Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Viknesh Balaji, Aishwarya R, Yash Sikhwal, Sanjana Ramesh
DOI Link: https://doi.org/10.22214/ijraset.2023.51487
Certificate: View Certificate
I. INTRODUCTION
Cyber-Surveillance has been increasingly relied on by governments to carry out certain administrative tasks in the health, welfare, education and civil security sectors. Businesses keen to protect certain information or to monitor the behavior of their employees or clients have also engaged in “cyber-surveillance” and corporate surveillance. Civil society and citizens' organizations may also use information technologies to monitor the words and deeds of authorities or businesses as part of strategies to publicly denounce conduct they deem to be unacceptable. Finally, delinquents and criminal groups may turn to cyber-surveillance in the pursuit of their objectives. The stingray device can be extremely beneficial to the government if used for the intended purpose, i.e. to hunt for criminals and national threats. If an approximate location of the threat is known, a stingray can be deployed near the region. The stingray will provide the phone numbers present in a particular radius around it. An even more advanced version can intercept the calls and messages being sent through the target’s device.
The motivation for this project was taken from the highly regarded Netflix documentary, “Web of Make Believe.”
II. LITERATURE SURVEY
S.No |
Title |
Year |
Pros |
Cons |
Methodology |
1 |
Shahid, Z., Raza, M. A., Malik, A. W., & Khan, M. A. (2020). Software Defined Radio: An Overview, Technology and Its Applications. Journal of Electrical Engineering, 20(1), 175-189. |
2020 |
Provides a comprehensive overview of SDR technology and its applications in various fields |
Does not provide a critical evaluation of the limitations of SDR or any new research findings |
The authors used a literature review methodology.
|
2 |
Chabukswar, V. R., & Patil, S. K. (2019). Cyber Surveillance using Stingray Device. International Journal of Engineering and Advanced Technology, 8(4), 81-85. |
2019 |
Presents a new method for cyber-surveillance using a Stingray device, which could potentially be useful for law enforcement and intelligence agencies |
Does not discuss any potential ethical or legal concerns associated with using Stingray devices for cyber surveillance |
The authors describe the technical details of the Stingray device and how it can be used for cyber surveillance |
3 |
NIST (National Institute of Standards and Technology). (2019). Guidelines for the use of cell site simulator technology. NIST Special Publication 800-146. |
2019 |
Provides detailed guidelines and recommendations for the use of cell site simulator technology by law enforcement and other authorized entities |
Does not provide an in-depth evaluation of the effectiveness of cell site simulator technology for law enforcement purposes |
NIST developed these guidelines through a collaborative process that included input from stakeholders in government, law enforcement, industry, academia, and civil liberties organizations |
4 |
Yan, H., Qian, Y., & Wang, W. (2019). 5G mobile networks: Vision, requirements and challenges. Science China Information Sciences, 62(2), 210301. |
2019 |
Provides a detailed overview of the vision and requirements for 5G mobile networks, including their technical capabilities and potential applications |
The paper is focused primarily on the technical aspects of 5G technology, and does not address broader societal or economic implications |
The authors used a literature review methodology to gather information from academic databases, technical journals, and industry reports |
5 |
Reimann, F., & Stöver, R. (2017). An SDR-based system for detection and tracking of UAVs in the ISM bands. In 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS) (pp. 1-6). IEEE. |
2017 |
Presents a new system for detecting and tracking unmanned aerial vehicles (UAVs) using software-defined radio (SDR) technology |
The proposed system has only been tested in a laboratory environment, and its performance in real-world conditions is not yet known |
The authors describe the design and implementation of an SDR-based system for UAV detection and tracking in the ISM bands. They conducted experiments to evaluate the system's performance, including its ability to detect and track multiple UAVs simultaneously |
III. POSITIONING
IV. PROJECT OVERVIEW
A. Objectives
B. Goal
The main goal of this project is to build a working IMSI tracker using a software defined radio (RTL-SDR) and a PC, and provide said device to law enforcement agencies to be used in regulation.
V. PROJECT SCOPE
The scope of the Stingray Device using a RTL-SDR as an IMSI catcher is to capture GSM signals around the devices and obtain the IMSI numbers of the devices. This will in turn allow us to triangle the location of the said device.
VI. METHODOLOGY
A. PC with Linux
Linux is a free and open-source OS. It is well-known for its resilience, security, and adaptability. It is commonly used for servers, desktop computers, and mobile devices. It delivers a sophisticated command-line interface as well as a large collection of open-source software tools to users. It is highly modifiable and can be adjusted to the requirements of the user. It is made up of several small, specialized components that may be joined in a variety of ways to create a personalized operating system. Hence, Linux is a robust and versatile operating system that has emerged as a significant component of the computing environment.
Tested with:
B. SDR Receiver
An SDR (Software Defined Radio) receiver is a form of radio receiver that processes radio signals using software rather than traditional hardware circuitry. It enables versatile and efficient signal processing, making it suitable for a variety of applications such as communication, signal analysis, and research. They are typically made up of two parts: radio hardware and software that runs on a computer.
The radio hardware digitizes and captures the radio signal, while the software processes it and provides a user interface for controlling the radio and studying the signal. They have various advantages over standard radio receivers, including increased flexibility, enhanced performance, and lower cost.
They are easily adaptable to multiple frequencies and modulation types, making them suitable for a wide range of applications. Furthermore, the use of software for signal processing enables advanced signal processing techniques, such as digital signal processing, that are not achievable with traditional radio receivers.
Tested with:
VII. MODULES IDENTIFIED
VIII. PROJECT IMPLEMENTATION
A. Architectural Design
Stingray in corporations- In this use case the Stingray device can be used to keep track of the devices being used inside a corporation based on the IMSI numbers of these devices. Hence it can help in identifying and alerting the admin upon the entry of unauthorized devices.
2. Figure 8.12
Stingray for law enforcement- In this use case the Stingray device can be used by law enforcement to trace the IMSI numbers within a certain vicinity of the device and hence can track a particular ‘target’ IMSI to its exact location. This favors national security, helps finding missing persons and maintain general law and order.
B. Class Diagram
C. Entity Relationship Model
The relationships between these entities can be described as follows:
a. IMSI Catcher-Law Enforcement Relationship: One user can operate multiple Stingray devices, but one Stingray device can only be operated by one user.
b. IMSI Catcher-Target Device Relationship: One user can investigate multiple suspects, but one suspect can be investigated by multiple users.
The ER model for a Stingray device can be represented in a diagram that shows the entities and their relationships, such as the one below:
D. Sequence Diagram
Here are some possible object interactions for the major use case scenarios for cyber-surveillance using Stingray devices with an SDR:
a. User: authenticates()
b. User: authorize(location)*
c. Location: provides location data to Device
d. Device: start()
e. Device: collects communication data from Communication
2. Gathering communication data
a. Device: collects communication data from Communication
b. Communication: provides call duration, phone number, and message content to Device
c. Analyzing communication data
d. Device: sends communication data to Analysis module
e. Analysis: analyzes communication data to identify suspicious activity
f. Analysis: sends analysis results to User
3. Investigating a suspect
a. User: receives analysis results from Analysis
b. User: retrieves suspect information from Suspect
c. User: authorizes location of suspect
d. Device: collects communication data from Communication
e. Device: provides communication data to Analysis
f. Analysis: analyzes communication data to provide evidence against suspect
g. Analysis: sends evidence to User
4. Upgrading firmware
a User: retrieves firmware upgrade from Upgrade module
b. Device: upgrades firmware using Upgrade module
These are just some possible object interactions for the major use case scenarios for cyber-surveillance using Stingray devices with an SDR. The specific interactions may vary depending on the implementation details of the system.
E. Description of Technology Used
A Stingray device is a type of surveillance equipment used by law enforcement agencies to intercept and analyze cellular communications. It works by simulating a cell tower and tricking nearby mobile devices into connecting to it, thereby allowing the device to intercept and monitor the communications of the targeted mobile devices. Software-defined radio (SDR) technology is often used to build Stingray devices, as it allows for a flexible and programmable approach to wireless communication. Here are some of the technologies commonly used to build a Stingray device using an SDR:
The radio frontend, analog-to-digital converter (ADC), and digital signal processor (DSP) are all physical components of an SDR Stingray device. The SDR hardware receives and converts analogue radio signals into digital signals that the SDR software can process.
2. SDR Software
The most significant component of the Stingray gadget is the SDR software. It is in charge of impersonating a cell tower and intercepting cellular communications. The software analyses intercepted signals and extracts relevant information from them using various signal processing methods. Frequency hopping, signal modulation, signal demodulation, signal filtering, signal amplification, and signal decoding are just a few of the functionalities that can be coded into the software.
3. GNU Radio
GNU Radio is a free and open-source SDR toolkit that provides a foundation for developing SDR applications. It comes with a set of signal processing blocks that can be used to create custom signal processing pipelines for a variety of wireless communication standards. GNU Radio is compatible with a wide range of SDR hardware platforms and offers a versatile programming environment for developing custom SDR applications.
4. LTE Protocol Stack
Cellular networks communicate with mobile devices using the Long-Term Evolution (LTE) protocol stack. To impersonate a cell tower and intercept cellular conversations, the Stingray device must comprehend the LTE protocol. The LTE protocol stack is usually implemented in software and can be used to create custom LTE base stations using SDR technology.
5. RF Amplifiers and Antennas
RF amplifiers and antennas are utilized to extend the Stingray device's range and sensitivity. RF amplifiers are used to boost received signals, whereas antennas are used to pick up signals in the air. The antenna and amplifier to be used are determined by the frequency ranges and communication standards to be used.
Overall, the combination of SDR hardware, SDR software, GNU Radio, LTE protocol stack, RF amplifiers, and antennas provides a robust and versatile foundation for developing Stingray devices for cyber-surveillance. It is crucial to emphasize, however, that the usage of such devices must be done in accordance with applicable rules and regulations.
IX. FINDINGS / RESULTS OF ANALYSIS
So far, through our project we are able to obtain hexadecimal values in the terminal which indicate the packets being transmitted from the base station to the device (Downlink). These packets can be visualized in a more organized way in Wireshark. However, decrypting these packets to obtain IMSI numbers is still under progress. Also, the stingray device is limited to capturing only GSM frequencies.
X. COST OF THE PROJECT
A. Requirements
Kali Linux with gr-gsm, GQRX and Wireshark
Python 3.7+
4 GB RAM+
i3 processor
B. Cost Analysis
Internet connection - Rs.2500
Photocopies - Rs.500
RTL-SDR Dongle with antenna - Rs. 4000
XI. PROJECT LIMITATIONS AND FUTURE ENHANCEMENTS
A. Limitations
B. Enhancements:
Creating Stingray devices with software-defined radio (SDR) technology offers a flexible and configurable way to wireless communication. These devices, which can impersonate a cell tower and intercept cellular conversations, have become a significant tool for law enforcement organizations in combating cybercrime and terrorism. The project on Stingray devices made using SDR has offered a thorough understanding of the technologies and techniques used in their development. The project has emphasized the significance of SDR hardware, SDR software, GNU Radio, LTE protocol stack, RF amplifiers, and antennas in the development of Stingray devices. The study has also emphasized the importance of adhering to existing laws and regulations when deploying Stingray devices for surveillance purposes. When deploying Stingray devices, ethical and legal factors must be taken into account, as with any technology. In conclusion, the study established the value and efficacy of leveraging SDR technology to develop Stingray devices for cyber-surveillance objectives. As technology advances, we may expect more developments in the development of Stingray devices, and it is critical that we continue to balance the requirement for security with the preservation of privacy and individual rights.
[1] Shahid, Z., Raza, M. A., Malik, A. W., & Khan, M. A. (2020). Software Defined Radio: An Overview, Technology and Its Applications. Journal of Electrical Engineering, 20(1), 175-189. [2] Chabukswar, V. R., & Patil, S. K. (2019). Cyber Surveillance using Stingray Device. International Journal of Engineering and Advanced Technology, 8(4), 81-85. [3] NIST (National Institute of Standards and Technology). (2019). Guidelines for the use of cell site simulator technology. NIST Special Publication 800-146. [4] Yan, H., Qian, Y., & Wang, W. (2019). 5G mobile networks: Vision, requirements and challenges. Science China Information Sciences, 62(2), 210301. [5] Reimann, F., & Stöver, R. (2017). An SDR-based system for detection and tracking of UAVs in the ISM bands. In 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS) (pp. 1-6). IEEE.
Copyright © 2023 Viknesh Balaji, Aishwarya R, Yash Sikhwal, Sanjana Ramesh. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET51487
Publish Date : 2023-05-03
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here