Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
surveillance device
|
gptkbp:alsoKnownAs |
stingray
cell-site simulator |
gptkbp:can_be_countered_by |
end-to-end encryption
IMSI catcher detection apps |
gptkbp:can_be_disguised_as |
legitimate cell tower
|
gptkbp:can_be_portable |
true
|
gptkbp:can_be_stationary |
true
|
gptkbp:can_be_vehicle-mounted |
true
|
gptkbp:can_collect |
metadata
call content |
gptkbp:can_disrupt |
mobile phone communications
|
gptkbp:can_force |
mobile phones to connect to it
|
gptkbp:canBe |
gptkb:intelligence_gathering
lawful interception identity theft mass surveillance criminal investigations network analysis location tracking eavesdropping man-in-the-middle attack data interception tracking suspects deny service downgrade encryption intercept SMS messages intercept voice calls locate specific mobile devices tracking protestors unauthorized surveillance |
gptkbp:capturedBy |
gptkb:International_Mobile_Subscriber_Identity
|
gptkbp:detects |
specialized detection equipment
|
https://www.w3.org/2000/01/rdf-schema#label |
IMSI catcher
|
gptkbp:introducedIn |
1990s
|
gptkbp:manufacturer |
gptkb:Harris_Corporation
gptkb:Ability_Inc. gptkb:Septier |
gptkbp:raises |
privacy concerns
|
gptkbp:subject |
legal restrictions in some countries
|
gptkbp:target |
gptkb:4G_networks
gptkb:5G_networks 3G networks 2G networks |
gptkbp:used_in |
intelligence agencies
law enforcement agencies |
gptkbp:usedFor |
intercepting mobile phone traffic
tracking mobile phone users |
gptkbp:bfsParent |
gptkb:IMSI
gptkb:International_Mobile_Subscriber_Identity |
gptkbp:bfsLayer |
6
|