they could listen they've now

play10:37

tricked your phone to directly

play10:38

connecting to them and they're receiving

play10:40

all the information coming directly from

play10:42

your phone and then passing it on to

play10:44

either a wireless network or a directly

play10:47

connected high-speed Internet network so

play10:50

that everything that's coming off of

play10:52

your phone passes through their device

play10:54

and they can capture and filter all of

play10:56

the information that's coming off of it

play10:58

now what is that information and what

play11:01

are the commands that they can send back

play11:03

to your phone when they're in active

play11:05

mode what does that allow them to do

play11:08

okay well without putting these in any

play11:10

specific order some of the information

play11:12

that can be captured on your device is

play11:15

something called an IMEI number IMEI

play11:17

stands for international mobile station

play11:20

Equipment Identity it's also known as

play11:23

the meid or mobile equipment identifier

play11:25

now this is the unique serial number of

play11:28

your specific phone and using it the

play11:30

person that's doing the attack can

play11:32

determine the make model and product

play11:34

variant so maybe it's a samsung galaxy

play11:37

s6 or an iphone 6 or an HTC One m9

play11:41

whatever but you can also determine the

play11:44

product variant which tells them things

play11:46

like the device firmware that may be

play11:49

operating because of the chips that are

play11:50

installed on that specific phone it's

play11:53

very specific down to your exact device

play11:57

that's your phone's unique identifier on

play12:00

the network you yourself can find this

play12:02

number it's either going to be on a

play12:04

white sticker under the battery or you

play12:07

can find it by bringing up your phone's

play12:08

keypad and hitting star pound zero six

play12:12

pound or in modern vernacular star

play12:16

hashtag zero six hash tag but yeah star

play12:20

pound zero six pound will bring up your

play12:22

phone's unique serial number now

play12:25

something to keep in mind here is if

play12:27

you're a special person maybe you work

play12:29

for an agency or a department and you

play12:32

have a special phone that you think is

play12:34

secure if it has a unique IMEI number

play12:37

that identifies it as a unique piece of

play12:39

hardware that can actually help an

play12:42

attacker determine whether or not your

play12:44

device is worth looking at so some of

play12:46

the same techniques and tools that you

play12:48

use to determine whether certain people

play12:50

are worth looking at can also be turned

play12:52

around and used on you this technology

play12:55

is a dual edged sword so you need to

play12:57

keep that in mind so another piece of

play12:59

information that can be gathered is

play13:01

something called an IM SI or MC it's

play13:05

where the term MC catcher comes from

play13:07

IMSI is international mobile subscriber

play13:10

identity this number is encoded on your

play13:13

cell phone SIM card or on the phone

play13:16

itself if it doesn't have a SIM card the

play13:18

number is directly associated with the

play13:20

person who's paying for the service so

play13:23

not only can it be used to track it back

play13:26

to whoever's paying the bill it can also

play13:28

be you

play13:29

used to associate to the person who uses

play13:31

that SIM card for making phone calls so

play13:34

even if you're switching phones on a

play13:36

regular basis maybe you think you're

play13:38

James Bond and that's going to like

play13:40

somehow protect you that SIM card has a

play13:43

unique identifier that's associated with

play13:45

whoever's paying the bill and if

play13:48

somebody is monitoring that SIM card

play13:49

that MC number they can associate your

play13:52

voice with that MC and then it doesn't

play13:56

matter who's paying the bill as far as

play13:57

they're concerned that MC is you when

play14:00

one of these cell phone tower simulators

play14:02

is in passive mode again listening like

play14:05

your car radio any information that's

play14:07

transmitted to or from your phone can be

play14:10

captured and monitored that includes

play14:12

live calls that includes text messages

play14:15

as you send them that includes emails

play14:17

any data traffic anything that you're

play14:20

doing even if you're using one of these

play14:21

applications that's super cool and it

play14:24

encrypts my voice traffic and sends it

play14:26

over the wireless and blah blah blah

play14:28

you're still transmitting it and anybody

play14:30

that can tune in to pick up that

play14:32

transmission can capture that

play14:34

transmission and even if it is encrypted

play14:37

they now have the data and can D encrypt

play14:41

it themselves so again we're operating

play14:44

under a terribly flawed trust model when

play14:46

it comes to technology and I really

play14:48

don't care how smart you think you are

play14:50

you're operating under a flawed trust

play14:53

model believe me so that's just it in a

play14:56

passive mode it really gets interesting

play14:58

when these devices operate in an active

play15:01

mode because now they can interact

play15:03

directly with your phone they can mess

play15:06

with power management so you may think

play15:08

your phone shuts off the screen does

play15:10

what it normally does and it makes the

play15:12

noises that it normally does when it

play15:14

shuts off but the phone isn't really off

play15:16

so the microphone can still be used to

play15:18

eavesdrop on what's going on in the room

play15:20

the camera can still be activated the

play15:22

GPS can still be tracked you have to

play15:25

realize that you know anything that's

play15:27

stored on the device at this point

play15:29

because this device has connected on to

play15:31

your phone so your banking history your

play15:34

passwords your call logs your phone book

play15:36

all of which can be used to create

play15:38

additional target lists all of this

play15:41

stuff is available whenever one of the

play15:42

these devices in an active mode connects

play15:45

up to your cell phone something else

play15:47

that's important to pay attention to is

play15:49

you know I'd mentioned that your camera

play15:50

can be activated and a lot of people

play15:53

will automatically think well whatever

play15:55

my phone's in my pocket

play15:56

well where's your phone when you're

play15:58

reading in text and where is the camera

play16:00

when you're looking at the screen on

play16:03

your phone you've got a camera that's

play16:05

pointed at you so I can identify that

play16:07

you're reading that text but where's the

play16:09

camera on the back of your phone pointed

play16:11

you know these things can be used for

play16:14

video surveillance they can be used for

play16:16

audio surveillance even in your own home

play16:18

even in your business now even if your

play16:21

colleagues your friends and your family

play16:23

members don't take this stuff seriously

play16:24

it's up to you to do it you have to

play16:27

educate them and they need to understand

play16:29

it you're going to get a lot of flack

play16:31

you're going to be told you're crazy and

play16:33

you're paranoid but the fact of the

play16:34

matter is is this stuff is happening I

play16:37

just want to take a second to point out

play16:38

something here we're only talking about

play16:40

cell phones in this video but you need

play16:42

to think about all the other devices

play16:43

that you own that operate wirelessly if

play16:46

they transmit and receive information

play16:49

there can be subject to a

play16:50

man-in-the-middle attack so we're not

play16:52

just talking about your cell phone your

play16:55

tablet your laptop maybe your PC if

play16:58

you've connected it wirelessly but also

play17:00

the wireless router itself all of these

play17:02

devices can be attacked remotely through

play17:04

a man-in-the-middle attack so it's

play17:07

important that you realize we are

play17:08

operating under a terribly flawed trust

play17:11

model when it comes to technology now

play17:13

let's get back on topic and talk about

play17:15

man-in-the-middle attacks using cell

play17:17

phone tower simulators against your cell

play17:19

phone what are some of the symptoms that

play17:21

this could be occurring against your

play17:23

device so when it comes to symptoms it's

play17:28

important that a state here that this

play17:31

technology is always evolving so some of

play17:33

the symptoms that I'm going to say now

play17:34

might not be symptoms next week when the

play17:37

new version comes out these are just

play17:40

some of the things that I know of I'm

play17:42

probably going to miss a few of them but

play17:45

here's a list anyway your phone gets

play17:48

warm you're not even on it and you pick

play17:51

it up and it's warm which means it's

play17:52

been transmitting and receiving the

play17:54

battery drains quicker than usual

play17:56

well you have no or seriously degraded

play17:59

data service when there should be decent

play18:01

data service you have no or seriously

play18:04

degraded voice service maybe there's a

play18:06

lot of people around and they're routing

play18:09

all of the traffic through one of these

play18:10

cell phone tower simulators so there

play18:13

isn't as much bandwidth to go around and

play18:15

the voice service now sucks this one is

play18:18

usually a dead giveaway but I absolutely

play18:20

do not recommend that you try it it is

play18:22

illegal don't do this unless of course

play18:26

it's a genuine emergency but if you try

play18:30

to dial nine-one-one and you do not have

play18:33

911 again don't do this but that's a

play18:38

dead giveaway that your device is

play18:40

connected to a cell phone tower

play18:41

simulator um your friends might get a

play18:45

text message from you but when that text

play18:48

message comes up on their phone it

play18:49

doesn't come up with your phone number

play18:51

it comes up with something odd like some

play18:53

sort of a four-digit combination of

play18:56

numbers but not your actual phone number

play18:59

okay so you've made it this far and

play19:01

you're interested in figuring out what

play19:03

the solution to all of this is if you

play19:05

cheated and fast forward and got here

play19:07

shame on you go back and listen to the

play19:08

whole thing you're not as smart as you

play19:10

think you are and there's stuff that you

play19:12

need to know so if you got here

play19:15

organically thank you for listening to

play19:16

the whole thing and let's talk about

play19:18

solutions the technology is constantly

play19:20

evolving it's kind of like the weapons

play19:22

and armor thing that is the weapons

play19:24

improve the armor improves and as the

play19:26

armor improves the weapons improve it's

play19:29

just that we're talking about cyber

play19:30

weapons

play19:32

so what is the armor that we can use

play19:34

against these cyber weapons how can we

play19:36

protect ourselves and the solution at

play19:40

least as I see it is really twofold one

play19:43

is signal isolation which means

play19:47

encapsulating your phone in a way that

play19:50

you can prevent all the signals that

play19:52

your phone can interact with from

play19:54

getting tore from your phone if your

play19:57

phone can receive any signals whatsoever

play19:59

it can be used to compromise the

play20:03

integrity of the device the microphone

play20:05

all the things that we've discussed can

play20:06

all be accessed if your phone can send

play20:08

and receive signals so you have to find

play20:11

a way to isolate it so that it can't

play20:13

send and receive signals but that causes

play20:16

a problem in your connectivity because

play20:18

now since the phone can't send and

play20:20

receive signals you're essentially

play20:22

isolated I have a solution for that as

play20:24

well so let's take this in two parts

play20:27

let's talk about the isolation options

play20:29

that are out in the market and let's

play20:31

talk about the connectivity option so

play20:34

let's start with the do-it-yourself

play20:36

solutions and the do-it-yourself crowd

play20:38

is really adamant that they have the

play20:40

solution I have a question for you if

play20:43

you believe that you have the solution

play20:44

have you paid to have a lab test your

play20:48

solution and keep in mind that the

play20:50

solution that you send to the lab is

play20:52

going to be different than the next one

play20:54

you make because you're just slapping

play20:56

these things together so the reason that

play20:59

I say have you had it tested is you know

play21:03

we're all familiar with you know gasses

play21:05

air and a car tire liquids water in a

play21:08

bucket I can hear the air leaking out of

play21:11

my car tire I know that it's leaking

play21:13

I can see moisture on the outside of my

play21:16

bucket and wipe it off and it comes back

play21:18

so I know that my buckets leaking I

play21:20

can't hear the RF leaking out of my

play21:23

enclosure

play21:24

I can't wipe it off and see it reappear

play21:27

again on the outside of my

play21:28

do-it-yourself enclosure I have no idea

play21:31

what frequencies are penetrating my

play21:33

enclosure I have no idea

play21:37

I don't know how effective it is until I

play21:39

have it tested because nobody unless you

play21:43

have about a hundred and fifty grand

play21:44

worth of equipment can tell you what

play21:47

frequencies are leaking out of your Do

play21:49

It Yourself enclosure and the enclosure

play21:51

that you make is going to be different

play21:53

than the enclosure that the next guy

play21:54

makes even if they're using the same

play21:56

overall premise so there's just too many

play21:59

variables in the do-it-yourself

play22:00

community for me to endorse any

play22:02

do-it-yourself solution that brings us

play22:05

to the commercial products that are out

play22:06

in the market and there's really two

play22:08

families of products soft cases and hard

play22:10

cases these soft cases that are out on

play22:13

the market were analyzed by Purdue

play22:15

University cyber forensics lab and they

play22:17

found that of the ones that they tested

play22:19

they had an overall failure rate of

play22:21

about 53 percent

play22:22

so more than half the time in a normal

play22:25

network operating environment they

play22:27

failed when you bring a cell tower

play22:30

simulator in and you get the antenna

play22:32

even closer and you up the power output

play22:35

they're going to fail even more

play22:36

frequently than fifty three percent soft

play22:39

cases are not reliable products I

play22:43

another thing to note about soft cases

play22:45

is I don't know of any of the soft cases

play22:47

that are out on the market that have

play22:48

paid to have an independent nationally

play22:50

recognized lab certify that their

play22:53

product works what I typically see is

play22:56

shielding effectiveness based on the

play22:58

materials that they're then sewing

play23:00

together to make their product the

play23:03

shielding effectiveness of a material is

play23:05

totally different than the shielding

play23:08

effectiveness of the product that you

play23:09

then make out of that material so

play23:12

there's that - now that leaves you with

play23:16

signal blocking hard cases that are

play23:19

rigid in construction so I only know of

play23:22

one out there that's manufacturing a

play23:24

hard case that actually works and they

play23:27

do have independent lab verification of

play23:30

the effectiveness of their product I'm

play23:32

not going to endorse anybody's products

play23:34

today that's not what I'm here for this

play23:36

is about information but if you're

play23:38

looking for a signal blocking product

play23:39

you're ultimately looking for something

play23:41

with laboratory verification that proves

play23:44

the highest level of signal attenuation

play23:47

possible this is measured in something

play23:50

called dB

play23:51

or decibels of signal attenuation and

play23:53

you want that number as high as possible

play23:56

no matter what solution you're looking

play23:57

for I would look at the signal blocking

play24:00

hardcase that's out on the market and I

play24:02

would stay away from the fabric now

play24:04

you've blocked signals so you can't

play24:06

receive phone calls and text messages on

play24:08

your phone now what do you do to

play24:11

maintain connectivity well this is going

play24:14

to sound a little odd because it's a

play24:16

little retro but if you get yourself a

play24:18

one-way alphanumeric pager you can not

play24:22

only receive numeric messages but you

play24:24

can also get text messages and emails it

play24:27

is an unencrypted connection but most of

play24:30

the messages that you're going to get

play24:32

honey pick up a gallon of milk on your

play24:33

way home mr. Smith your paperwork's

play24:36

ready swing by my office to pick it up

play24:37

those messages don't need to be

play24:39

encrypted so you don't really have to

play24:43

worry about that aspect of it the big

play24:45

benefit that you get is you get

play24:46

connectivity without all the strings

play24:48

attached you don't have a microphone

play24:50

that can eavesdrop on your conversations

play24:52

you don't have cameras that can see what

play24:54

you're doing you don't have GPS tracking

play24:56

the devices only listen they don't

play24:58

broadcast so you can't be location

play25:01

tracked you can regain some of your

play25:04

privacy while still maintaining

play25:05

connectivity and that's really what it's

play25:07

all about I didn't create this problem

play25:10

I'm just trying to provide you with a

play25:12

navigation around it so get yourself a

play25:15

signal blocking product that works and

play25:17

get yourself a one-way alphanumeric

play25:19

pager modify the outgoing message on

play25:22

your voicemail so at the end of it you

play25:23

say if this matter is really urgent

play25:25

please send me a page or a text or

play25:27

whatever at this you know insert number

play25:30

here and there you go you've blocked

play25:33

third party intrusion into your cell

play25:36

phone you've maintained connectivity

play25:38

with the outside world and is it perfect

play25:41

no but again I didn't create the problem

play25:43

I'm just trying to give you one path

play25:45

around it if you found value in this

play25:48

information please hit the subscribe

play25:49

button share this video with your

play25:51

friends and family stay tuned because

play25:53

there is more fun to come I am security

play25:56

researcher and if you just gave me the

play25:58

last 26 minutes of your life I want you

play26:00

to know that I really appreciate it

play26:04

you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
StingraysPrivacySecuritySurveillanceCell TowerData ProtectionEncryptionMan-in-the-MiddleSignal IsolationCybersecurity