In our reviews of the Rayzone Piranha and Harris Hailstorm, C5IS describes the network complexities of LTE conquered by next generation IMSI catchers. Just as important as the network, however, are protocol and device chipset vulnerabilities that leave LTE a fairly easy target for monitoring, interception, jamming and DoS attacks. Security weaknesses in Long Term Evolution … [Read more...]
Down and Dirty with the Boeing DRT Box
Despite all the fanfare over IMSI catchers and the immense importance of mobile location and interception with users, one very important player continues to miss out on the respect it merits: the Boeing DRT Box or “dirt box,” as it is commonly called. We all know why: the Harris Stingray’s ascendence to a common term describing the entire niche. In fact, there are many fine … [Read more...]
Deciphering the Harris Hailstorm IMSI Catcher: All About LTE
In the nearly five years since Harris Corporation launched its latest model of IMSI catcher, Hailstorm, the general consensus on the product remains “no consensus” -- a remarkable achievement in “keeping the lid on” a surveillance technology of any kind. To this day, descriptions of Hailstorm are so scattered and opaque that even the most astute ISS professional could be … [Read more...]
Group 2000: Merging Facial Recognition with Classic ISS
If you wish to fathom how the surveillance discipline of facial recognition crosses over into the areas of ELINT, COMINT, SIGINT and OSINT, ask Group 2000 of The Netherlands. Since late 2015 the company has offered a 3D facial recognition system both standalone and in combination with products designed for conventional intelligence work. Group 2000’s LIMA Biometric Identity … [Read more...]
Rayzone InterApp for Wi-Fi Interception: Wintego Lookalike?
When the Rayzone InterApp Wi-Fi “cloud and app” interception product debuted at Paris Milipol in late November, it was hailed as a game-changing innovation in tactical mobile interception. InterApp can pull any data off a smartphone linked to a public Wi-Fi network, including a target’s email, texts, images, files, IMEI and MAC address -- and track & identify hundreds of … [Read more...]