Android imsi catcher detector aimsicd
Android IMSI-Catcher Detector
This Project will have a revival soon.
We are working on a light version of AIMSICD.
AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as «StingRay», «Cellular Interception» and alike. Find out more in our Wiki on GitHub.
AIMSICD attempts to detect IMSI-Catchers through detection methods such as these:
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood — notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy!
Please read our Disclaimer! This app does not:
- Provide secure phone calls
- Provide secure data transmission
- Provide app permission control
- Provide secure application sand-boxing
- Provide ROOT and remove bloatware
- Provide secure SMS
- Provide firewalls
- Provide full device encryption
- Prevent already installed rogue apps from full access and spying
Solutions for the above may be found in our Recommendations.
Although our app is fully Open Source, developing it is a lot of work and done by privacy enthusiasts during their free time. If you’re a developer yourself, we welcome and credit your pull requests! To keep developers in a great mood and support development, please consider making a donation. It will be split into pieces and directly sent to developers who solved the backed Issue.
Please contribute to this repository instead of rebranding our app. Thank you!
About
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
Источник
Android imsi catcher detector aimsicd
Thank you for contributing! Please select:
Feel invited to develop with us using these steps:
- Fork our repository and optionally give it a star when you like it.
- Download your fork using a Git client like SmartGit (all platforms).
- Pick an Issue you’d like to work on. Introduce yourself in that Issue.
- Work on resolving the Issue you picked using your local code copy.
- Follow our Style Guide for higher code quality and corporate design.
- Test your changes and submit a pull request when we shall add it.
- Don’t be shy to ask for help in an Issue and feel invited to contact us.
Let our app start up in your native language!
- See our translations and login via GitHub or others to add yours.
- When translating, keep small device screens in mind. Shorten it.
- Please make sure to finish your translation, if you start a new one!
- Translations will be pulled into our GitHub automatically. Enjoy!
Can’t code (yet)? No problem, we love you too!
- Grab our latest Release (or even better: compile development branch).
- Read and understand our WIKI and fully agree to our Disclaimer.
- Test our app on demonstrations and riots (warning: Privacy at risk).
- Test all functions of our app and check for possible translation bugs.
- Share our website and Media Material or tweet about us.
Useful links to help you with correctly formatting posts.
Thanks for helping us squashing bugs! Please be patient.
Important Bug Submission Rules:
- SAFETY FIRST: Remove CID, LAT, IMEI, IMSI and phone number from logs you submit!
- ALWAYS use the latest release. Preferrably build the development branch from source.
- If you use Xprivacy read and understand THIS first! Give our app another try after reading.
- App still mocking around? See our open Issues and look if your Issue already exists.
- If your Issue does not exist yet, open a new Issue and give it a short descriptive title.
- Describe your Issue as thoroughly as possible and add logs so that we can reproduce it.
- Maintain your filed Issues! Nothing is more annoying than unresponsive bug reporters.
In all cases, you MUST include the following:
- AIMSICD version (see the About-Tab within our app)
- Your exact FW specification (ROM, AOS API, etc.)
- Your exact HW specification (processor, model number, etc.)
- The output of getprop command to a Pastebin-Site such as PIE-Bin
- Logcat from button Debugging in Navigation Drawer (remove personal data)
- Feel free to attach any other logs made by a logcat tool like MatLog
Command line junkie?
Then you can use the following shell function to help you get only relevant logcat entries. Copy and paste the following to your terminal shell:
Furthermore, here are some great commands that will:
- Create a log directory in: /sdcard/aimsicd_log/
- cd into that directory
- Clear all the existing logcats
- Run AIMSICD and wait for a key press to kill it
- Save a full logcat (excluding radio) into /sdcard/aimsicd_log/aimdump.log
Copy and paste the following to your android rooted shell:
To run it, just type: aimrun . If you want to also supply radio logcat, add -b radio somewhere in the logdmp alias, but know that your GPS location and cell info may be included when you do that.
Special positions we are currently seeking skilled people for:
- People with a CryptoPhone for another detection verification.
- Bugfixer for Coverity Scan Defects detected within our app.
Thank you for encouraging our developers!
Code of Conduct
In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.
Examples of behavior that contributes to creating a positive environment include:
- Using welcoming and inclusive language
- Being respectful of differing viewpoints and experiences
- Gracefully accepting constructive criticism
- Focusing on what is best for the community
- Showing empathy towards other community members
Examples of unacceptable behavior by participants include:
- The use of sexualized language or imagery and unwelcome sexual attention or advances
- Trolling, insulting/derogatory comments, and personal or political attacks
- Public or private harassment
- Publishing others’ private information, such as a physical or electronic address, without explicit permission
- Other conduct which could reasonably be considered inappropriate in a professional setting
Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.
Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.
This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project maintainer. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project’s leadership.
This Code of Conduct is adapted from the Contributor Covenant, Version 1.4
Источник
Android imsi catcher detector aimsicd
Android IMSI-Catcher Detector
This Project will have a revival soon.
We are working on a light version of AIMSICD.
AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as «StingRay», «Cellular Interception» and alike. Find out more in our Wiki on GitHub.
AIMSICD attempts to detect IMSI-Catchers through detection methods such as these:
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood — notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy!
Please read our Disclaimer! This app does not:
- Provide secure phone calls
- Provide secure data transmission
- Provide app permission control
- Provide secure application sand-boxing
- Provide ROOT and remove bloatware
- Provide secure SMS
- Provide firewalls
- Provide full device encryption
- Prevent already installed rogue apps from full access and spying
Solutions for the above may be found in our Recommendations.
Although our app is fully Open Source, developing it is a lot of work and done by privacy enthusiasts during their free time. If you’re a developer yourself, we welcome and credit your pull requests! To keep developers in a great mood and support development, please consider making a donation. It will be split into pieces and directly sent to developers who solved the backed Issue.
Please contribute to this repository instead of rebranding our app. Thank you!
Источник