Efforts to detect and prevent cell site simulator abuse
- Cell site simulators exploit vulnerabilities in 4G networks
- Previous MC catcher detector apps are ineffective
- EFF has developed a new method to detect cell site simulators
- More incentives needed for standards organizations to prioritize user privacy
- Goal is to protect people, broaden community understanding of threats and defenses, expose bad actors, and make better laws and norms
EFF has previously worked on projects such as the Coalition Against Stalkerware and tracking down the Dark Caracal threat actor. Now, they are focused on detecting and preventing cell site simulator abuse, which exploits vulnerabilities in 4G networks. Previous MC catcher detector apps are ineffective, but EFF has developed a new method to detect these simulators. However, more incentives are needed for standards organizations to prioritize user privacy. The ultimate goal is to protect people, broaden community understanding of threats and defenses, expose bad actors, and make better laws and norms.