EFF launches the cell-site simulator section of Street Level Surveillance today

by
Anonymous Coward
in ask on (#YVWH)
"Digital analyzer. IMSI catcher. Stingray. Triggerfish. Dirt box. Cell-site simulator. The list of aliases used by the devices that masquerade as a cell phone tower, trick your phone into connecting with them, and suck up your data, seems to grow every day[1]. But no matter what name cell-site simulators go by, whether they are in the hands of the government or malicious thieves, there's no question that they're a serious threat to privacy[2]." (By Nadia Kayyali - remainder of article @ [1])

That's why EFF[3] is launching the cell-site simulator section[4] of Street Level Surveillance[5] today. "EFF's Street Level Surveillance Project[5] unites our past and future work on domestic surveillance technologies into one easily accessible portal. On this page, you'll find all the materials we have on each individual technology gathered into one place. Materials include FAQs about specific technologies, infographics and videos explaining how technologies work, and advocacy materials for activists concerned about the adoption of street level surveillance technologies in their own community. In the coming months, we'll be adding materials on drones, stingrays, and fusion centers."

[1] https://www.eff.org/deeplinks/2015/12/government-can-you-hear-me-now-cell-site-simulators-arent-secret-anymore
[2] https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy
[3] https://www.eff.org/
[4] https://www.eff.org/sls/tech/cell-site-simulators
[5] https://www.eff.org/sls

Detect defeat and fight back (Score: 0)

by Anonymous Coward on 2016-01-11 11:10 (#10A26)

So, how long until our mobile devices can detect this sort of spying and counter? Or, should we just end to end encrypt..
Post Comment
Subject
Comment
Captcha
What is David's name?