Most mobile devices will connect to any base station that appears legitimate.
That behaviour is what makes IMSI catchers possible.
Mobile devices use International Mobile Subscriber Identifiers (IMSI) to authenticate and communicate across cellular networks. IMSI catchers exploit this by impersonating legitimate base stations, causing nearby phones to connect to them instead of the real network.
In doing so, they collect SIM and device identifiers (such as IMSI or IMEI), along with signalling metadata that can be used to estimate presence and rough location. This does not require breaking applications or accessing encrypted content. It relies entirely on standard network behaviour.
These techniques exploit trust within the network itself, sometimes forcing devices onto older or less secure protocols. Although heavily regulated and detectable, their effectiveness highlights how much signalling information mobile networks already expose by design.
What to keep in mind when interpreting this data
- Mobile network data reflects connectivity, not people. It describes devices and sessions, not identity or human behaviour.
- Convenience signals are often over-trusted. Networks prioritise availability and usability, not verification or assurance.
- Risk increases in sensitive contexts. Meetings, travel, and safety-critical situations raise the cost of misinterpretation.
- Continuous connectivity is not always necessary. Many activities do not require phones to remain connected at all times.
- Decisions are more reliable when they do not depend entirely on phone location or connectivity data.
Illustrative examples of GSM signalling exposure
Image 1: GSM Downlink Signal Activity.
Live cellular spectrum showing active network presence within range.
Image 2: GSM Signalling Metadata.
Decoded broadcast data showing network identifiers and signalling information transmitted continuously by the network.
Image 3: Associated GSM Data Exposure.
Structured dataset linking identifiers (IMSI/TMSI) with network parameters and timestamps, enabling pattern and presence analysis over time.
Final point
This isn’t about breaking encryption or accessing content. It’s about what is already exposed through normal network operation.
Understanding the signal is one thing. Interpreting the risk is another.
If it’s there, it’s observable.
INTSPIRED®
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.
Stay informed.
Top comments (0)