
A great segment from 60 minutes Australia on security and privacy hacking on the cell phone network around the world. This segment demonstrates how a simple radio antenna with parts costing around $100 can act as a mobile cellphone tower and intercept all communications.
The technology is based upon IMSI Catching. If you want to monitor these fake networks in your area you can install an app on your Android phone called Android IMSI-Catcher Detector. We highly recommend this app if you use an Android phone. These devices are essentially false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. They are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as “StingRay“.
Related Posts
Understanding Attack Surfaces in Cybersecurity
What do you need to know in order to minimise the risks of your network's attack surface?
Successful Cyberattack Vectors: Common Threats and How to Stop Them
Make sure you understand the threats your firm faces by learning about the most successful cyberattack vectors used by hackers.
Brute Force Attacks in 2025: How They Work, What’s Changed and How to Stop Them
How have brute force attacks evolved in 2025 and what can firms do to prevent these threats?
Types of Cybercrime: Understanding Today’s Threat Landscape
Recognizing the key types of cybercrime and knowing how they work is an essential starting point when developing a cybersecurity defense strategy.
Cybersecurity Incident Response: How to Prepare for and Manage Modern Threats
Following these seven data loss prevention best practices can help any firm reduce the risk of falling victim to threats like ransomware.
Understanding Threat Actors: Who’s Behind Cyberattacks and How to Stay Protected
Discover the different types of threat actors in cybersecurity, how they operate and what your business can do to stay protected from evolving threats.