EFF launches the cell-site simulator section of Street Level Surveillance today
EFF launches the cell-site simulator section of Street Level Surveillance today.
December 10, 2015
"Digital analyzer. IMSI catcher. Stingray. Triggerfish. Dirt box. Cell-site simulator. The list of aliases used by the devices that masquerade as a cell phone tower, trick your phone into connecting with them, and suck up your data, seems to grow every day[1]. But no matter what name cell-site simulators go by, whether they are in the hands of the government or malicious thieves, there's no question that they're a serious threat to privacy[2]." (By Nadia Kayyali - remainder of article @ [1])
That's why EFF[3] is launching the cell-site simulator section[4] of Street Level Surveillance[5] today.
[1] https://www.eff.org/deeplinks/2015/12/government-can-you-hear-me-now-cell-site-simulators-arent-secret-anymore
[2] https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy
[3] https://www.eff.org/
[4] https://www.eff.org/sls/tech/cell-site-simulators
[5] https://www.eff.org/sls
"EFF's Street Level Surveillance Project[5] unites our past and future work on domestic surveillance technologies into one easily accessible portal. On this page, you'll find all the materials we have on each individual technology gathered into one place. Materials include FAQs about specific technologies, infographics and videos explaining how technologies work, and advocacy materials for activists concerned about the adoption of street level surveillance technologies in their own community. In the coming months, we'll be adding materials on drones, stingrays, and fusion centers."
[5] https://www.eff.org/sls
Related hits:
https://www.eff.org/sls/about
https://www.eff.org/sls/tech
https://www.eff.org/sls/news
https://www.eff.org/sls/legal
https://www.eff.org/sls/resources
https://www.eff.org/sls/tech/cell-site-simulators
https://www.eff.org/sls/tech/biometrics
https://www.eff.org/sls/tech/automated-license-plate-readers
December 10, 2015
"Digital analyzer. IMSI catcher. Stingray. Triggerfish. Dirt box. Cell-site simulator. The list of aliases used by the devices that masquerade as a cell phone tower, trick your phone into connecting with them, and suck up your data, seems to grow every day[1]. But no matter what name cell-site simulators go by, whether they are in the hands of the government or malicious thieves, there's no question that they're a serious threat to privacy[2]." (By Nadia Kayyali - remainder of article @ [1])
That's why EFF[3] is launching the cell-site simulator section[4] of Street Level Surveillance[5] today.
[1] https://www.eff.org/deeplinks/2015/12/government-can-you-hear-me-now-cell-site-simulators-arent-secret-anymore
[2] https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy
[3] https://www.eff.org/
[4] https://www.eff.org/sls/tech/cell-site-simulators
[5] https://www.eff.org/sls
"EFF's Street Level Surveillance Project[5] unites our past and future work on domestic surveillance technologies into one easily accessible portal. On this page, you'll find all the materials we have on each individual technology gathered into one place. Materials include FAQs about specific technologies, infographics and videos explaining how technologies work, and advocacy materials for activists concerned about the adoption of street level surveillance technologies in their own community. In the coming months, we'll be adding materials on drones, stingrays, and fusion centers."
[5] https://www.eff.org/sls
Related hits:
https://www.eff.org/sls/about
https://www.eff.org/sls/tech
https://www.eff.org/sls/news
https://www.eff.org/sls/legal
https://www.eff.org/sls/resources
https://www.eff.org/sls/tech/cell-site-simulators
https://www.eff.org/sls/tech/biometrics
https://www.eff.org/sls/tech/automated-license-plate-readers