What’s an IMSI-Catcher?

A DRT-Box by any other name…

“The IED you have called is not in service.” (from www.army.mil)

A security hole in 2G protocols opens the way for a lot of mischief. But it can also be used for good.

A hole big enough to drive a basestation through

When a cellphone comes to a cellular network, it must be authenticated for service. Starting with 3G technology, the phone and network use…