zlacker

[return to "Thousands are monitoring police scanners during the George Floyd protests"]
1. blanto+h7[view] [source] 2020-06-02 14:09:32
>>eloran+(OP)
Hi there! I'm the owner and operator of Broadcastify, which is the platform that powers all the apps that provide police scanners and public safety communications online. I'm an active HN reader and would be glad to answer any questions folks have.

It's an interesting business to be in these days...

◧◩
2. kennxf+ba[view] [source] 2020-06-02 14:25:46
>>blanto+h7
Is there a way of legitimately detecting Stingrays? I understand this is the kind of situation where they are actively deployed despite all the social awareness.
◧◩◪
3. swebs+Dg[view] [source] 2020-06-02 15:01:16
>>kennxf+ba
I guess if you were to build a map of static cell towers, it would be easy to see if a new one suddenly pops up.
◧◩◪◨
4. jackha+cu1[view] [source] 2020-06-02 21:17:48
>>swebs+Dg
additional temporary "towers" are sometimes added when very high but transient network loads are anticipated (such as a music festival, or county fair, etc.). not all new towers are sniffers.
◧◩◪◨⬒
5. g_p+yT1[view] [source] 2020-06-02 23:59:45
>>jackha+cu1
If anyone is interested in trying to work around this, I have a few ideas for how to try distinguish a real and fake cell. Temporary event "pop-up" networks should announce valid neighbouring cells.

Your baseband (radio) might expose neighbour cell data - iPhone field test menu shows the announced neighbour data.

Hypothesis is that a rogue tower will not have valid neighbour cells announced. They could try listen in for valid ones and advertise those.

A lot of the ways to detect will depend on the generation of network being spoofed - 4G networks will also advertise signalling for legacy 2G and 3G circuit switched networks. Rogue sites might not.

[go to top]