Police may intercept any SMS messages or regular phone calls using Stingray cell tower simulators. Instead use secure communication apps such as Signal (signal.org), Threema (Threema.ch) or Briar (briarproject.org) for text and voice.
#protesting
not really. They can but they need something better. USIMs, unlike SIMs are authenticating the cell, too.
@loweel I am using the name "Stingray" in the generic sense, like if you want to order a "Coke". A cell tower simulator will be a man in the middle and intercept all traffic as it passes from your phone on to the legitimate cell network. Phone calls, SMS (both unencrypted) and data.
@loweel Why go to the effort of getting data from the telcos, when they can get it directly from captured signals? No matter how they get it though, your data is captured.
https://www.eff.org/pages/cell-site-simulatorsimsi-catchers
@supernova
because a single Signaling Gateway trace has ALL the records of ALL the traffic. The price for user of getting STP traces is much less.
If you take away, say 10 GB of protocol dump in the message Gateway, you got MILLIONS of SMS. It takes a few minutes, and the cost is little.
To intercept millions of users like you say, will cost much more money. This is why law enforcement has direct access to MSC, HLR, VLR, SGSN, GGSN, Messaging GAteways, AUC, etcetera.