Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The reason we even heard about some of these IMSI-catchers, like here in Norway or in that cryptophone firewall article, which mentions they discovered multiple across US, is because the guys behind Cryptophone used their product to look for them. That's what it does, and it's probably quite unique in the industry right. And yes, they go to the press to tell them about it, and then tell them how the product works to detect them.

I don't really see this as an infomercial no more than all the thousands of the initial articles on touchscreen phones talked about the iPhone in them, since the iPhone was the first real touchscreen phone, and then all the other phones had to be compared to it.



I don't see a whole lot of press predating this article:

http://www.wsj.com/news/articles/SB1000142405311190419460457...

( "'Stingray' Phone Tracker Fuels Constitutional Clash" is the headline if you need to bounce it through Google)

The information there came from a court case and the Stingray patent (they publish an image of one). It's useful and interesting to be able to look for them, but it seems that the US legal system also played a part in disclosing the practice of using them.


It's not just the makers of the cryptophone, but also these security companies that employ "former mil.intelligence" people that get some great product placement here. I don't fault the companies for manipulating the press (they're former spies after all...) - but the jornalism doesn't impress. Don't get me wrong: the story is news worthy. I'm not saying it shouldn't be published. But, come on, a single google search on IMSI-catchers reveal plenty of follow up sources on how hard it is to make one...

Note that last weekend it was PIs (staffed by "former police and intelligence personell") that got a free front page ad for investigating Christmas parties (and doing "counter surveillance")...


I don't know. Does for example this stuff work? (It's unclear how far they've gotten on their TODO-list):

https://github.com/SecUpwN/Android-IMSI-Catcher-Detector

I also seem to recall some talk from the people behind Cyanogen about detecting "strange" tower behaviour? Can't find the link right now, though -- so I might be misremembering that one.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: