AIMSICD against IMSI-Catchers, StingRay and Silent SMS!
Clone or download
Pull request Compare This branch is 1041 commits ahead, 2517 commits behind CellularPrivacy:development.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
DOCUMENTATION
MISC
PROMOTION
SCREENSHOTS
app
gradle/wrapper
res/menu
server
third_party/rootshell
.gitignore
.travis.yml
CHANGELOG.md
CONTRIBUTING.md
DATABASE.md
DISCLAIMER
LICENSE
README.md
build.gradle
gradlew
gradlew.bat
settings.gradle
signing.properties

README.md

Android IMSI-Catcher Detector

Build Status Development Status GooglePlay CoverityScan

AIMSICD is an app to detect IMSI-Catchers. IMSI-Catchers are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. In the USA the IMSI-Catcher technology is known under the name "StingRay". Find out more in our WIKI.


AIMSICD-Banner


AIMSICD-Teaser


Aptoide GitHub F-Droid Twitter


Index


IMSI-Catchers

What it does

AIMSICD attempts to detect IMSI-Catchers through various methods such as these:

We are planning many more detection methods, so feel free to join the discussion and help us implement them. See our development status.


Why to use it

The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location, or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools to monitor and manipulate communications from a parked car in your residential neighborhood, stealing passwords or credit card data from people nearby who make purchases on their phones.

The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them traceless. This app aims to make it possible to detect the IMSI-Catchers, so that using them becomes a risky proposition. It also aims to make users safer, by alerting on possible interception and tracking.


Warnings

This app does not:

  • Provide full device encryption
  • Provide secure data transmission (see Tor)
  • Provide secure phone calls (see RedPhone)
  • Provide secure SMS (see SMSSecure)
  • Provide secure application sand-boxing
  • Provide app permission control (XPrivacy)
  • Provide firewalls (see AFWall+)
  • Provide ROOT and remove bloatware
  • Prevent already installed rogue applications from full access and spying

The efficiency of this app has not yet been verified against real IMSI-Catchers. If you can help with this, please get in touch with us. Before using our App, you must agree to our Disclaimer!


Bug Tracker

Please follow how to correctly submit Issues.


Support

Although this project is fully Open Source, developing AIMSICD is a lot of work and done by enthusiastic people during their free time. If you're a developer yourself, we welcome you with open arms! To keep developers in a great mood and support development, please consider making a (fully anonymous) donation.

All collected donations shall be split into appropriate pieces and directly sent to developers who contribute useful code (at our discretion). Additionally, donations will be used to support these privacy organizations (contact us if you are a like-minded organization):

EFF Guardian Project Privacy International


License

This project is completely licensed GPL v3+.


Credits & Greetings

Our project would not have been possible without these awesome people. HUGE THANKS!


Sponsors

Our gratitude flies out to our great Sponsors:

AquaFold Navicat Scanova


Get in touch with the core team!

You will find our current team members here.