Awesome
<h1 align="center">Android IMSI-Catcher Detector</h1> <p align="center"> <a target="_blank" href="https://travis-ci.org/CellularPrivacy/Android-IMSI-Catcher-Detector"><img src="https://travis-ci.org/CellularPrivacy/Android-IMSI-Catcher-Detector.svg"></a> <a target="_blank" href="https://scan.coverity.com/projects/3346"><img src="https://scan.coverity.com/projects/3346/badge.svg"></a> <a target="_blank" href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki/Development-Status"><img src="https://img.shields.io/badge/Development-ALPHA-blue.svg"></a> <a target="_blank" href="https://hosted.weblate.org/projects/aimsicd/strings/"><img src="https://hosted.weblate.org/widgets/aimsicd/-/svg-badge.svg"></a> <a target="_blank" href="https://www.bountysource.com/teams/android-imsi-catcher-detector/issues?utm_source=Android%20IMSI-Catcher%20Detector&utm_medium=shield&utm_campaign=bounties_received"><img src="https://www.bountysource.com/badge/team?team_id=40338&style=bounties_received"></a> </p>--
AIMSICD
is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike. Find out more in our Wiki on GitHub.
<p align="center"> <a target="_blank" href="http://aimsicd.store.aptoide.com/"><img src="https://spideroak.com/share/IFEU2U2JINCA/GitHub/home/SecUpwN/SpiderOak/MISC/external/Aptoide.png"></a> <a target="_blank" href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/releases"><img src="https://spideroak.com/share/IFEU2U2JINCA/GitHub/home/SecUpwN/SpiderOak/MISC/external/GitHub.png"></a> <a target="_blank" href="https://f-droid.org/repository/browse/?fdid=com.SecUpwN.AIMSICD"><img src="https://spideroak.com/share/IFEU2U2JINCA/GitHub/home/SecUpwN/SpiderOak/MISC/external/F-Droid.png"></a> <a target="_blank" href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki/FAQ#q-why-wont-you-upload-your-app-to-the-google-play-store"><img src="https://spideroak.com/share/IFEU2U2JINCA/GitHub/home/SecUpwN/SpiderOak/MISC/external/NoGooglePlay.png"></a> <a target="_blank" href="https://twitter.com/AIMSICD"><img src="https://spideroak.com/share/IFEU2U2JINCA/GitHub/home/SecUpwN/SpiderOak/MISC/external/Twitter.png"></a> </p>
Index
What it does
AIMSICD
attempts to detect IMSI-Catchers through detection methods such as these:
- Check Tower Information Consistency
- Check LAC/Cell ID Consistency
- Check Neighboring Cell Info
- Prevent silent app installations
- Monitor Signal Strength
- Detect silent SMS
- Detect FemtoCells
Make sure to see our app goals and development status as well as technical overview.
Why use it
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood - notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy!
Warnings
Please read our Disclaimer! This app does not:
- Provide secure phone calls
- Provide secure data transmission
- Provide app permission control
- Provide secure application sand-boxing
- Provide ROOT and remove bloatware
- Provide secure SMS
- Provide firewalls
- Provide full device encryption
- Prevent already installed rogue apps from full access and spying
Solutions for the above may be found in our Recommendations.
Bug Tracker
Please follow our Bug Submission Guide.
Support
Although our app is fully Open Source, developing it is a lot of work and done by privacy enthusiasts during their free time. If you're a developer yourself, we welcome and credit your pull requests! To keep developers in a great mood and support development, please consider making a donation. It will be split into pieces and directly sent to developers who solved the backed Issue.
License
Please contribute to this repository instead of rebranding our app. Thank you!