Skip to content

Technical Overview

He3556 edited this page Dec 22, 2014 · 30 revisions

This documentation is especially for developers who want to join our project and for everybody else who would like to know how AIMSICD detects IMSI-Catchers, silent SMS and other threats. Important Note: Due to its complexity, this is a work in progress.


###Basic Modules and I/O:

Program Modules


###Database Tables: (Current Behavior)

Database Tables

  • DEFAULT_MCC_TABLE: (Mobile Country Code): This table holds data to identify your service provider (carrier) and country.
  • CELL_TABLE: These are the unique BTS towers as collected by the phone, once it has connected to it (ignoring neighboring cells).
  • LOCATION_TABLE: These are the individual measurements as collected when in Tracking Cell Details mode. The location (Lat/Lng) of the phone and the Cell-ID it is connected to + timestamp.
  • OPENCELLID_TABLE: Downloaded DB from OpenCellID.
  • SILENT_SMS_TABLE: Protocol of incoming messages.

Database Tables: (New Proposal)

aimsicd2_er_3


###TO BE UPDATED

  • CELL_TABLE: Data collected by the phone when it is connected to a cell. (not from the table neighboring cells).
  • LOCATION_TABLE: These are the individual measurements as collected when in Tracking Cell Details mode. The location (Lat/Lng) of the phone and the Cell-ID it is connected to + timestamp.

##other important Details:

Display the Neighboring Cell information in two ways:

  1. through telephony manager methods which does not work on Samsung Devices
  2. a fallback is available through the methods developed by Alexey (Data is saved in an Array not in an table)

##**Further information about the actual status and prepared working packages to be picked up by an developer:

https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/wiki/Development-Status