AIMSCIDL detects IMSI-Catchers. IMSI-Catchers are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. In the USA the IMSI-Catcher technology is known under the name "StingRay". Find out more in our WIKI.
The app aims to provide two main features with respect to IMSI-Catchers:
AIMSICDL attempts to detect IMSI-Catchers through such as these:
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools to monitor and manipulate communications from a parked car in your residential neighborhood; notably for stealing passwords or credit card data from people nearby who make purchases on their phones.
The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them traceless. This app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking.
Do not rely on AIMSICDL for real life scenarios that involve serious risk! Leave your cell at home.
Please read our Disclaimer! This app does not:
Solutions for the above may be found in our Recommendations.
Although this project is fully Open Source, developing AIMSICDL is a lot of work and done by enthusiastic people during their free time. If you're a developer yourself, we welcome you with open arms!
Our project would not have been possible without these awesome people. Thanks to the original AIMSICD project.