Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
Exclusive: Fake cellphone tower may have surveilled protesters at Portland ICE facility
SAN analyzed cellular signals outside the #Portland ICE facility last weekend as President Donald Trump attempted to deploy National Guard troops to a city he described as “war-ravaged.”
SAN analyzed signals using a device called Marlin. The scans detected over half a dozen IMSI-exposure ratios above 10%, and three separate 18% spikes in just a one-hour window — significantly higher than what the Marlin developers ever registered under normal conditions.
Away from the building, that percentage began to drop. At a hotel 3/10s of a mile away, percentages hovered around 1% to 4% with occasional spikes as high as 9% over a roughly two-hour period.
In SAN’s extensive use of #Marlin over the past four months, the only other time an IMSI-exposure ratio was detected was outside an #ICE facility in Washington state.
Straight Arrow News / https://archive.md/r5yUY #IMSIcatcher #StingRay #surveillance
ICE bought vehicles equipped with fake cell towers to spy on phones
#Android phones could soon warn you of “Stingrays” #snooping on your communications
#privacy #stingrays #imsicatcher #imsi #surveillance
#Google
#Datenschutz #privacy #surveillance #Überwachung #IMSIcatcherAndroid 16 can warn smartphone users of possible eavesdropping attacks in future
New security setting in Android 16 warns of IMSI catchers and unencrypted connections. However, no smartphone modem supports the function yet.
#Android #Android #Google #IMSICatcher #Mobiles #Mobilfunk #Security #Smartphone #Spionage #Überwachung #news